Information Technology


How Red Hat\’s JBoss Enterprise Application Platform 6 Is Extending Business Value

This white paper leverages IDC primary research and buyer-focused research to derive an understanding of the customer perception of...

Top 10 reasons to choose Red Hat JBoss Enterprise Application Platform

When it comes to building, deploying, and managing enterprise-level Java™ applications and services, could you benefit from a more...

[Lab Report] Mixed All Flash Array Delivers Safer High Performance

MLC and SLC are the most common types of flash used in storage systems. MLC is less expensive but...

Changing the economics of storage with Dell Compellent Flash-optimized solutions

Dell™ Compellent™ Flash-optimized solutions can help organizations align storage performance with application requirements and optimize both performance and capacity....

An Innovative Simulation Workflow for Debugging High-Speed Digital Designs Using Jitter Separation

This paper presents a new simulation workflow for jitter separation analysis. Jitter separation is a very promising tool that...

5 Most Common Critical SQL Integrity Issues

A crucial part of managing SQL Server is performing regular integrity checks — but what do you do when...

Google Apps Guide: User Onboarding and Deprovisioning in Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

The economics of cloud managed integration

In this paper we will consider what is required to enable cloud-managed integration from a technical perspective. Much of...

Which Security Assessment Is Right For Me

At Dell SecureWorks, we strive to be a trusted security advisor to our customers. Part of building this trust...

EMA Radar™ for Hybrid Cloud Integration Technologies

In this EMA Radar Report, Enterprise Management Associates evaluates seven of the leading vendors of cloud integration platforms, for...

Ovum: Profile of Dell Boomi

Ovum does a deep dive profile of Dell Boomi. Read this report to understand how Dell Boomi can be used...

Embedded Devices & Data Thieves

In an era known as \"the Internet of Everything,\" embedded devices are on the rise - still embedded security...

New Paper: The CISO’s Guide to Advanced Attackers

Much of the security industry spends significant time and effort focused on how hard it is to deal with...

Security Testing and Assessment Services Guide

This document provides you with an understanding of common cyber security tests and assessments organizations can use to evaluate...

Crossing the Digital-Analog Divide

Digital signals are an idealization and as data rates climb above a few Gb/s, they betray their microwave analog...

Google Apps Guide: User Onboarding and Deprovisioning in Google Apps

User management is one of the most important roles of Google Apps administrators, and the processes of onboarding and...

Responsive Delivery: A methodology for mobile development and deployment

Responsive Delivery is a methodology employed to deliver HTML5 user experiences on a variety of devices—typically mobile and tablet—by...

New Free Tool to Detect SQL Server Database Corruption

SQL Integrity Check, the latest free tool from Idera, allows DBAs to skip the time-consuming task of writing and...

10 Tips to Minimize the Impact of a Security Breach

The Dell SecureWorks Counter Threat Unit research team has developed a set of 10 recommended best practices to help...

Making the move from 2.0 to 3.0 USB

With a growing number of USB 3.0 hard disks, drive enclosures, and other devices on the market, it’s time...
 
Page 147 of 156«145146147148149»