Results 551 - 575 of 899Sort Results By: Published Date | Title | Company Name
By: Pure Storage     Published Date: Oct 09, 2018
Flash-Storage dringt immer mehr in die Mainstream-Datenverarbeitung vor. Dadurch verstehen die Unternehmen zunehmend nicht nur die Performance-Vorteile, sondern auch die sekundären wirtschaftlichen Vorteile, die mit einer Flash-Implementierung im großen Maßstab verbunden sind. Dank der Kombination all dieser Vorteile – geringere Latenzen, höherer Durchsatz und größere Bandbreite, höhere Storage-Dichten, deutlich geringerer Energie- und Platzbedarf, höhere CPU-Auslastung, geringerer Bedarf an Servern und damit verbunden geringere Softwarelizenzgebühren, geringere Administrationskosten und eine größere Zuverlässigkeit auf Einheitenebene – erweist sich die Verwendung von AFAs als eine wirtschaftlich überzeugende Alternative zu den herkömmlichen Storage -Architekturen, die ursprünglich für Festplattenlaufwerke (HDDs) konzipiert waren. Während die Wachstumsraten für Hybrid-Flash-Arrays (HFAs) und für ausschließlich in Verbindung mit HDDs verwendete Arrays steil nach unten gehen, gehören die
Tags : 
     Pure Storage
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”
Tags : 
     Hewlett Packard Enterprise
By: IBC365     Published Date: Aug 08, 2019
FTP was developed in 1971, and a lot has changed in the decades since it was first created. Though the protocol has seen improvement over the years, there are some fundamental drawbacks to relying on this old technology for transferring today’s large media files.
Tags : 
By: Red Hat APAC     Published Date: Jul 16, 2019
https://asset.madisonlogic.com/production/asset-approval/35341_78975_preview.html?v=1563344610178 Red Hat CTO for global service providers, Ian Hood, and TelecomTV talk about multi edge compute capacity and the fundamental need to have a common platform to deliver future services. ‘If you are not feeling some pain, you are not driving fast enough’, says Red Hat CTO, Global Service Provider, Ian Hood. The race to 5G is definitely on, and the use cases are clear. You can talk about multi edge compute capacity and other technical issues, but the fundamental thing is to have a common platform to deliver future services. We need to get to the point where IoT Everywhere, virtualized video and all the applications that come from new 5G services are delivered seamlessly. Even blockchain has a clear future within the telco environment where the world of eSIMs, secure roaming charges and identity management can alls be based on blockchain technology.
Tags : 
     Red Hat APAC
By: Palo Alto Networks     Published Date: Dec 11, 2013
Oferecido por um Tempo Limitado. Obtenha Sua Cópia Hoje. Tome uma decisão informada sobre o firewall correto para sua empresa com O Guia do Comprador para Firewall. Esse guia oferece: - Os fundamentos da tecnologia de firewall moderno - Os dez requisitos críticos de negócios que seu próximo firewall precisa atender - Informações sobre como criar uma solicitação para proposta (SPP) de vendedor - Um plano de teste funcional para auxiliar no processo de seleção de firewall
Tags : firewalls, tecnologia, palo alto
     Palo Alto Networks
By: Oracle     Published Date: Apr 16, 2018
Cerca de 62% dos CFOs entrevistados pela Fuqua School of Business da Duke University afirmam que o ritmo da mudança e da inovação em seus setores acelerou. As empresas precisam estar prontas para mudar seu foco, mas onde os CFOs devem concentrar sua atenção em 2018? Steve Cox, vice-presidente de marketing de produtos de ERP e de EPM do grupo Oracle, fala sobre ações fundamentais orientadas à tecnologia.
Tags : voce, precisa, saber, atualizar, otimizar, financeira, maneira
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Today's internet-dependent business landscape demands frequent system changes, higher throughput and increased reliability. If your new features and fixes do not hit the digital market quickly, user experience, customer retention and revenue all take a hit. DNS however, is a tool that can be used to both mitigate problems and optimize the performance and delivery of these systems. Read the latest O'Reilly book to understand how the DevOps approach combined with the fundamentals of DNS can: • Use DNS as a means of distribution, deployment and high-availability • Mitigate failure and minimize risk • Improve system reliability and management Get the O'Reilly Book! "
Tags : 
     Oracle + Dyn
By: Pure Storage     Published Date: Jan 12, 2018
Interest in machine learning has exploded over the past decade. You see machine learning in computer science programs, industry conferences, and the Wall Street Journal almost daily. For all the talk about machine learning, many conflate what it can do with what they wish it could do. Fundamentally, machine learning is using algorithms to extract information from raw data and represent it in some type of model. We use this model to infer things about other data we have not yet modeled. Neural networks are one type of model for machine learning; they have been around
Tags : learning machines, automated intelligence, scalars, vectors, mathematics, classification, pure storage
     Pure Storage
By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
     CA Technologies
By: Achievers     Published Date: Jan 17, 2014
Today’s workforce is fundamentally changing. Organizations are flatter, more agile, and require even better retention strategies. HR professionals and business leaders agree on the importance of attracting, retaining, and cultivating top talent. An employee rewards and recognition program that has the buy-in and support of business leaders can transform your corporate culture, making your organization a great place to work, building your brand as a top employer, delighting your customers with your service, and reaping the financial benefits that come from Employee Success. Download this white paper, Obtaining executive buy-in for recognition programs, and obtain best practices to sell the vision of a rewards and recognition program to your CFO.
Tags : employee success, employee recognition, employee engagement
By: Dell EMC EMEA     Published Date: May 08, 2019
Quanto tempo è necessario al tuo team IT per fornire ai dipendenti un batch di cinque notebook con provisioning completo? E per cento notebook? Per mille? A seconda delle dimensioni del tuo ordine, il tempo necessario per configurare manualmente questi dispositivi, combinato con la logistica di spedizione, potrebbe significare giorni o settimane di ritardi per il tuo utente finale. Dell Provisioning per VMware Workspace ONE® è in grado di risolvere questo problema con un intervento minimo da parte dell'IT.
Tags : 
     Dell EMC EMEA
By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
By: Epicor     Published Date: Jan 09, 2019
For some, “Industry 4.0” and “digital transformation” are synonymous—alternative terms for the fundamental business changes facing manufacturers. For others, the former refers more narrowly to a set of manufacturing technologies at the heart of a wider digital transformation.
Tags : 
By: Reputation.com     Published Date: Sep 26, 2016
This guide will give you the fundamentals of Online Reputation Management, to help you: Earn more positive reviews Raise your search ranking Improve patient experience
Tags : 
By: Dell EMC EMEA     Published Date: Nov 22, 2018
Hardwaretechnologie kann nicht endlos genutzt werden. Sie hat einen Lebenszyklus mit einem messbaren Beginn und Ende von Produktivität und Nutzen. Die IT verfolgt die Aufgabe, den PC-Lebenszyklus zu optimieren und gleichzeitig für ihr Unternehmen einen strategischen Durchbruch zu erzielen. Aufgrund der Kosten und Komplexität des PC-Managements bleibt der IT jedoch nur wenig Zeit für Innovationen. Wir bieten flexible Finanzierungsoptionen, die dafür sorgen, dass der IT-Abteilung alle erforderlichen Ressourcen zum richtigen Zeitpunkt zur Verfügung stehen, damit die Endnutzer beschäftigt und produktiv sind. Erfahren Sie mehr über Dell Lösungen mit Intel® Technologie.
Tags : 
     Dell EMC EMEA
By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Lidiar con el coste y la complejidad que impone la gestión de los PCs deja poco tiempo para la innovación. Las actuales tecnologías y necesidades comerciales, que evolucionan rápidamente, hacen que haya menos oportunidades para sacar provecho de las nuevas tendencias que están cambiando la forma en que se suministra y consume la tecnología. Y, por supuesto, la tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : optimizacion, ciclo, intel, dell
     Dell PC Lifecycle
By: Oracle     Published Date: Nov 16, 2017
The fundamental reasons to move to a cloud computing environment are the business agility, high efficiency, scalability, and availability that the pooling of elastic computing resources provides, along with significant cost reductions and support for business growth. Oracle has invested deeply in developing a broad collection of cloud services with solutions at every layer of the technology stack.Customers who deploy these solutions in Oracle Cloud derive huge benefit from the fact that they have access to Oracle’s entire technology stack in the cloud, just as they did in on-premises deployments. This white paper explains how you, as an existing Oracle E-Business Suite customer, can take advantage of cloud computing right now, by exploiting the capabilities of Oracle’s Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) offerings to support growth, enhance business agility, and reduce costs and risks.
Tags : 
By: Netezza IBM US     Published Date: Mar 27, 2012
This eBook will explain the fundamental differences between the IBM Netezza 1000 and Oracle Exadata solutions. You will learn which solutions best meet your business needs and how to achieve optimal results from your data.
Tags : ibm, netezza, exadata, technology, data center, data management, oracle exadata solutions
     Netezza IBM US
By: Oracle     Published Date: Apr 03, 2012
SOA implementations tend to be complex, IT decision makers should carefully consider their choice of a SOA platform in terms of its ability to simplify the fundamental development, deployment, and management tasks involved. Read on.
Tags : oracle soa, 11g, oracle, design, eploy, applications, business applications, features
By: Oracle     Published Date: Aug 02, 2018
Oracle Database powers your business’s mission-critical applications. Their downtime and data loss can have a devastating impact on your company’s bottom line and productivity—not to mention the damage to your company’s (and your) reputation, because outages and data losses make headlines.
Tags : 
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
     CA Technologies
By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric
By: Dell EMC Storage     Published Date: Aug 15, 2019
Perseguire l'agilità per influire realmente sulla trasformazione dell'attività richiede l'adozione del rinnovo del data center come competenza principale. Per questo è fondamentale disporre dell'infrastruttura IT più aggiornata che possa supportare la portata e la complessità di un ambiente tecnologico in evoluzione. Le aziende devono sostenere questo imperativo adottando principi di data center definito dal software, eseguendo il rinnovo e automatizzando i processi di gestione dell'IT. Quelle che agiscono in tal modo, favoriranno l'innovazione aziendale e offriranno un'esperienza del cliente superiore con tecnologie aziendali veloci, sicure e affidabili. A dicembre 2018, Dell Technologies ha commissionato a Forrester Consulting la valutazione del valore per il business dell'infrastruttura moderna nei data center aziendali. Per analizzare questo argomento, Forrester ha condotto una survey online su 508 responsabili delle decisioni in ambito di tecnologia dell'infrastruttura IT. Questo
Tags : 
     Dell EMC Storage
By: Compuware     Published Date: Jul 20, 2010
Cloud computing is driving a fundamental shift in the way organizations build, deploy and use applications, and it's raising expectations on how quickly and cost-effectively new IT functionality can be made available to the business.
Tags : compuware, cloud, computing, borderless applications, diversity chain, on-demand, virtualization
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com