machines

Results 101 - 125 of 229Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Azure     Published Date: Apr 05, 2018
You’re running a lot of your business on Windows Server today— mission-critical apps, Active Directory, Domain Name Servers, not to mention virtual machines and storage. For more than 20 years, in fact, Windows Server has been the operating system of choice for enterprise workloads.
Tags : 
    
Microsoft Azure
Published By: VMware Dell     Published Date: Jun 05, 2008
The First American Corporation is America’s largest provider of business information. Their numerous acquisitions and diverse lines of business meant that First American had multiple datacenters dispersed throughout the country. They turned to VMware virtualization technology to consolidate facilities. They standardized on VMware technology and avoided purchasing 700 physical machines.
Tags : 
server consolidation, server containment, desktop manageability, vmware infrastructure, vmware, green it, green
    
VMware Dell
Published By: HP and AMD     Published Date: Aug 10, 2012
IDG Tech Dossier focuses on virtualization with a spotlight on the new HP ProLiant DL385p and BL465c Gen8 servers with AMD Opteron 6200 Series Processors.
Tags : 
intel, idg, dossier, amd, proliant
    
HP and AMD
Published By: CA Technologies EMEA     Published Date: May 29, 2018
In time, containers will be the means by which all workloads are deployed on server platforms. It makes too much sense. Constructing fake machines around virtual workloads, just to make them portable across servers, was not the architecturally rational thing to do. It was the expedient thing to do, because cloud platforms had not yet evolved to where they needed to be. This book presents a snapshot of the emerging approaches to container monitoring and distributed systems management that engineers and their customers are building together.
Tags : 
    
CA Technologies EMEA
Published By: Brother     Published Date: Nov 23, 2015
This information guide, brought to you by Brother International Corporation, a leading maker of printers and multifunction machines, will outline some of the most basic, but most important questions you should ask yourself when selecting your printer. If you take time to consider the following topics, you’re much more likely to find the best printer for your business!
Tags : 
printer, office technology, hard copy documentation, paper document management
    
Brother
Published By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : 
absolute, technical support, healthcare organizations, operating environment
    
Absolute Software
Published By: VMware     Published Date: Feb 26, 2009
VMware Virtual Infrastructure and CA Recovery Management (CA ARCserve Backup and CA Xosoft products) team up to deliver higher availability and risk-resistance for business-critical information and applications, while lowering management and operational costs and complexity.
Tags : 
vmware, it infrastructure, virtual infrastructure, ca recovery management, business critical information, business continuity, disaster recovery, high availability, operational costs, virtual infrastructure, multi-processor support, virtual machines, disk-to-disk-to-tape, multiple operating systems, value-enhancing services
    
VMware
Published By: VMware     Published Date: Feb 26, 2009
CA ARCserve® Backup, CA XOsoft™ Replication, and CA XOsoft™ High Availability provide several key features that enable you to both protect virtualized servers and benefit from server virtualization in your overall recovery management strategy
Tags : 
ca arcserve backup, ca xosoft replication, ca xosoft high availability, virtualization support, recovery management strategy, virtual machines, vms, vmware consolidated backup (vcb), protecting virtual machines, backup agent, esx server, physical-to-virtual, p2v, disaster recovery hosts, stand-by servers, vss snapshots
    
VMware
Published By: PC Mall     Published Date: Mar 03, 2012
As processor, memory, and disk technology have improved, HP ProLiant G7 servers have become ideal platforms for consolidating applications with virtual machines. Find out about HP 3G SATA hot plug solid state disks!
Tags : 
servers, server, hp servers, hp server, proliant, database
    
PC Mall
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server Virtual Edition is the next generation of the Acronis True Image family of products, engineered specifically for virtualized environments. Acronis Backup & Recovery 10 Advanced Server Virtual Edition enables organizations of all sizes to extend the cost-saving benefits of virtualization by protecting virtual machines running on a single physical host for a low, fixed price.
Tags : 
acronis, backup and recovery, 10 advanced server virtual edition, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: ForeScout     Published Date: Jan 24, 2013
In this case study, Vistaprint Taps ForeScout CounterACT for Endpoint Compliance. Obtain real-time visibility into the security posture of all devices on the network, including both physical and virtual machines, in order to manage compliance.
Tags : 
vistaprint, case study, counteract, endpoint compliance, real time visibility, physical and virtual machines
    
ForeScout
Published By: McAfee     Published Date: Feb 06, 2013
By building in comprehensive security measures at the design and architectural phase of data center build-outs, organizations can optimize business-critical service availability and minimize potential downtime.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center, virtual machines
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
High performance for modern data center network fabrics, scalable deployment, and integrated inspection for physical and virtual environments. Next generation network security for your next generation data center.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center, virtual machines
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Flexible, top-rated security and high performance for proactive protection across physical and virtual infrastructure.
Tags : 
hybrid data center, data center, data center security, virtualization, virtual data center, virtual machines, cloud computing, virtualized security, virtualization anti virus, hypervisors, virtual desktop security, virtual desktops
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
    
McAfee
Published By: Advizex     Published Date: Sep 25, 2013
The challenge of Big Data is more than a question of size; it’s about time to insight and action. With the exponential growth of unstructured data such as social media, video and the raw data generated by smartphones and other “intelligent” machines, businesses are buried under an avalanche of data that renders even best-effort analytics slow and sometimes unreliable. As many businesses are learning in this age of Big Data, it’s not just what you know, but when you know it and how much you trust it. Download this white paper and learn that with SAP HANA, companies can react intelligently at the speed of thought to capture new opportunities.
Tags : 
sap hana, sap, real time analytics, raw data, generation, analytics, big data, business intelligence, trusting big data, insight, action
    
Advizex
Published By: Cisco     Published Date: May 15, 2015
This guide will provide the steps necessary to configure a Microsoft Fast Track Small Implementation cloud built on EMC VSPEX, which is built on Cisco Unified Computing System and EMC VNXe technologies.
Tags : 
cloud computing, erp, productivity, applications, efficiency, virtual machines
    
Cisco
Published By: Red Hat     Published Date: May 05, 2015
It's time to manage all your VMware machines through 1 tool. Red Hat® CloudForms gives you visibility and control throughout your whole infrastructure—from individual VMware machines to your entire cloud and virtualization infrastructure. Download the technology brief to learn more.
Tags : 
redhat, cloud management, vmware environments, virtualization infrastructure, visibility
    
Red Hat
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data
    
LogRhythm
Published By: Datastax     Published Date: Apr 04, 2017
For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution.
Tags : 
database, cloud, applications, endpoint, datastax
    
Datastax
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Infosys     Published Date: May 21, 2018
Machines often form the backbone of businesses. Machinery breakdowns are extremely costly and there's never really a good time for these breakdowns. IN response to this challenge, companies have explored a variety of strategies - even preventive maintenance programs - to increase machine uptime. But every strategy - even a combination of strategies - has had only limited success.
Tags : 
strategy, business, machines, maintenance
    
Infosys
Published By: Infosys     Published Date: May 21, 2018
Commercial airplanes are expensive and complicated machines - which means two things. First, airlines have to get the best possible return from their investment by using them as much as possible. Long-haul flights can keep an airplane in the air for up to 20 hours every day, earning money for the airline with every passing minute. However, the planes makes no money on the ground, so airlines have to maintain and service the aircraft efficiently, and get it back in the air with a new payload of passengers as quickly as possible. Therefore, the MRO (Maintenance, Repair, and Overhaul) is a critical and complex part of an airline's business and one of the key factors in making the business successful. Aircraft are the geese that lay golden eggs for the airline. So the airlines need to look after them.
Tags : 
airplane, passengers, payload, maintenance, repair, overhaul, business
    
Infosys
Published By: Acronis     Published Date: Dec 28, 2011
Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis
    
Acronis
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.