technical capabilities

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 20, 2015
Assembling a clustered environment can be complex due to the many software components that are required to enable technical and high performance computing (HPC) applications to run effectively. This webcast will demonstrate how IBM Platform Computing products simplify cluster deployment, use and management, bringing high performance capabilities to both experienced and new HPC administrators and users. We will also present examples of companies utilizing Platform Computing software today, to improve performance and utilization of their HPC environment while reducing costs.
Tags : 
     IBM
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible. Like larger companies, midsize firms must make sure that they are effectively coordinating on-premise, public cloud, and private cloud capabilities. Unlike large companies, though, midsize firms are limited in both financial and technical resources to design and coordinate effective solutions to meet specific needs. Rather than invest in a major overhaul of their IT environments, midsize firms have to move incrementally, supplementing current resources with new cloud and on-premise capabilities that provide the performance needed to prosper in an increasingly competitive environment.
Tags : 
     Hewlett Packard Enterprise
By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security
     Webroot
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
     Secureworks ABM UK 2017
By: Rackspace     Published Date: Apr 02, 2019
Traditional retailers seeking to digitalize their brand connections to customers, do so with Eagle Eye AIR, a SaaS platform for creating intelligent, real-time digital and mobile solutions for promotions, loyalty programs, rewards and more. With rapid business growth, the volumes of transactions processed per second are constantly being rewritten – yet, its customers’ transactional throughput keeps running smoothly – which is all thanks to the successful migration of its dedicated infrastructure to Google Cloud Platform (GCP). Being a longstanding customer of Rackspace, Eagle Eye trusted the Rackspace Managed Services team in providing expert guidance for every stage of its migration project – which is part of a bigger exercise to transform its technical capabilities.
Tags : 
     Rackspace
By: AWS     Published Date: Nov 07, 2018
Enterprises seeking the security and performance capabilities of establishing their own private network are often turned away by the high cost and technical expertise required. AT&T NetBond® for Cloud helps establish private, dynamic connectivity from on-premises data centers to Amazon Web Services (AWS) in as little as 2-3 days. Aira, a customer focused on augmented reality, has leveraged the global connectivity capabilities of AT&T NetBond® to connect low vision or blind smart glasses users with a network of agents to guide the visually impaired through everyday tasks such as interpreting prescriptions. Download this case study with AT&T, Aira, and AWS to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands
Tags : 
     AWS
By: Group M_IBM Q418     Published Date: Oct 16, 2018
Access management products and services have matured in single sign-on protocols and user authentication, and technical differentiators include adaptive access capabilities, as well as ease and breadth of target system enablement. Among new purchases, demand for IAM as a service continues to grow.
Tags : 
     Group M_IBM Q418
By: Genesys     Published Date: Apr 07, 2017
Contact center infrastructure (CCI) evaluation is a technically complex process. This challenge is further complicated by the different requirements for omnichannel, high availability and integration as part of a customer engagement center (CEC). Get this report now to learn: - 9 critical capabilities for evaluating contact center infrastructure - 3 use cases that reflect most decisions organizations need to make when looking at CCI – multichannel compact suite, high volume call center and customer engagement center - Which vendor scores the highest in 3 use cases across 9 capabilities
Tags : genesys, contact center infrastructure, cci, contact center engagement, cec
     Genesys
By: The Planet     Published Date: Jan 05, 2009
With all the competitive challenges and technology demands faced by web-based SMBs today, the possibility of a capital-expense-free alternative for providing world-class IT systems and services is extremely viable. By offering enterprise-class IT systems and services for a monthly fee, managed hosting helps to level the playing field as well as improve the technical capabilities of businesses that until now could not afford to match their larger competitors. Learn more today!
Tags : the planet, managed hosting, it hosting, capex-free, enterprise-class it systems, it management, enterprise applications
     The Planet
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : secure, ios, android, mobile security, data protection, security
     Lumension
By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
     AlienVault
By: Quocirca     Published Date: Apr 23, 2007
The need to understand how the performance and problems within the technical infrastructure impacts the capabilities of the business is massive.  However, the majority of companies can only measure application and specific asset performance, whereas many issues within the infrastructure lie at the transport level, where packet switching presents both great opportunities and major issues.
Tags : networking, infrastructure, network management, tcp/ip protocol, wide area networks, wan, wans, packet switching, packets, protocol, data packet, business metrics, quocirca
     Quocirca
By: Okta     Published Date: Feb 24, 2015
This report summarizes the most important factors for deciding between Office 365 and on-premises systems to support e-mail, Web-based document sharing, unified and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses. communications, and other collaboration functions. It summarizes the major business and technical factors for evaluating Office 365, outlines the technical capabilities, migration options, and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses.
Tags : office 365, on-premises systems, web-based sharing, licensing and purchasing options, technical capabilities, migration options, coexistence, it management
     Okta
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Technical whitepaper uncovers the data protection capabilities and management tools of HPE SimpliVity hyperconverged infrastructure that deliver scalability, availability and performance.
Tags : 
     Hewlett Packard Enterprise
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com