Transmission Control Protocol Reports

Comparing iSCSI Initiator Implementations
sponsored by DellEMC and Intel®
WHITE PAPER: With the advent of iSCSI as the standard for networked storage, businesses can leverage existing skills and network infrastructure to create Ethernet-based SANs that deliver the performance of Fibre Channel-but at a fraction of the cost.
Posted: 09 May 2008 | Published: 09 May 2008

TOPICS:  iSCSI SAN | TCP
DellEMC and Intel®

Keys to SAP Application Acceleration: Advances in Delivery Systems
sponsored by Citrix
WHITE PAPER: It is essential that SAP applications and network infrastructures be considered together as a "application infrastructure" that supports strategic business objectives. This paper examines the challenges associated with SAP application delivery
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Keys to Microsoft Application Acceleration: Advances in Delivery Systems
sponsored by Citrix
WHITE PAPER: Read this paper to learn how you can ensure significantly faster access to the Microsoft applications your users depend on. Download this complimentary guide to discover how an integrated advanced delivery solution can help you.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Riverbed Steelhead Product Family Data Sheet
sponsored by Riverbed Technology, Inc.
DATA SHEET: What's the Riverbed difference? Speed. Scalability. And simplicity. Discover it for yourself and get the facts about the entire family of Steelhead solutions from Riverbed. Companies of all sizes depend on the Riverbed Steelhead product family to accelerate the performance of applications over the WAN.
Posted: 31 Mar 2009 | Published: 31 Mar 2009

Riverbed Technology, Inc.

Clarifying WAN Virtualization, WAN Aggregation and WAN Optimization
sponsored by Talari_DON'T USE
EGUIDE: Wide area network (WAN) virtualization, WAN optimization, and WAN aggregation are three confusing areas in the WAN world. Check out this E-Guide to learn more about WAN virtualization and the difference between these three technologies.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Talari_DON'T USE

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

TechTarget ComputerWeekly.com

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

What to Look for in Secure Sockets Layer
sponsored by TechTarget Security
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

TechTarget Security