mmo

Results 51 - 75 of 1205Sort Results By: Published Date | Title | Company Name
Published By: Commvault     Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach. This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
Tags : 
storage, backup, recovery, best practices
    
Commvault
Published By: Cisco     Published Date: Jan 08, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities.
Tags : 
cisco, wan, design guide, dmvpn, qos
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
customer engagement, business practices, technology, design management
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
design guide, customer engagement, design management, system management, website/graphic design
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
For many of us, the term “smart city” conjures up images of sensors collecting data about everything from traffic patterns to energy use. It’s common for government leaders to think, “That’s not for us. We’re not there yet.” But if your organization is collecting data of any kind, you are in a position to use that data to create a smarter city for your citizens. Download this whitepaper for 10 examples of analytics being used to solve problems or simplify tasks for government organizations.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 17, 2018
The Internet of Things can bring big benefits. But what exactly is IoT, and how are different industries taking advantage of it? This TDWI e-book explores in detail what IoT and the Industrial IoT (IIoT) do for retailers, the automotive industry, state and local governments working with utilities firms, and the manufacturing industry. Common themes include connectedness, data-driven insights, predictive capabilities and transformation.
Tags : 
    
SAS
Published By: Cisco     Published Date: Jan 05, 2015
The need for high-throughput wireless access was especially acute at Ligonier Valley High School, where hundreds of students, especially those in math and science classrooms located in one wing of the building, vied for simultaneous wireless connectivity to applications such as Larson Math and Science and the ALEKS one-on-one instructional system. Whether in the math and science wing or other areas of the school, bandwidth-intensive streaming video, multicast within classrooms, is common.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
The demands on IT today are staggering. Most organizations depend on their data to drive everything from product development and sales to communications, operations, and innovation. As a result, IT departments are charged with finding a way to bring new applications online quickly, accommodate massive data growth and complex data analysis, and make data available 24 hours a day, around the world, on any device. The traditional way to deliver data services is with separate infrastructure silos for various applications, processes, and locations, resulting in continually escalating costs for infrastructure and management. These infrastructure silos make it difficult to respond quickly to business opportunities and threats, cause productivity-hindering delays when you need to scale, and drive up operational costs.
Tags : 
    
Cisco
Published By: Mobify     Published Date: Apr 17, 2015
Choosing the right mobile solution (and solution provider) is a complex undertaking – and asking the right questions is critical in helping you find your best fit. In order to determine your ideal mobile solution, it’s important to understand what your needs are, what a given solution offers and how the two might intersect. In this workbook, we’ve presented the most commonly referenced mobile solution criteria for retailers in 2015. For the purposes of this guide, we’ve defined mobile solution providers as companies that bring together a productized mobile technology platform with creative and strategy services that are focused on improving mobile metrics. You can use this criteria to validate different solution providers, and can download included template to customize it for your business’ unique needs.
Tags : 
mobile solutions, mobify, mobile solution criteria, mobile technology platforms, mobile metrics, emerging marketing, internet marketing, business intelligence
    
Mobify
Published By: NetApp     Published Date: Sep 04, 2018
By reading this report, we believe you’ll gain Gartner’s recommendations on five approaches to implementing hybrid cloud storage, including common use cases and the pros and cons of each approach.
Tags : 
    
NetApp
Published By: Lenovo and Intel     Published Date: Jan 19, 2017
Nowhere is technology more important than in healthcare, where the integrity of devices, systems, and infrastructure ultimately impacts patient lives. When evaluating existing technologies or considering investment in new solutions, there are a number of key factors healthcare entities must take into account. With this checklist, we’ll help you: ? Identify common demands ? Get an easy-to-use technology evaluation checklist ? See an example of how to apply new technology solutions
Tags : 
lenovo, healthcare, infrastructure
    
Lenovo and Intel
Published By: Oracle     Published Date: Oct 20, 2017
What do these market-defining trends have in common? · Analytics for all · Analytics as competitive differentiator · Internet of Things · Artificial intelligence/Machine learning/Cognitive computing · Real-time analytics/event management They all rely on data – timely, accurate data delivered within an insightful context – to deliver value. The question is: who in the enterprise is most qualified and prepared to help deliver on the vision and values of the data-driven enterprise? It’s going to take a special type of professional to deliver that value to enterprises. Organizations are seeking professionals to step forward and take the lead, provide guidance and lend expertise to move into the brave new world of digital. The move to digital and all that it entails – sophisticated data analytics, online customer engagement and digital process efficiency – requires, above all, the skills and knowledge associated with handling data and turning it into insights. The move to digital i
Tags : 
    
Oracle
Published By: AWS     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
Enterprises are moving to the cloud because it offers greater flexibility and lower cost. The first wave of cloud native and content apps are well on their way, but there's a new wave of traditional enterprise applications that enterprises are still struggling to move to the cloud. The Q&A walks you through the most common issues related to cloud storage—and how HPE Cloud Volumes put any remaining concerns to rest.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
"Multicloud Storage for Dummies consists of five short chapters that explore the following: - How the multicloud storage model aligns with modern business and IT initiatives - Common barriers to cloud adoption and how a multicloud storage model addresses them - How to build a multicloud data center - What to look for in multicloud storage services - Real-world multicloud use cases
Tags : 
    
Hewlett Packard Enterprise
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
    
DataStax
Published By: Adobe     Published Date: Mar 26, 2018
On the surface, the connection between fractals and programmatic advertising isn’t obvious, but right down to the melding of art and math, programmatic advertising has a lot in common with this unconventional geometry. And those similarities pave the way for some serious implications for the way you approach creative assets.
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: Dell EMC     Published Date: Mar 08, 2019
Digital transformation means many key parts of the business now depend on specific and often very demanding applications. The outcome of these applications can determine the health of the company. Running them on commodity PCs is a risky strategy. Workstations designed to tackle the most challenging workloads can help ensure a positive outcome. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
    
Preempt
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.