app data

Results 2226 - 2250 of 2599Sort Results By: Published Date | Title | Company Name
By: Schneider Electric     Published Date: Feb 06, 2018
The growth and importance of edge and cloud-based applications are driving the data center industry to rethink the optimum level of redundancy of physical infrastructure equipment. Read our recommendations for evaluating resiliency needs in White Paper 256: "Why Cloud Computing is Requiring Us to Rethink Resiliency at the Edge."
Tags : edge computing, data center, cloud computing, cloud based applications
     Schneider Electric
By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc présente une approche simple, supportée par des outils Web gratuits, permettant l’estimation de l’empreinte carbone d’un datacenter, quel que soit son emplacement à travers le monde.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Aug 15, 2017
The reference guide lays out for data center managers a step-by step approach to data center consolidation. By breaking down the process into clear and identifiable actions – all of which are covered in the sections below – a data center consolidation becomes much more manageable, and the odds of its success much higher.
Tags : assessment, strategical planning, design, commission, operation, additional resources, schneider electric
     Schneider Electric
By: Schneider Electric     Published Date: Aug 21, 2017
Data center migrations are often complex and risky. These best practices will help I&O leaders invest the appropriate amount of time and money into planning, execution and testing in order to protect the business and maximize the chances of a successful data center migration.
Tags : data center, data center management, best practices, data center migration
     Schneider Electric
By: Schneider Electric     Published Date: Oct 31, 2017
In considering the four principal options of data center modernization, keep in mind that each option need not be treated as a separate and distinct approach. Data center stakeholders may want to combine options in order to better accommodate a particular migration timeline. Or cautious executives may want to simply dabble with the outsourcing option by piloting only a few select applications while still maintaining a core corporate data center. The key critical success factor is the recognition that data center modernization is not a one-time fi x, but rather a critical piece of an ongoing strategy to better service customers.
Tags : modernization, data center, investment, cost effectiveness, business sense, outsourced model, resources
     Schneider Electric
By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
     Schneider Electric
By: Scribe Software     Published Date: Apr 16, 2012
The What, Why & How of CRM Integration This report contains insights from C-level executives, business analysts and IT engineers, and systems integrators and consultants who design and implement data integration for their enterprise clients.
Tags : scribe, crm, integration, data integration, public cloud, private cloud, cloud, integration
     Scribe Software
By: ScriptLogic     Published Date: Jan 11, 2012
Discover how the software helps achieve compliance with HIPAA standards, by giving IT administrators the power and control they need.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
This paper outlines the potential cost and energy savings available when effective power management is exercised across the client computers.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
In this whitepaper, we will discuss the challenges of managing delegation with native tools and how you can end the delegation nightmare with Active Administrator from ScriptLogic.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to have a fluid help desk to work flow and how to resolve quickly and correctly, users IT issues. Read on.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to manage permissions across hundreds of servers. Learn more and read on.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: ScriptLogic     Published Date: Jan 11, 2012
This white paper looks at what really needs to be done and how to enable your organization to be license efficient.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: SDL     Published Date: Sep 20, 2019
Component Content Management: A New Paradigm in Intelligent Content Services While technology has changed the world, the way that companies manage information has inherently stayed the same. The advent of near-ubiquitous connectivity among applications and machines has resulted in a data deluge that will fundamentally alter the landscape of content management. From mobile devices to intelligent machines, the volume and sophistication of data have surpassed the ability of humans to manage it with outdated methods of collection, processing, storage, and analysis. The opportunity afforded by the advent of artificial intelligence (AI) has stimulated the market to search for a better way to capture, classify, and analyze this data in its journey to digital transformation (DX). The paradigm of document-based information management has proven to be a challenge in finding, reusing, protecting, and extracting value from data in real time. Legacy systems may struggle with fragmented information
Tags : 
     SDL
By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy
     SDL Web Content Management Solutions
By: Seagate     Published Date: Jan 27, 2015
This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution, Seagate ClusterStor™ Secure Data Appliance, which is designed to address government and business enterprise need for collaborative and secure information sharing within a Multi-Level Security (MLS) framework at Big Data and HPC Scale.
Tags : 
     Seagate
By: Seagate     Published Date: Sep 30, 2015
Although high-performance computing (HPC) often stands apart from a typical IT infrastructure—it uses highly specialized scale-out compute, networking and storage resources—it shares with mainstream IT the ability to push data center capacity to the breaking point. Much of this is due to data center inefficiencies caused by HPC storage growth. The Seagate® ClusterStor™ approach to scale-out HPC storage can significantly improve data center efficiency. No other vendor solution offers the same advantages.
Tags : 
     Seagate
By: Seagate Technology     Published Date: Apr 14, 2015
You can have all the latest features of iOS 8 on your iPhone, but if you’re still using an iPhone 4s, you won’t be able to take advantage of most of them. This should serve as an appropriate metaphor for this audience because when it comes to data storage, many of today’s storage solutions have been around since the 1970s…as in the the world of mobile, today’s data storage needs are revealing just how limited those older solutions are. Even if a company has updated almost everything in its IT ecosystem, it takes only one unchanged layer to prevent them from realizing the benefits of the latest technology. With petabyte scale, reliability, performance, and efficiency the order of the day we are fast approaching that point with storage. There is without question a need to change in the current storage paradigm. In this webinar you will learn about current IT storage challenges and useful insights about next-generation storage solutions.
Tags : storage solutions, mobile data storage, it ecosystem, petabyte scale
     Seagate Technology
By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
     Secure Computing
By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
     SecureAuth
By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
     Secureworks
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Every company markets to consumers differently. From call centers to emails to apps and aggregator sites, orchestrating a relationship marketing strategy requires a bespoke collection of marketing technologies. Marketers have the budgets to spend on CRM, email, mobile and data management, but fitting these capabilities together and ensuring they work with legacy business systems is not easy.
Tags : 
     Selligent Marketing Cloud
Start   Previous    83 84 85 86 87 88 89 90 91 92 93 94 95 96 97    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com