Techworld - the UK's infrastructure and network knowledge centre
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business

Home | News | Insight | How-tos | White papers | Case studies | Interviews | Briefings | Reviews | Blog

TOP APPLICATIONS WHITE PAPER ARTICLE

31 May

New! Operational Business Intelligence Executive Playbook


More APPLICATIONS WHITE PAPER ARTICLES

  • Using ESX Server and VirtualCenter to Reduce Oracle Real Application Clusters Deployment Costs and Cycle Times
    This paper describes the steps necessary to clone Real Application Cluster nodes with ESX Server and VirtualCenter.
  • What is compliance?
    These days, compliance is a high priority for organisations as there are some severe penalties for failing to adhere to the correct procedure. Fortunately, there are ways in which the process can be automated.
  • Transforming regulatory mandates into business drivers
    Faced with a bewildering array of compliance demands, companies have been atempting to handle their applications in a piecemeal way. However, companies that adopt a more holistic approach will benefit in many different ways
  • The costs of changing your printer fleet
    Tedhworld's White Paper offers the best advice on preserving the cost-effectiveness of your printer fleet
  • Change and flexibility
    This report looks at change management - how business change affects IT, and how the two can usefully be brought together.
  • Mixed Workload Consolidation Guide
    Provides help to identify appropriate applications for mixed workload consolidation, validate compatibility of applications, and plan for a mixed workload consolidation deployment.
  • How to automate your 64-bit migration - part 1
    In the first of our two-part series on code migration, MigraTEC, maker of 32-to-64-bit migration tools, explains the issues and complexities involved in 32-to-64-bit porting.
  • Automating Spybot Search & Destroy with ZENworks
    How to install and run Spybot Search & Destroy remotely, automatically and as unobtrusively as possible using ZENworks for Desktops.
  • The case for e-mail security
    E-mail poses areas of risk that threaten corporate integrity. A white paper from MessageLabs discussing email security.
  • Creating Web Services using Novell exteNd and NetWare 6.5
    This white paper describes the tools and technologies included with NetWare 6.5 and summarises other Novell exteNd technologies available for developing, deploying and hosting Web services applications.
  • Introduction to database worms
    In recent years, databases have joined web servers and operating systems as a means of attacking a company's infrastructure. This is now a vulnerability that needs to be addressed.
  • Protecting Oracle databases
    The frequency of attacks on Oracle databases have increased in recent times. This white paper gives an overview of the security threats to watch for and discusses methods of protection.

top