rto

Results 126 - 150 of 209Sort Results By: Published Date | Title | Company Name
By: Burton Group     Published Date: Apr 08, 2008
Increasing power demands and space limitations in the data center have begun to transition server virtualization technologies from luxuries to necessities. Server virtualization provides a path toward server consolidation that results in significant power and space savings, while also offering high availability and system portability. Today, vendors are building hardware and software platforms that can deliver virtualization solutions at near-native performance.
Tags : burton group, virtual server, virtual machine, virtualization, server virtualization, virtual architecture, virtualization architecture, virtual
     Burton Group
By: Burton Group     Published Date: Apr 08, 2008
Industry debate about the relative merits of OpenDocument Format (ODF) and Ecma 376 Office Open XML (OOXML) highlights the significance of the productivity application market shift from binary and proprietary file formats to vendor- and product-independent Extensible Markup Language (XML) models. The competitive stakes are huge, and the related political posturing is sometimes perplexing.
Tags : odf, document, open document format, burton group, xml, ooxml, office open xml, microsoft office, word, microsoft word, software development
     Burton Group
By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : burton group, best practices, malware, security, email security, network security, content filtering
     Burton Group
By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture, networking
     Burton Group
By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
     Burton Group
By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking
     Burton Group
By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : vmware, disaster recovery, smb, it system, it infastructure, virtualization, storage replication, ups, power outage, uninterruptible power supplies, circuit failure, human error, business continuity, time critical, mission critical, bcdr maturation, backup, data backup, data recovery, hgih availability
     VMware
By: Acronis     Published Date: Apr 26, 2011
In this paper we introduce initiatives you can put into effect to survive and thrive in our virtualized world. Then we show how Acronis virtual solutions can save administration time, lower IT expenses and improve your ability to meet both RTO and RPO goals.
Tags : acronis, server consolidation, disaster recovery, backup and recovery, virtual server backup, virtual server, backup, vmare backup
     Acronis
By: Oracle     Published Date: Apr 16, 2018
Embora 89% dos líderes de marketing acreditem que devam fornecer uma experiência ideal aos clientes e, assim, criar um diferencial para seus produtos e serviços na era digital, apenas 20% acreditam cumprir com êxito esta premissa. Isso significa que existe uma dificuldade por meio dos profissionais de marketing em alcançar seu público em canais diferentes, o que resulta em taxas de conversão baixas, relacionamentos curtos com clientes e perda de receita. Veja como O Oracle Marketing Cloud oferece simplicidade para as equipes de marketing, voltado para os públicos relevantes e uma solução escalonável de TI
Tags : como, conversar, publico, diferentes, canais, marketing
     Oracle
By: Forcepoint     Published Date: Apr 19, 2016
As consequências financeiras e jurídicas dos ciberincidentes de alta visibilidade ocorridos no passado enviam uma mensagem incontestável: o furto de dados é importante demais para que o conselho de administração não se envolva. O relatório "Cibersegurança e Prevenção contra Furto de Dados" fornece uma visão geral não técnica que todo conselho de administração pode usar para avaliar a abordagem de segurança da organização.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
     Forcepoint
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
     Zebra Technologies
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
     Zebra Technologies
By: Sparton Corporation     Published Date: Jan 12, 2018
Today’s biotechnology and military companies have high expectations for software performance of electromechanical devices. However, attempting to satisfy all customer demands and features at the outset can lead to costly challenges and inefficiencies down the road. This white paper explains five benefits of taking a phased approach to the development, as well as what to look for when vetting potential contract manufacturing partners.
Tags : software, software development, contract manufacturing, contract manufacturing partner, phased development, medical, military
     Sparton Corporation
By: Sparton Corporation     Published Date: Jan 16, 2018
Today’s biotechnology and military companies have high expectations for software performance of electromechanical devices. However, attempting to satisfy all customer demands and features at the outset can lead to costly challenges and inefficiencies down the road. This white paper explains five benefits of taking a phased approach to the development, as well as what to look for when vetting potential contract manufacturing partners.
Tags : software, software development, contract manufacturing, contract manufacturing partner, phased development, medical, military
     Sparton Corporation
By: Cisco     Published Date: Jan 08, 2016
To better understand competitive retail dynamics and help guide retailers’ strategies, Cisco undertook a comprehensive, three-pronged research project, the fifth annual installment of our retail industry analysis. It comprised: 1. A survey of more than 6000 consumers (all having Internet access) 2 in 10 countries: Australia, Brazil, Canada, China, France, Germany, India, Mexico, United Kingdom, and United States. 2. In-depth interviews with industry thought leaders—analysts, authors, and innovators including Leslie Hand, vice president, IDC Retail Insights; Michael Olmstead, director, Plug and Play Retail; and Doug Stephens, founder, Retail Prophet 3. An IoE retail economic model drawn from an analysis of the data and lessons learned from Cisco customer engagements.
Tags : cisco, retail, retail dynamics, industry analysis
     Cisco
By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
     SafeData, LLC
By: Zerto     Published Date: Nov 02, 2012
Zerto has introduced a virtual-aware, software-only, tier-one, enterprise-class replication solution purpose-built for virtual environments. Read on to learn how this gives a new approach to business continuity and disaster recovery
Tags : zerto, business data, business continuity, data recovery, disaster recovery, it management, data management, data center
     Zerto
By: Zerto     Published Date: Nov 02, 2012
When organizations are considering a business continuity/disaster recovery solution, they look for solution that protects and recovers the data and application. Read this white paper to learn more about protecting Tier-1 applications with Zerto.
Tags : zerto, application security, data security, data recovery, application recovery, data solution, security, data management, data center
     Zerto
By: Symantec     Published Date: Feb 04, 2015
Seventy percent of Americans are seriously concerned about identity theft. More than two thirds of online shoppers don’t complete their purchase because of price. In the world of e-commerce, you need a targeted marketing strategy to ensure you’re offering customers the reassurance and guarantees they need to browse and buy confidently. Symantec’s Norton Shopping Guarantee gives you just that. Online stores are seeing a dramatic return on investment when they use it. For merchants and customers alike, it’s satisfaction guaranteed.
Tags : e-commerce, identity theft, targeted marketing strategy, reassurance and guarantee, return on investment, security
     Symantec
By: Nutanix     Published Date: Apr 24, 2017
Conviértase en un experto en Infraestructura Hiperconvergente Descargué el libro. La infraestructura tradicional (legacy), con sus componentes aislados como almacenamiento, redes y servidores, ya no es adecuada para cubrir las demandas cada vez mayores de las aplicaciones empresariales actuales ni el ritmo acelerado de las empresas modernas. Hoy, los expertos y líderes de TI están utilizando infraestructura Hiperconvergente para eliminar las barreras y complejidad de las plataformas tradicionales y brindar servicios de infraestructura en sus propias instalaciones (on-premise) pero con la velocidad, agilidad y eficiencia operativa de una nube pública. Descarga gratis el libro
Tags : infraestructura hiperconvergente, hiperconvergencia, cómo funciona nutanix, nutanix, hiperconvergencia de nutanix, ¿qué es un sistema convergente?, hci, almacenamiento empresarial, nube pública, nube empresarial, centro de datos, data center, definido por software
     Nutanix
By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office, oracle, sap, sql, recovery point objective, rpo, recovery time objective, rto, tape backup, mirroring, asynchronous replication, continuous data protection, wide area file services
     IBM
By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance, restore point objectives, rto, disaster recovery, remote office backup consolidation, wafs, vtl, dr solution gap, xpress restore, fulcrum
     IBM
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla), software development, it management
     Stratus Technologies
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com