pc world

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 16, 2015
Docker is a lightweight Linux container technology built on top of LXC (LinuX Containers) and cgroup (control groups), which offers many attractive benefits for HPC environments. Find out more about how IBM Platform LSF® and Docker have been integrated outside the core of Platform LSF with a real world example involving the application BWA (bio-bwa.sourceforge.net). This step-by-step white paper provides details on how to get started with the IBM Platform LSF and Docker integration which is available via open beta on Service Management Connect.
Tags : 
     IBM
By: Bull     Published Date: Dec 04, 2014
Bull, an Atos company, is a leader in Big Data, HPC and cyber-security with a worldwide market presence. Bull has extensive experience in implementing and running petaflopsscale supercomputers. The exascale program is a new step forward in Bull’s strategy to deliver exascale supercomputers capable of addressing the new challenges of science, industry and society.
Tags : bull, exascale, big data, hpc, cyber security, supercomputers
     Bull
By: Intel     Published Date: Apr 01, 2016
Since its beginnings in 1999 as a project at Carnegie Mellon University, Lustre, the highperformance parallel file system, has come a long, long way. Designed and always focusing on performance and scalability, it is now part of nearly every High Performance Computing (HPC) cluster on the Top500.org’s list of fastest computers in the world—present in 70 percent of the top 100 and nine out of the top ten. That’s an achievement for any developer—or community of developers, in the case of Lustre—to be proud of.
Tags : 
     Intel
By: IBM     Published Date: Feb 13, 2015
This major Hollywood studio wanted to improve the computer time required to render animated films. Using HPC solution powered by Platform LSF increased compute capacity allowing release of two major feature films and multiple animated shorts.
Tags : 
     IBM
By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
     AWS
By: DocuSign UK     Published Date: Nov 06, 2018
"Mobile. It’s where things are going in life and in business. Your coworkers and customers are 2-5 times more likely to access information on their phone than their PC.* This ebook explores the mobile trends that are transforming how business gets done. Plus, it offers real-world examples of how companies like yours are using the new accessibility to their advantage. Get those forms and approvals on those phones and tablets! Imagine NDAs, invoices, project proposals, purchase orders, time sheets, RFPs, permissions, reviews, signoffs – you know, those tiresome paper pushing processes – all accessible, transferable, reviewable, approvable, and actionable via any digital device."
Tags : 
     DocuSign UK
By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
     MobileIron
By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
     MobileIron
By: Dell     Published Date: Jul 03, 2012
This White Paper focuses on some of the data storage techniques and strategies that growing business need to address to ensure they aren't suffering under the weight of their information storage and its costs.
Tags : dell, pc world, data growth
     Dell
By: Dell     Published Date: Jul 03, 2012
This expert E-Guide discusses best practices to adjust and top demands that come along with virtualization. Uncover 7 steps you can use to get started for a unified IT organization.
Tags : dell, unified it, pc world, virtualization
     Dell
By: PC World     Published Date: Jul 02, 2012
Choosing a proven architecture designed by Dell to meet your needs allows you to confidently deploy an optimal solution without the time requirement and hassle of compiling your hardware
Tags : dell, pc world, reference configurations
     PC World
By: PC World     Published Date: Jul 02, 2012
Eight Must-Have Technologies for the IT Director
Tags : dell, pc world, storage virtualization, thin provisioning, technologies
     PC World
By: PC World     Published Date: Jul 02, 2012
Data Storage Strategies and insights for growing businesses.
Tags : data growth, dell, pc world, capacity expansion
     PC World
By: Mitel     Published Date: Apr 25, 2018
This is a time of rapid and dramatic progress in the cloud communications landscape. New technological innovations help companies incorporate location-independent systems, allowing workers to collaborate and communicate wherever they may be. And all signs indicate this is only the beginning, with the industry poised for unprecedented growth. In fact, as enterprise software moves to the cloud, the traditional unified communications space is having its own dramatic shift. The consumer experiences from Snapchat to Instagram to Facebook among other consumer technologies—are changing the expectations for communications. New models for collaboration and engagement, supported by big data and the cloud, provide a whole new world of opportunities.
Tags : evolution, consumer, demands, cloud, communications
     Mitel
By: VMware, Inc     Published Date: Dec 05, 2013
PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.
Tags : vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup, pc life-cycle management tools, networking, it management, enterprise applications, storage, data management, data center
     VMware, Inc
By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
     ThreatTrack Security
By: Oneupweb     Published Date: Jun 24, 2008
Uncover the social marketing secrets of the hottest holiday products with Oneupweb's white paper, Secrets of Social Marketing Success: How 2007 Hot Holiday Products are Being Marketed Online.
Tags : oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
     Oneupweb
By: Oneupweb     Published Date: Jun 24, 2008
Learn from the mistakes and successes of others in part 2 of Oneupweb's landmark social media marketing study, Social Media Marketing Hits and Misses: How 2007 Hot Holiday Brands and Products Performed Online.
Tags : oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
     Oneupweb
By: QuinStreet     Published Date: Feb 09, 2009
Most businesses realize a significant return on their investment within eighteen months of implementation of VoIP. According to a recent study by PC World, businesses realize an average net savings of 20 to 30 percent when they switch from their legacy phone system to VoIP. The initial investment can come with a hefty price tag, however.
Tags : quinstreet, voip, save with voip, ip telephony, voip savings, pstn, public switched telephone network, enterprise applications
     QuinStreet
By: GFI Software     Published Date: Feb 24, 2011
This white paper contains 12 PCI DSS requirements that have been organized into six (6) logically related groups.
Tags : gfi software, sunbelt, pci-dss compliance, data security, american express, discover financial services, jcb international, mastercard worldwide, visa
     GFI Software
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
     Webroot
By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
     AWS
By: DocuSign     Published Date: Mar 23, 2016
Mobile. It’s where things are going in life and in business. Your coworkers and customers are 2-5 times more likely to access information on their phone than their PC. This eBook explores the mobile trends transforming how business gets done. Plus, it offers real-world examples of how companies like yours are using the new accessibility to their advantage.
Tags : 
     DocuSign
By: DocuSign     Published Date: Aug 09, 2016
"Mobile. It’s where things are going in life and in business. Your coworkers and customers are 2-5 times more likely to access information on their phone than their PC. This eBook explores the mobile trends transforming how business gets done. Plus, it offers real-world examples of how companies like yours are using the new accessibility to their advantage."
Tags : docusign, digital transaction management, paperless, esignature, paper cost
     DocuSign
By: DocuSign     Published Date: Apr 12, 2017
Mobile. It’s where things are going in life and in business. Your coworkers and customers are 2-5 times more likely to access information on their phone than their PC. This eBook explores the mobile trends transforming how business gets done. Plus, it offers real-world examples of how companies like yours are using the new accessibility to their advantage.
Tags : 
     DocuSign
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com