cache

Results 26 - 34 of 34Sort Results By: Published Date | Title | Company Name
Published By: IBM Corporation     Published Date: Sep 20, 2010
The IBM WebSphere eXtreme Scale product provides a high-performance, scalable cache framework. This chapter is an introduction to WebSphere eXtreme Scale.
Tags : 
ibm caching and cloud, websphere extreme scale, scalable cache framework, query engine, network deployment
    
IBM Corporation
Published By: IronStratus     Published Date: Apr 10, 2012
Passwords are the keys to your corporate apps in the cloud and they're managed ad-hoc and insecurely in spreadsheets, sticky notes & browser cache. Signup for a free IronStratus account and start securely managing access to your cloud apps in minutes
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption, soo, login, identity management, identity and access management, access, access management
    
IronStratus
Published By: Netapp     Published Date: Apr 15, 2013
Flash Storage For Dummies explores the many uses and benefits of flash storage technology in the enterprise. From server cache and back-end storage cache to hybrid and all flash arrays, flash technology improves performance and increases reliability in storage infrastructures. It also reduces energy and real-estate costs in the data center.
Tags : 
flash storage, enterprise, performance, storage infrastructure, infrastructure, roi, cost saving, data center, data center infrastructure
    
Netapp
Published By: Dyn     Published Date: Jan 14, 2015
Whether you are a seasoned expert or just beginning to look into how DNS can improve the performance of your businesses’ services, let this quick guide to DNS terminology be your comprehensive one-stop shop.
Tags : 
dns, domain name system, ip addresses, terminology, denial of service, query, cache, dns client
    
Dyn
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat
Published By: Hitachi ID     Published Date: Jun 09, 2011
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
Tags : 
password reset, authentication management, proliferation of passwords, locked-out users, mobile users and cached passwords, full disk encryption, user enrollment and adoption, privileged accounts and passwords
    
Hitachi ID
Published By: NetApp     Published Date: Dec 08, 2014
Flash Storage for Dummies, NetApp 2nd Special Edition, describes the many uses and benefits of flash storage technology in the enterprise. From flash-accelerated storage to all-flash arrays, flash technology improves performance and increases reliability in storage infrastructures.
Tags : 
flash, netapp, cache, flash pool, fas, ef-series
    
NetApp
Published By: NetApp     Published Date: Dec 08, 2014
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate.
Tags : 
netapp, hybrid, flash pool, ssd, hdd, iops, oltp, demartek
    
NetApp
Published By: Akamai Technologies     Published Date: Dec 05, 2018
DDoS attack size doubled in early 2018 after attackers discovered and employed a new, massive DDoS reflection and amplification method with the potential to multiply their attack resources by a factor of 500K. The attack vector, called memcached UDP reflection, uses resources freely exposed on the internet — no malware or botnet required.
Tags : 
    
Akamai Technologies
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.