environments

Results 851 - 875 of 1225Sort Results By: Published Date | Title | Company Name
Published By: Kaseya     Published Date: Aug 25, 2014
Although providing significant business benefits, recent technological advances in mobility, cloud computing and big data have also dramatically complicated the task of managing IT resources. Mitigating the challenges associated with these technologies allows IT organizations to satisfy existing SLAs and leverage technology to support innovative new services which are designed to improve productivity, collaboration and customer satisfaction. Download now to learn about Kaseya's solutions!
Tags : 
kaseya, hybrid it, business, big data, cloud, slas, technology
    
Kaseya
Published By: Tripp Lite     Published Date: May 17, 2016
As wattages increase in high-density server applications, providing redundant power becomes more challenging and costly. Traditionally, the most practical solution for distributing redundant power to 208V server racks above 5 kW has been to connect dual 3-phase rack PDUs to dual power supplies in each server. Although this approach is reliable, there is a better way. Tripp Lite has developed a patent-pending high-capacity 3-phase rack ATS specifically designed to deliver efficient, reliable redundant power to high-density clustered server environments. This White Paper will: • Explain the redundancy challenges for high-density server racks • Compare traditional dual PDU and 3-phase rack ATS redundancy setups • Outline the benefits of using a Tripp Lite 3-phase rack ATS
Tags : 
server, applications, wattage, power, high density, ats, pdu, supplies
    
Tripp Lite
Published By: Hewlett-Packard     Published Date: Jul 24, 2013
Isolating application problems can be challenging in highly virtualized or cloud environments. This paper offers a roadmap to optimize application performance management with a pragmatic, phased approach that goes beyond monitoring and focuses on support for composite applications, SOA, and ERP applications.
Tags : 
application performance, apps, soa, erp, applications, cloud
    
Hewlett-Packard
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch
    
Lumension
Published By: Dell Software     Published Date: Apr 29, 2015
Leverage integration platform as a service (iPaaS), and capitalize on the speed, agility and economics of the cloud to increase the value of your hybrid IT investment. Read the white paper to learn how.
Tags : 
integration platform, ipaas, hybrid it environments, agility and economics, hybrid it investment
    
Dell Software
Published By: Globalscape     Published Date: Jul 31, 2014
Downtime happens and often at the worst time possible. Organizations experiencing downtime face direct and indirect costs from the loss of critical systems. This whitepaper discusses a Globalscape survey of 283 IT professionals and end users revealing the frequency of unplanned downtime, the effects on organizations, including average costs, and what IT administrators can do to minimize core system failure.
Tags : 
globalscape, downtime, productivity, it environments, critical systems, mission-critical systems, data loss prevention, security
    
Globalscape
Published By: HP Enterprise Services     Published Date: Apr 02, 2014
A video explaining how high-end replication and fail over solutions used to be economical only for stock exchanges and other similar environments, but not anymore. Find out how HP can help you cut recovery time and data loss with a cloud-based disaster recovery solution that is less than you would think.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: HP Enterprise Services     Published Date: Apr 02, 2014
This new disaster-recovery service recovers traditional IT environments to the cloud, reducing recovery time by 90% and data loss by 99% for about the same price you may have paid a few years ago.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: Success Factors     Published Date: Aug 19, 2014
In today’s demanding corporate environment, businesses are struggling to boost employee engagement. It is a strategic imperative but no small task given the severity of the problem. According to Gallup Inc.’s 2013 State of the Global Workplace report, only 13 percent of employees say they are engaged at work. Astoundingly, actively disengaged workers continue to outnumber engaged employees at a rate of nearly two to one.
Tags : 
successfactors, social collaboration, employee engagement, corporate environments, disengaged workers
    
Success Factors
Published By: Polycom     Published Date: Sep 24, 2014
Dynamic work environments are made-up of people on the move and virtual teams across different time zones. This makes it challenging to access an expert or to secure information. You need a communication solution that anchors fast-moving teams and enables communication from any device, anywhere; and communication tools that integrate with applications you use daily that are managed through a single interface to streamline deployment and speed your return on investment (ROI). Polycom and Microsoft® deliver a complete and interoperable end-to-end unified communications (UC) solution for voice, video, conferencing and collaboration and connect people from any device, and from any location.
Tags : 
solutions, environments, challenging, communication, deployment, roi, secure, information
    
Polycom
Published By: Nutanix     Published Date: Oct 01, 2014
This webinar will help enterprises understand the fundamentals of web-scale IT and how other companies are using web-scale principles to build private cloud-like environments.
Tags : 
nutanix, cloud, convergence, hyperconvergence, virtualization, web scale, it scale
    
Nutanix
Published By: Actiance, Inc.     Published Date: Nov 04, 2014
The native archiving capabilities in Microsoft Exchange 2013 are useful and represent a reasonable evolution of the archiving features and functions that were initially offered in Exchange 2010. However, for many regulated companies or those subject to a lot of litigation, the native archiving capabilities of Microsoft Exchange are not enough. They need to be supplemented with third-party archiving tools. Download now and learn more!
Tags : 
actiance, third party archiving, microsoft exchange environments, litigation, microsoft exchange 2013
    
Actiance, Inc.
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model
    
BubblewrApp
Published By: NetApp     Published Date: Dec 05, 2016
"All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all-flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale-out solutions have emerged that are designed to power the new cloud services of the future. The book examines various elements of all-flash storage: how it evolved, and why you should now consider it for all of your primary applications. You get acquainted with the NetApp portfolio of all-flash storage solutions and learn how each is designed to meet the needs of a specific type of application environment. You’ll also learn five strategies for making smart decisions about all-flash arrays for your next storage project. In that classic Dummies style, you’ll walk away with useful tips on how to select and deploy all-flash
Tags : 
netapp, database performance, flash storage, storage for dummies, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Dec 05, 2016
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
    
Gigaom
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Deploying virtual desktops and applications can be a rigorous process if organizations are not using the appropriate tools. Even amongst the best run IT organizations, setting up a complete VDI environment can take several days and sometimes weeks to install and configure. This leads to long maintenance windows and a lot of time needs to be set aside to design and scale the environments equaling higher costs in the long run. Download this solution brief to discover a new approach to building, delivering and managing virtual workspaces.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 09, 2016
To streamline the process of maintaining desktop environments, many IT managers are turning to mobile-cloud first approaches to application and desktop delivery. And if your business is in a similar transition, due to trends in BYOD, changing application delivery models, and worker mobility, your end-user computing environments could be becoming overly complex. To combat this rising complexity, you need to consider implementing hybrid consumption models that work at scale and address security threats. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Tags : 
    
VMware AirWatch
Published By: Rackspace     Published Date: Mar 08, 2016
This white paper focuses specifically on Microsoft’s approach to managing user demands and security concerns, featuring Office 365 and Azure.
Tags : 
rackspace, office 365, microsoft azure, on premise environments, security, hybrid
    
Rackspace
Published By: Rackspace     Published Date: Mar 08, 2016
The cloud has become mainstream. Businesses are no longer asking “Should we move to the cloud?” but wondering “When should we move?” Furthermore, hybrid clouds are not new, and some of the foundational elements of hybrid cloud creation, operation and maintenance are rooted in decades-old traditional data center technologies. This whitepaper will: •Examine the concepts of hybrid cloud environments. •Discuss the potential advantages of using hybrid cloud technologies. •Look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing. Download it now.
Tags : 
hybrid cloud, cloud solutions, microsoft azure, storage, business technology
    
Rackspace
Published By: IBM     Published Date: Jun 13, 2016
Companies are always looking for ways to determine just how effective and capable candidates can be in the workplace before they start. On paper, candidates have indicated that they can code in Python and Java or can resolve any customer service problem, but how do their skill sets compare with internal success standards, let alone everyday coding or service expectations? That’s where pre-hire assessments can be so valuable. They provide extensive insights into candidates’ skill sets, strengths, struggles, ideal working environments, and more. Top companies understand just how worthwhile such a resource is for making informed hiring decisions. In fact, Best-in-Class organizations are 45% more likely than All Others to use pre-hire assessments as part of the hiring process. Greater insights about candidates can be a game changer for the future success of any company. While there isn’t a one-size-fits-all pre-hire assessment approach to fit in with every company’s talent acquisition pr
Tags : 
ibm, aberdeen, pre-hire assessments, talent acquisition
    
IBM
Published By: IBM     Published Date: Mar 28, 2016
Smart organizations are consistently looking for ways to determine just how effective and capable candidates can be in the workplace. Sure, these candidates have said they can solve this algorithm or resolve that customer problem, but how do they stack up with internal success standards? That's why pre-hire assessments are valuable - they provide extensive insights into candidates' skill sets, pain points, ideal working environments, and more. Such information can then be used to make more informed hiring decisions that can be a game changer for the future success of any company.
Tags : 
ibm, recruiting, talent acquisition, pre-hire assessments, aberdeen group
    
IBM
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Start   Previous    28 29 30 31 32 33 34 35 36 37 38 39 40 41 42    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.