environments

Results 1126 - 1150 of 1233Sort Results By: Published Date | Title | Company Name
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: NetApp     Published Date: Feb 22, 2010
This paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : 
netapp, san environment, data storage infrastructure, utilization, multiprotocol unified storage, data reduction, storage virtualization, backup
    
NetApp
Published By: NetApp     Published Date: Feb 22, 2010
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, storage efficiency, microsoft application environment, exchange, sql server, sharepoint, storage management, tco
    
NetApp
Published By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : 
usb, flash drive, mobile security, pii, personal information, malware, government information security
    
Lumension
Published By: Tripwire     Published Date: Dec 16, 2009
Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.
Tags : 
tripwire, file integrity monitor, compliance, security, configuration assessment, configuration control, virtual and physical infrastructure
    
Tripwire
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability
    
Vision Solutions
Published By: NetApp     Published Date: Dec 01, 2009
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, esg, storage efficiency, microsoft application environments, xchange, sql server, sharepoint, storage management
    
NetApp
Published By: BMC ESM     Published Date: Nov 06, 2009
Join BMC and learn how IT organizations have addressed these challenges, smoothly integrating new virtualized environments with their existing IT processes, tools, and staff. You'll learn about the major challenges that IT organizations face when embracing virtualization, and how BMC's complete lifecycle solutions have helped customers achieve reliable and cost-effective results.
Tags : 
bmc esm, virtual lifecycle management, virtualization
    
BMC ESM
Published By: VM Ware     Published Date: Nov 04, 2009
This Taneja Group Solution Profile identifies the data protection optimizations available in the VMware vSphere environment.
Tags : 
vmware, data protection, vsphere, server virtualization, smb, disaster recovery
    
VM Ware
Published By: F5 Networks Inc     Published Date: Nov 03, 2009
How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI.
Tags : 
roi, application delivery controllers, virtualization, consolidation, ssl, server offload
    
F5 Networks Inc
Published By: NetApp     Published Date: Nov 01, 2009
This ESG paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : 
netapp, esg, storage efficiency, san environments, data storage infrastructure, data center, multiprotocol unified storage, data reduction
    
NetApp
Published By: EMC Backup & Recovery Solutions     Published Date: Oct 16, 2009
This data sheet describes how EMC Avamar backup and recovery software provides fast, efficient data protection for VMware environments. It explains Avamar support for deduplicated guest- and image-level daily full backups; and flexible Avamar server deployment options.
Tags : 
emc, data domain, efficiency, api, vmware, server consolidation, servers, data integrity
    
EMC Backup & Recovery Solutions
Published By: IBM     Published Date: Oct 13, 2009
To be more competitive, small and medium suppliers are increasingly using Computer Aid Engineering (CAE) solutions. Download this white paper to see how IBM Cluster Solutions, powered by Intel Xeon 5500 Series maximizes the total cost of ownership for CAE environments and extend innovation in virtual products for manufactures and suppliers alike.
Tags : 
ibm cluster solutions, intel, computer aid engineering, cae, xeon processor 5500, computer aided design, cad, independent software vendors
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss
    
IBM
Published By: BMC Control M     Published Date: Sep 15, 2009
This paper, from industry analyst firm Enterprise Management Associates, explores how workload automation can help IT reduce outages, consolidate vendors, improve integration, and cut costs. Learn more. Download the white paper, "IT Automation: Going Beyond the Obvious to Find Real Cost Savings."
Tags : 
bmc control-m, enterprise management associates, workload automation, wla, peoplesoft, sap, oracle, as/400
    
BMC Control M
Published By: BMC ESM     Published Date: Sep 15, 2009
Many CIOs are looking to implement the power of Cloud computing, but they don't know where to begin. How do you take full advantage of this technology and implement the correct strategy for your environment? What services should you offer via the Cloud? Read the paper, "Cloud Computing In Perspective," by BMC Software Chief Technology Officer Kia Behnia.
Tags : 
bmc esm, cio, cloud computing in perspective, itil, cloud computing environments, public, private, hybrid
    
BMC ESM
Published By: Alacritech     Published Date: Aug 21, 2009
Growth challenges in Microsoft Exchange environments can be solved with the deployment of iSCSI storage. Microsoft favors block storage such as iSCSI for Exchange deployments. Attaching iSCSI storage to a network provides the server with headroom for adding Exchange users, since the storage can grow without being restrained by the server's ability to add storage.
Tags : 
microsoft exchange, iscsi, iscsi storage, storage, windows server, windows exchange server, alacritech
    
Alacritech
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus
    
Internet Security Systems
Published By: Meru Networks     Published Date: Aug 21, 2009
Universities and colleges are among the most aggressive adopters of Wi-Fi technology. The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher education campuses fertile ground for wireless LANs.
Tags : 
university, college, wi-fi, wifi, wlan, education, institution, wireless lan
    
Meru Networks
Published By: RuleStream     Published Date: Aug 21, 2009
Manufacturers of products with highly configurable and ever-changing customer requirements must confront specific challenges and operate far differently than traditional product development environments.
Tags : 
business process automation, business process management, bpm, bpa, scm, enterprise software, productivity, supply chain management
    
RuleStream
Published By: SWsoft     Published Date: Aug 21, 2009
This joint Intel white paper explores how to address virtualization in an environment with high I/O. The paper includes a technology overview, network concerns and explains how Virtuozzo and Intel are well suited for the high I/O environment.
Tags : 
virtualization, network management, i/o, input/output, high i/o, intel, servers, server virtualization
    
SWsoft
Published By: Tridion     Published Date: Aug 21, 2009
This White Paper explains how Tridion's Web Content Management solution and the technological choices made by Tridion can help organizations achieve their business goals. It is intended for Systems Architects and IT Managers who need to assess the impact of incorporating Tridion into their existing environments.
Tags : 
alignment, business management, business goals, goal-oriented, content management, cms, tridion
    
Tridion
Published By: x1     Published Date: Aug 21, 2009
This paper explains how X1 Enterprise Edition security integrates seamlessly with an existing Microsoft network installation. It describes how X1 security features are configured and deployed, including web server security. It ends by showing how X1 and Microsoft Windows security layers work together at runtime.
Tags : 
data security, web server security, web service security, windows security, x1 security, enterprise security, security software
    
x1
Start   Previous    36 37 38 39 40 41 42 43 44 45 46 47 48 49 50    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.