Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

361 Results Found for "power bi"

Results per page: 10 40 80

Upgrading to ESXi 5.1 - Best Practices

White Paper | Nov. 02, 2012

When upgrading to ESXi 5.1, you need to consider several things: Why are you upgrading? What are you upgrading? What should you do to get ready? What is the correct upgrade process? and finally What should you do after the upgrade is complete?

Understanding Google Cloud Platform: Architecture

White Paper | Nov. 20, 2017

Discuss the available infrastructure components of Google Cloud Platform and how they provide a powerful and flexible foundation on which to build your applications.

10 Security Concerns for Cloud Computing

White Paper | March 11, 2010

Before implementing Cloud Computing, it's important to consider the security - learn the risks & benefits to be sure it is the right solution for you.

How to Build a VMware vSphere 6.x Home Lab

White Paper | Dec. 12, 2017

Learn how to build a home lab for VMware vSphere 6.x to reproduce the training environment and run course labs.

Building, Installing, and Configuring a RADIUS Server

White Paper | Feb. 24, 2016

Learn the commands, settings and products you need to set up a RADIUS server for authentication, authorization and accounting services.

Five Secrets for Successfully Virtualizing Desktops

White Paper | April 04, 2012

Planning and implementing the virtualization of desktops is a challenge, but the result can be cost savings, greater productivity, and a happier work force that has the flexibility to work when, where, and with what devices they wish to use.

Introducing Amazon RDS for Aurora

White Paper | Feb. 27, 2015

Learn how Amazon Aurora can enable powerful, massively scalable relational databases in Amazon's cloud environment.

Is Network Functions Virtualization (NFV) Moving Closer to Reality?

White Paper | July 23, 2014

Discover the prospects of Network Functions Virtualization (NFV) as it evolves from a hardware-centric approach to a software-driven model. This paper also examines the future market implications and how NFV can help organizations to achieve their goals.

Seven Security Myths of Windows 7

White Paper | May 10, 2012

Network & computer security are like an onion, they have multiple layers. Good security begins with understanding what you can do to keep your systems safe