operating system

Results 251 - 275 of 331Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: Jul 18, 2012
As mobile operations spread through your organization, how is it possible to manage, support, and configure hundreds if not thousands of mobile applications for employees who use different mobile devices and operating systems requiring different versions of the same applications? Read this white paper to discover the importance of mobile application management, and learn best practices for establishing it within your organization.
Tags : technology, mobile, apps, applications, business, enterprise, workplace, e-mail
     SAP
By: Scalebase     Published Date: Mar 08, 2013
Learn how Mozilla is able to cost-effectively scale out their new Firefox mobile operating system App Store (running MySQL) to an infinite number of users, while increasing performance.
Tags : mozilla, scalebase, performance, app store, increasing performance, infinite number of users, increasing performance, shard
     Scalebase
By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
     ScanLife
By: Schneider Electric     Published Date: Oct 17, 2016
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring
     Schneider Electric
By: ScriptLogic     Published Date: Nov 14, 2011
In this whitepaper, you'll get an idea of a very different migration strategy -- moving your users and their desktops to Windows 7.
Tags : windows 7, migration, operating system
     ScriptLogic
By: Seagate     Published Date: Jan 26, 2016
Finding oil and gas has always been a tricky proposition, given that reserves are primarily hidden underground, and often as not, under the ocean as well. The costs involved in acquiring rights to a site, drilling the wells, and operating them are considerable and has driven the industry to adopt advanced technologies for locating the most promising sites. As a consequence, oil and gas exploration today is essentially an exercise in scientific visualization and modeling, employing some of most advanced computational technologies available. High performance computing (HPC) systems are being used to fill these needs, primarily with x86-based cluster computers and Lustre storage systems. The technology is well developed, but the scale of the problem demands medium to large-sized systems, requiring a significant capital outlay and operating expense. The most powerful systems deployed by oil and gas companies are represented by petaflop-scale computers with multiple petabytes of attached
Tags : 
     Seagate
By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
     SecureAuth
By: Shavlik Technologies     Published Date: Dec 15, 2010
View this white paper to get a complete list of products that Shavlik covers.
Tags : shavlik, 3rd party application, custom patching, microsoft operating system, wsus, adobe, apple
     Shavlik Technologies
By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : vulnerability management, security, threat management, security, assessment
     SilverSky
By: Smarsh     Published Date: Dec 07, 2016
Text messaging is simple, concise and compatible with virtually every mobile device, operating system and wireless carrier, making it very appealing to financial advisors and their customers. However, if used for business communications, texts can create tremendous risk. Less than a third of financial firms have a text supervision solution in place according to the Smarsh 2016 Electronic Communications Compliance Survey, the largest compliance gap facing financial firms today. Text messaging can’t be ignored by firms any longer.
Tags : 
     Smarsh
By: Solarflare Communications Inc.     Published Date: Mar 13, 2008
Solarflare’s creation of a ‘virtualization aware’ smart network adapter and modified Xen will allow direct, but safe, access to such adapters from guest operating systems in order to improve network performance.
Tags : data center, semiconductor, 10gbe, solarflare, phy solutions, virtualization
     Solarflare Communications Inc.
By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Cloud computing has emerged as one of the prevailing IT trends today. By providing greater levels of provisioning and automation, cloud computing can help organizations become more nimble, reduce operating costs, improve application performance, and better allocate their compute resources. It enables organizations to more flexibly scale their IT infrastructure while reducing the administrative burden on IT organizations. But IT departments determined to take advantage of these benefits are at risk of losing control of their infrastructure. Read this white paper to understand how the HP CloudSystem Matrix is an integrated IT infrastructure solution that meets this challenge head-on, enabling organizations to simplify their IT infrastructure, reduce their management burden, and streamline operating costs. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other count
Tags : delivering, cloud, integrated infrastructure, hp cloudsystems, operating costs, enabling organizations, it management, enterprise applications
     Sponsored by HP and Intel®
By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Save time, money, and storage space with ShadowProtect® disk-based backup and disaster recovery software - backup everything and recover anywhere
Tags : shadowprotect, storagecraft, storage, backup, disk-based, tape, operating system, windows
     StorageCraft® Technology Corporation
By: Stratus Technologies     Published Date: Mar 10, 2009
Continuous, high or 'on -demand' availability — the choice is yours. The coupling of two industry-leading technologies — VMware Infrastructure 3 and Stratus ftServer systems — gives IT managers a flexible, robust solution that delivers mission-critical SLAs along with the full benefits of virtualization.
Tags : stratus, vmware infrastructure 3, mission-critical service levels, on-demand availability, stratus ftserver, slas, server virtualizations, operating systems
     Stratus Technologies
By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard
     Stratus Technologies
By: SuccessFactors, Inc.     Published Date: Aug 30, 2011
To survive in today's marketplace, small to mid-sized businesses are increasingly using the power of company-wide goal alignment to generate strong financial performance, increase productivity and create a more cohesive culture than their larger competitors.
Tags : successfactors, goal alignment, smbs, cohesive culture, operating margins, company strategy execution, employee turnover reduction, effective goals
     SuccessFactors, Inc.
By: Symantec     Published Date: Nov 04, 2013
The faster an employee’s machine works, the faster they can work. Undetected malware running in the background can significantly slow down a computer’s operating system and can cause frustration on the employee’s part.
Tags : symantec, employee productivity, undetected malware, malware, iopener institute, security, it management
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : security, defense, cloud, threats, attack, symantec, enterprise, endpoint
     Symantec
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : symantec, malware, applications, security, code signing
     Symantec Corporation
By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : threattrack, security, threat, track, information, admins, best, practices
     ThreatTrack Security
By: TIBCO Software     Published Date: Aug 13, 2018
There are so many opportunities for businesses to collect data that getting a clear picture of all of it can be an uphill battle—and leveraging it for insight can be nearly impossible. But whether you are a start-up or a multinational conglomerate, not taking advantage of the available data is a mistake you cannot risk making. According to a 2016 McKinsey & Company study, over the past three years, digital leaders have achieved revenue growth five times greater, an operating margin profit eight times greater, and a return to shareholder value two times higher than laggards. Companies today need a closed loop system that combines data, insight, and action. Download this paper to learn about the goals of a system of insight (SOI), the common set of technologies that all systems of insight need, and how an SOI can make a difference in your business.
Tags : 
     TIBCO Software
By: Toshiba     Published Date: Nov 21, 2013
It's inevitable that upgrading to a new version of an operating system or application comes with a bit of a learning curve. With Windows 8.1, though--and its predecessor Windows 8--the curve is steep, and just finding simple tools and features can be a challenge.
Tags : toshiba, windows, windows 8, windows 81, microsoft, internet explorer, search bar, copiers
     Toshiba
By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log
     Tripwire, Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com