TIFF Reports

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Your Guide to Server Virtualization Types
sponsored by Red Hat
EGUIDE: As virtualization begins to play a larger role, trending toward becoming the new norm, it's important that you understand how to move forward. Access this expert e-guide to explore the different types of server memory, virtual machine compatibility, and virtualization file format.
Posted: 03 Feb 2017 | Published: 31 Jan 2017

Red Hat

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

FAQ Guide: How Can Virtualized Storage Be Used For Medical Images
sponsored by DellEMC and Intel®
EGUIDE: This E-Guide from SearchHealthIT.com to highlights the answers to frequently asked questions surrounding the use of virtualized storage for medical images.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

DellEMC and Intel®

Long-term Archiving
sponsored by Storage Magazine
JOURNAL ARTICLE: Tracking regulatory requirements for data retention is tough enough, but restoring data from long-term archives is likely to be even harder.
Posted: 16 Oct 2006 | Published: 01 Oct 2006

Storage Magazine

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security

Presentation Transcript: Personal vs Shared VDI Images
sponsored by Pano Logic, Inc
PRESENTATION TRANSCRIPT: For about as long as VDI had been around, the discussion over the merits of shared and personal images has persisted. In this transcript of the "Personal vs Shared VDI Images" webcast, Brian Madden and Gabe Knuth will take a look at the merits and drawbacks of each approach in an effort to give the viewer a clear path for implementation.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Pano Logic, Inc

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel