capabilities

Results 151 - 175 of 1664Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, networking, security, storage
     Symantec
By: Adobe     Published Date: Nov 07, 2013
Audi differentiates its brand experience using web content and digital asset management capabilities in Adobe Experience Manager.
Tags : adobe, audi, audi cars, adobe marketing cloud, audi website, latest innovation, brand experience, head of brand portal, innovative engineering, worldwide brand, consumer websites, adobe analytics, performance of websites, car configurator data, audi configurator, invite feedback, feedback leads to improvement
     Adobe
By: Network Automation     Published Date: Dec 02, 2008
AutoMate BPA Server 7 is a revolutionary advance in the automation of systems and applications across multiple-machine networks. No other automation software has the power and range of capabilities offered by AutoMate BPA Server, while also making automation so easy and intuitive.
Tags : network automation, automate bpa server 7, server management console, networking, it management
     Network Automation
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Some SAP systems can take up to 10 days to complete a SAP system copy. That’s 10 days of unproductive time. Why? SAP does not provide the necessary tools out-of-the-box to automate and handle the process efficiently. This means you must use highly skilled SAP BASIS staff to manage the process. Manual steps, along with hundreds of configuration settings, can take days to complete—and like many organizations, you have also experienced too many delays, causing non-production systems to be unavailable, which stalls development, testing and training activities. Opportunity So you’ve concluded your SAP system copy process is hindering innovation and productivity. You’re considering automating the process to ensure system copies are available for all environments on time, every time. Benefits What are the key capabilities you actually need to address SAP system copy inefficiency once and for all?
Tags : 
     CA Technologies_Business_Automation
By: VMware     Published Date: Nov 04, 2016
This 11-page whitepaper discusses the agility needs of today’s business, how IT is choosing a hybrid cloud approach to meet demand, and how hybrid cloud brings more agility but also increases management complexity in an environment that encompasses traditional architectures, private clouds, and public clouds. The paper outlines the role of a cloud management platform with vRealize® Suite for enabling faster and secure provisioning with monitoring and policy-driven controls. It highlights the 3 use cases (Intelligent Ops, Automated IT to Iaas, DevOps-Ready IT), the need for Day 1 and Day 2 capabilities, and how vRealize Suite helps automate IT.
Tags : 
     VMware
By: Juniper Networks     Published Date: Aug 10, 2017
This IDC white paper discusses Juniper's Network Lifecycle Automation Services, a suite of capabilities and services that provide customers the ability to accelerate their digital transformation in a smart, simple, cost-efficient, and more secure way.
Tags : cloud, big data, iot, business decisions, software defined network, sdn, virtualization, converged, hyperconverged
     Juniper Networks
By: IBM     Published Date: Mar 24, 2009
Electronics and Software Engineering are quickly merging with traditional Mechanical Engineering to create a new paradigm in auto manufacturing: Mechatronics. Industry experts predict that this shift will bring about profound advances in automotive product development. Unfortunately, existing IT and process infrastructures do not provide sufficient capabilities to support the new paradigm: multiple data silos, a lack of standardized processes, and integration issues on a tool level (Mechanical, Electronic, Software) continue to pose serious obstacles to development efficiency, and remain a frequent source of delays, quality issues and cost increases.
Tags : ibm, ibm telelogic, automotive system design, mechanical engineering, mechatronics, oems, electronic stability programs, esp, electric overlay steering, ancillary systems, active lighting, pdm, product data management, pcb-layout domains, ptc, automotive product development system, sourcing, engineering, engineering change orders, ecos
     IBM
By: Symantec     Published Date: Jan 31, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. Download the report to find out how each of the security solutions performed.
Tags : endpoint protection, security, performance test, comparison
     Symantec
By: Symantec     Published Date: Aug 09, 2013
AV-Test performed a comparative review of 7 enterprise endpoint security products to determine their real-world protection and remediation capabilities. The malware test used samples for real-world threats, false-positives, and remediation. Download the report to find out how each of the security solution performed. Download Now.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec
By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
     Avi Networks
By: Trend Micro     Published Date: May 03, 2018
This whitepaper looks to address the Top 3 challenges your team faces when building in the cloud and what it means for your business. Although the capabilities and cost of select SecOps solutions have kept pace with the widespread adoption of the Amazon Web Services (AWS) Cloud, many organizations try to protect their expanding cloud workloads without the proper support.
Tags : 
     Trend Micro
By: Microsoft     Published Date: Jul 20, 2018
When it comes to performance, Azure SQL Database is built for you, the developer. Azure SQL Database is designed to make your work easier and let you focus on other priorities. It scales on the fly, without downtime, with capabilities that make it great for building multitenant software as a service (SaaS) apps. Plus, it learns and adapts to your database workload, whatever that may be, using built-in intelligence to continually adjust and improve over time. That said, there’s more to a successful app than impressive performance. That’s why we built Azure SQL Database to be just as intelligent in other areas, such as availability and security, so that you won’t need to worry about those essentials either. Finally, we built Azure SQL Database to let you work the way you want, using the tools and platforms you prefer. It’s why we call Azure SQL Database the intelligent database for developers. Read on to learn more, and we’re sure you’ll agree.
Tags : 
     Microsoft
By: Marketo     Published Date: Sep 24, 2009
Get a complete market overview and discover the key capabilities of leading systems. With 18 vendor comparisons, this report also features recommendations for getting the most value out of a lead management automation solution.
Tags : b2b, automation, forrester, marketo, lma, lead management, sales leads, demand generation, sfa, nurturing
     Marketo
By: EMC Corporation     Published Date: Mar 08, 2012
This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.
Tags : leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention, information retention
     EMC Corporation
By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions, it management, enterprise applications
     Eaton
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : ibm, financial, quality, risk, management, cost, reduce costs, effiency, operations, optimization, control, proftits, data center, solution, customer, brms, enterprise applications
     IBM ILOG.
By: IBM     Published Date: Oct 13, 2017
This BARC document is the third edition of our BARC Score business intelligence vendor evaluation and ranking. This BARC Score evaluates enterprise BI and analytics platforms that are able to fulfill a broad set of BI requirements within the enterprise. Based on countless data points from The BI Survey and many analyst interactions, vendors are rated on a variety of criteria, from product capabilities and architecture to sales and marketing strategy, financial performance and customer feedback.
Tags : barc. business intelligence, analytics, customer feedback
     IBM
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
     Cisco
By: Oracle     Published Date: Apr 23, 2015
This white paper reveals how most advanced organisations are using predictive analytics to reveal where future opportunities lie, and to deploy resources and training accordingly.
Tags : be insight-driven, insights, sales, data, social media, smart use of data, analytic, improve analytical capabilities
     Oracle
By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : gleanster, business, benchmark, business intelligence, roi
     Gleanster Research
By: NEC     Published Date: Aug 26, 2014
In addition to high reliability and availability, enterprise mission critical applications, data centers operating 24x7, and data analysis platforms all demand powerful data processing capabilities and stability. The NEC PCIe SSD Appliance for Microsoft® SQL Server® is a best-practice reference architecture for such demanding workloads. It comprises an Express 5800 Scalable Enterprise Server Series with Intel® Xeon® processor E7 v2 family CPUs, high-performance HGST FlashMAX II PCIe server-mounted flash storage, and Microsoft® SQL Server® 2014. When compared with the previous reference architecture based on a server with the Intel® Xeon® processor E7 family CPUs, benchmark testing demonstrated a performance improvement of up to 173% in logical scan rate in a data warehouse environment. The testing also demonstrated consistently fast and stable performance in online transaction processing (OLTP) that could potentially be encountered.
Tags : sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, enterprise applications, storage
     NEC
By: Oracle     Published Date: Nov 01, 2013
Customers want to solve their issues quickly and easily on the Web. Here we provide 3 recommended capabilities to invest in to transform company knowledge and Web self-service tools so you can achieve higher customer retention and save millions on support costs.
Tags : zenithoptimedia, oracle, web self-service, customer service, customer satisfaction, social support sites, customer needs, personalized web content, fast resolution, collaborative self-service, social tools, customer retention, consumer input, outbound communication
     Oracle
By: Oracle     Published Date: Nov 13, 2013
Customers want to solve their issues quickly and easily on the Web. Here we provide 3 recommended capabilities to invest in to transform company knowledge and Web self-service tools so you can achieve higher customer retention and save millions on support costs.
Tags : zenithoptimedia, oracle, web self-service, customer service, customer satisfaction, social support sites, customer needs, personalized web content, fast resolution, collaborative self-service, social tools, customer retention, consumer input, outbound communication
     Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com