operating system

Results 1 - 25 of 336Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : data, security, mobility, mobile computing, best practices
     Absolute Software
By: Acronis Inc.     Published Date: Jul 14, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Tags : acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery
     Acronis Inc.
By: Altair     Published Date: Jul 15, 2014
NSCEE’s new workload management solution including PBS Professional has reduced overall runtimes for processing workload. Furthermore, NSCEE credits PBS Professional with improving system manageability and extensibility thanks to these key features: • Lightweight solution • Very easy to manage • Not dependent on any specific operating system • Can be easily extended by adding site-specific processing plugins/hooks To learn more click to read the full paper
Tags : 
     Altair
By: AMD     Published Date: Oct 01, 2012
Transcendent Technology for the Dynamic Data Center
Tags : amd, windows server 2012, server, windows, operating system, virtualization
     AMD
By: AMD     Published Date: Oct 08, 2012
Transcendent Technology for the Dynamic Data Center
Tags : amd, cloud computing, cloud, data, data management, infrastructure
     AMD
By: AppDynamics     Published Date: Dec 10, 2014
This whitepaper will dispel the top 5 myths around mobile APM and show you how with the right mAPM tool you can enhance your mobile app experience for all users.
Tags : operating systems, bottlenecks, mobile apps, mobile user experience
     AppDynamics
By: AppDynamics     Published Date: Nov 02, 2017
With an estimated 9 million developers worldwide, the Java community is a very robust one. One of the most important uses of Java today is building applications for mobile devices using the Android operating system. In addition, Java remains incredibly popular for enterprise applications and client-server web applications, and is also a very common language of instruction in software development courses.
Tags : 
     AppDynamics
By: AppDynamics     Published Date: Sep 20, 2017
Larger organizations run into problems when monolithic architectures cannot be scaled, upgraded or maintained easily as they grow over time. Microservices architecture is an answer to that problem. It is a software architecture where complex tasks are broken down into small processes that operate independently and communicate through language-agnostic APIs.
Tags : mobile devices, web apps, operating systems, ram, server utilization, multi-core services, ethernet
     AppDynamics
By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
     Apstra
By: Apstra     Published Date: Aug 19, 2019
Intent Based Analytcs (IBA), an important feature of AOS and a main enabler for closed loop telemetry is described in this whitepaper. Prerequisites for this whitepaper include a basic understanding of the Apstra AOS soluton, such as from the white paper ttled “The Apstra Operatng System (AOS) Architecture Overview.
Tags : 
     Apstra
By: Apstra     Published Date: Aug 19, 2019
Typically, and since the dawn of time, network infrastructure teams chose the hardware and switch Operating System (OS) first, then designed their infrastructure, including how their infrastructure was built around this choice.
Tags : 
     Apstra
By: Apstra     Published Date: Aug 19, 2019
The response to the question “How is one Intent-Based Networking offering different than the others?” typically sounds subjective, descriptive, and open to interpretation. What is needed is a tangible, objective, and fact-based nomenclature that can help you rationalize the maturity of Intent-Based Networking solutions. Using this nomenclature, we should be able to map Intent-Based Networking solutions to a specific maturity level, starting with Level 0 (low maturity/incomplete) up to Level 3 which enables a fully capable Intent-Based Networking solution (mature/complete). Apstra introduced the notion of Intent-Based Networking and Self-Operating Networks™ in June of 2016, and in our blog “Intent Based Networking: What Is It” we provided a definition of Intent-Based Networking, listing capabilities that a complete Intent-Based Networking system needs to provide. The goal is to categorize maturity levels of various Intent-Based Networking implementations and enable network operators to
Tags : 
     Apstra
By: AWS     Published Date: Jul 24, 2019
Common daily media broadcaster tasks such as ad verification are slow and costly. Done manually, they may also introduce inefficiencies that can interfere with transparency and payment accountability—and impact your bottom line. Meanwhile, recent and archived media lies idle when you could repurpose it to increase brand exposure and generate revenue. Learn how Veritone, Inc. used its aiWARE Operating System, building on Amazon Web Services (AWS), to help Westwood One, Inc., a large audio broadcasting network in the United States, develop Artificial Intelligence (AI) and Machine Learning (ML) solutions designed for ad verification and monetizing archived media. Download our webinar to learn how you can Automate ad verification and reporting tasks. Enhance archive content to make media searchable and reusable. Use AI and ML in the cloud for near real-time media intelligence. Start applying machine learning tools.
Tags : 
     AWS
By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
Get the details on how BlackBerry Mobile Fusion can make managing mobile devices - including those running Apple iOS and Google Android operating systems faster, easier and safer than ever.
Tags : byod, bring your own device, blackberry, mobile device, managing mobility, managing enterprise mobility, smartphones, mobile device management
     BlackBerry
By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
     Blackberry
By: BlueHornet     Published Date: Apr 12, 2010
Over the next few years, more and more people are expected to check their email on their smartphones, rather than their PCs. In this free whitepaper, you'll learn how the most common mobile operating systems render your HTML emails, and more importantly, what you can do now to optimize your email creative to keep your messages looking great, no matter where they're opened.
Tags : bluehornet, email marketing, mobile rendering, smartphones, html email
     BlueHornet
By: BMC ESM     Published Date: Nov 05, 2009
Realizing its existing processes and tools were inadequate, labor intensive and error-prone, Morgan Stanley began looking for a new application deployment solution in early 2007. While not required in the initial assessment, Morgan Stanley also hoped to find a tool that would also provide capabilities such as hardware and operating system provisioning.
Tags : bmc esm, deployment, morgan stanley, hardware, operating system, management, application automation, operations manager
     BMC ESM
By: BMC Software     Published Date: Dec 21, 2011
With a single, integrated point of control, IT can lower costs, improve compliance, and be more agile. Read on to find out how...
Tags : consolidation, schedule, schedulers, infrastructure, workforce, control, operating system, compliance
     BMC Software
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
     CA Technologies
By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
     CA Technologies EMEA
By: CA WA     Published Date: May 12, 2008
CA Workload Automation brings a central point of control and visibility to help assure efficient, reliable and secure business process management. It enables business workload design across platforms and operating systems, offering advanced monitoring and automated responses to changes and exceptions.
Tags : web services, bpm, business process, ca wa, workload automation
     CA WA
By: CDW     Published Date: Jun 18, 2013
It’s an ever-evolving world of operating systems. Endless endpoints. Many media-rich applications. Bottlenecks and limited bandwidth.
Tags : cdw, red report, mobile technology, security
     CDW
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com