machines

Results 201 - 225 of 229Sort Results By: Published Date | Title | Company Name
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: Schneider Electric     Published Date: May 03, 2018
Before creating new technologies, we must think about how to create the right values to be also able to sell it. All the technology that is required for “Industry 4.0” is available today already, so in fact Industry 4.0 can be seen more than an innovation driver for new businesses that are not exploited today, than an innovation driver for technology. If these existing technologies are assembled properly together and combined with the right business models, there is really good chance to profit from Industry 4.0. This white paper looks into the ways one can profit from Industry 4.0 by differentiating through new business models.
Tags : 
smart machines, industry 4.0, smart factory, iiot, opc ua, data, analytics, machine services, revenue models, business models, industrial automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 03, 2018
While many OEMs are aware of new technologies to make machines more energy-efficient, they are reluctant to make changes due to the perception that it will make their machines more expensive to sell. The constraints of cost reduction, usage of resources and energy reduction are becoming key drivers in the industry as consumers require manufacturers to be more “green”. This paper demonstrates how incorporating sustainable design can add value to their machines and differentiate OEMs from the competition.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 03, 2018
Wireless technology is increasingly used in machine safety applications. New solutions introduce mobility and offer higher levels of flexibility and safety for plant floor operators. This eBook explores how modern wireless implementations can increase user safety and mobility, reduce installation costs, and boost productivity.
Tags : 
safety, wireless, efficiency, smart machines, machine safety, productivity, security, cybersecurity, industrial automation, plant, factory
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 03, 2018
The challenges facing industrial companies grow more daunting by the day. Globalization, energy markets that change in real time, variations in materials and prices, aging of the industrial workforce, inability to attract the next generation of Talent, and difficult regulatory pressures have all contributed to an extremely stressful industrial business environment. Fortunately, the right automation system can now offer cutting-edge packaging solutions for meeting at least three of these challenges.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation, energy, robotics
    
Schneider Electric
Published By: XOsoft     Published Date: Aug 21, 2009
Achieve significant cost savings through consolidation of disaster recovery servers by combining the award-winning disaster protection of XOsoft's WANSync with the latest virtual server technologies from Microsoft and EMC. Consolidating disaster recovery servers on virtual machines can yield both reduced hardware costs and significantly lessened management burden.
Tags : 
disaster plan, disaster recovery, virtual machines, servers, network management, it management, data protection, xosoft
    
XOsoft
Published By: AT&T     Published Date: Jun 30, 2008
In 2000, ICEE began to scrutinize the inefficiencies they found in the ICEE machine repair process. With so many field technicians servicing so many machines, streamlining the process would be no small feat. The company's existing paper-based system required that field technicians fill out paper work orders at the end of each job. One copy was given to the customer, one was filed at the regional office, and another was sent to headquarters in Ontario. This left a long, inefficient and error-prone paper trail.
Tags : 
wireless, field technicians, repair, mobile service, service, on-site repair, on-site service, wireless data systems, field service, field service automation, at&t, att
    
AT&T
Published By: VMware Dell     Published Date: Sep 29, 2008
VMware virtual machines are hardware-independent so any physical server can serve as a recovery target for any virtual machine. Organizations can significantly reduce the cost of hardware for disaster recovery by repurposing underutilized existing servers for recovery targets and disaster recovery testing. VMware Infrastructure also simplifies and accelerates recovery, helping IT organizations meet their time-to-recovery targets.
Tags : 
vmware, dell, disaster recovery, vmotion, iscsi, sans, equallogic, data protection
    
VMware Dell
Published By: SAS     Published Date: Mar 06, 2018
Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
    
SAS
Published By: HP and Intel® Xeon® processors     Published Date: Nov 30, 2011
Hear how ESG defines "tier-1" storage in the modern IT world and in the data centers and services that support it.
Tags : 
storage, data center, environment, mainframes, servers, complexity, virtual machines, cloud, infrastructure, storage, tier-1, tier-1 storage
    
HP and Intel® Xeon® processors
Published By: nick.morgan     Published Date: Apr 13, 2011
Reducing the security risks organisations are facing by shifting IT operation to the cloud.
Tags : 
cloud environments, virtual environments, security implications, business benefits, virtual machines, organisations, information, data loss, data interception
    
nick.morgan
Published By: Dell Storage     Published Date: Apr 21, 2011
The Storage Center SAN is a smart, virtual storage platform that speeds storage provisioning for virtual machines, minimizes disk capacity, automates disaster recovery, fine-tunes data placement for virtual applications and provides a shared storage pool available to all VMs all the time. Watch this webcast to see why Dell Compellent storage is the perfect complement to VMware server environments. (39 mins)
Tags : 
dell compellent, webinar, virtual storage platform, vmware virtual servers, storage center san, disk capacity, disaster recovery
    
Dell Storage
Published By: Pixxa     Published Date: Jul 07, 2011
With the Pixxa iPhone/iPod Touch app you are able to manage and monitor your Cloud Virtual Machines in the palm of your hand!
Tags : 
pixxa, iphone, ipod, app, control, virtual machine
    
Pixxa
Published By: Esker     Published Date: Jul 15, 2013
Whether the number is a minority or a majority of total sales order volume, fax often represents the bulk of a company’s order management expenses. Fax orders typically require a separate processing environment made up of fax machines or, preferably, fax server software to capture orders and distribute them among CSRs who enter the information into ERP applications.
Tags : 
order processing, sales order processing, sales orders, order management order automation, edi, customer service, fax orders, email orders, sap order management, erp
    
Esker
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
Last year, Mac malware increased by 66% with a single, high-profile attack infecting over 600,000 machines. Malware authors are targeting unsuspecting Mac users and gaining access to organization's data. Still wondering whether Macs need protection? See what advice a senior strategic analyst at ESG has to share.
Tags : 
enterprise, mac security, cybercrime, malware, data, high-profile attack, infection
    
Symantec
Published By: IBM     Published Date: Jan 09, 2014
In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.
Tags : 
best practices, virtualized infrastructure, powerlinux, open source, virtualized infrastructure, hurwitz white, infrastructure page, source infrastructure, virtual machines, infrastructure services, ibm powerlinux
    
IBM
Published By: NetApp     Published Date: Jan 08, 2016
Download this case study to learn how NetApp solutions were able to back up most of King County’s data infrastructure, including 700 VMware virtual machines.
Tags : 
cloud computing, data protection, data infrastructure, purpose built appliances, pbas, cloud solution, netapp
    
NetApp
Published By: Dell EMC     Published Date: Dec 01, 2017
A common misconception about hyperconverged infrastructure (HCI) is that because data services are software-defined, the hardware doesn’t matter. It’s easy to see why—the software driving HCI solutions such as the Dell EMC XC Series (in this case, Nutanix software) is exceptional. It efficiently manages data and communications across a cluster of nodes and storage tiers, keeping the cluster and virtual machines (VMs) up and running, delivering optimal performance and availability. Software-defined infrastructure is changing the way data services are delivered, making companies more efficient and agile, and reducing costs. Download the study to learn more about the latest trends. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.