server technology

Results 101 - 125 of 166Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: ThreatMetrix     Published Date: Jan 21, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably—while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers
    
ThreatMetrix
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers
    
ThreatMetrix.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
In this part II of Enhancing Server And Desktop Virtualization With SSD, Storage Switzerland focuses on the next challenge of integrating SSD into a virtual server or desktop infrastructure and effectively using the technology in this environment.
Tags : 
integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization, architecture
    
Texas Memory Systems
Published By: IBM     Published Date: Dec 12, 2012
This paper describes the way a number of organizations have used IBM’s high-end server and software technology to build private cloud environments that have helped them save money, improve agility and more. Read more!
Tags : 
private cloud, ibm, low cost, cost efficient, foundation, high performance
    
IBM
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The introduction of e-mail and its exponential expansion into every aspect of business life presented a significant challenge to the fax industry and for some observers it was a foregone conclusion that fax was destined for a rapid demise. It is interesting to note, therefore, that fax has actually continued on a steady growth path that is predicted to continue well into the future.
Tags : 
kudos, lane, fax, foip, fax over internet protocol, migration strategy, network resources, multifunctional peripherals
    
Lane Telecommunications
Published By: Dell Software     Published Date: Jul 07, 2013
In this new white paper, learn how SQL Server’s event notifications and extended events help prevent performance challenges. See how you can ensure maximum SQL Server performance, and solve problems before they become problems! Read the white paper now.
Tags : 
sql, server performance issues, solve problems, event notifications, extended events, solve challenges, technology, database management
    
Dell Software
Published By: Dell Software     Published Date: Jul 07, 2013
In this new white paper, discover the top 10 tips to get the most from SQL Server. Learn the things you need to know about SQL Server performance, and how these optimization tricks and strategies will help kick mediocre SQL performance to new heights. Get the paper today.
Tags : 
sql, server performance issues, solve problems, tips, best practices, solve challenges, technology, database management
    
Dell Software
Published By: Dell Software     Published Date: Aug 09, 2013
In this new white paper, learn how SQL Server’s event notifications and extended events help prevent performance challenges. See how you can ensure maximum SQL Server performance, and solve problems before they become problems! Read the white paper now.
Tags : 
sql, server performance issues, solve problems, event notifications, extended events, solve challenges, technology, database management
    
Dell Software
Published By: Dell Software     Published Date: Aug 09, 2013
In this white paper, learn more about SCOM’s limitations when it comes to really understanding and managing database performance. Then, see how you can go well beyond basic monitoring, and how to quickly address – and correct – SQL Server performance issues.
Tags : 
sql, server performance, value, server, technology, strategy, dell
    
Dell Software
Published By: Dell Software     Published Date: Aug 22, 2013
Are the costs for supporting and managing SQL Server spiraling out of control? In this white paper, learn to get the most out of existing assets and how to efficiently maximize database capacity – now, and in the future. Read it today.
Tags : 
database. sql server, efficiency, technology, platform
    
Dell Software
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication
    
Arcserve
Published By: VMware     Published Date: Mar 08, 2012
The benefits of server virtualization extend far beyond infrastructure savings and server consolidation. An emerging technology trend is for IT managers worldwide to deploy virtualization to keep applications online and protect their businesses.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery
    
VMware
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
Tape's evolving data storage role - Balancing Performance, Availability, Capacity, Energy for long-term data protection and retention
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
Need a Long-Term Archive Solution? Quantum Adds LTO-5 to Scalar Tape Libraries. Find our more in this whitepaper!
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This white paper shows how upgrading to LTO-5 technology and consolidating storage onto fewer tapes enables organizations to achieve a 5yr ROI and a 17-month payback period.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Netapp     Published Date: Apr 15, 2013
Flash Storage For Dummies explores the many uses and benefits of flash storage technology in the enterprise. From server cache and back-end storage cache to hybrid and all flash arrays, flash technology improves performance and increases reliability in storage infrastructures. It also reduces energy and real-estate costs in the data center.
Tags : 
flash storage, enterprise, performance, storage infrastructure, infrastructure, roi, cost saving, data center
    
Netapp
Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud
    
Amazon Web Services, Inc
Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.
Published By: IBM     Published Date: Apr 04, 2013
Virtualization has moved to the forefront of many organizations’ IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
powervm, x86 based virtualization, performance, independent servers, association costs, it costs
    
IBM
Published By: IBM     Published Date: Apr 26, 2013
Virtualization continues to lead a sea change for enterprise-scale data centers and cloud environments, delivering well-established benefits such as cost savings, reduced physical space and power requirements, simpler and more flexible testing environments, faster server provisioning, and improved return on investment. Yet for many organizations, one of virtualization’s greatest benefits is only now being realized in the form of highly portable and flexible virtual images. Natural extensions of virtualization technology, virtual images help organizations achieve even greater efficiencies and cost savings.
Tags : 
control, virtual, lifecylce, enterprise, data centers, cloud environments, virtualization
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.