structure

Results 526 - 550 of 4888Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Mar 13, 2008
The Average Inc. could do quite a lot to improve the ways it uses technology in order to reduce risk, ensuring business continuity, and to cut unnecessary cost. If Average Inc. needs to improve its use and management of its ICT infrastructure, then that means most real companies do as well.
Tags : ict, quocirca, communications, infrastructure, business continuity
     Quocirca
By: Schneider Electric     Published Date: Jun 04, 2014
While many who invest in Data Center Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolset’s ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
Tags : schneider, electric, dcim, solution, invest, infrastructure, management, software, it management, data management
     Schneider Electric
By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks, data center
     Noction
By: HP and Intel ®     Published Date: May 27, 2014
This document from IDC discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
     HP and Intel ®
By: HP     Published Date: May 27, 2014
This document discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
     HP
By: Silver Peak     Published Date: Jun 24, 2013
With key productivity applications becoming more bandwidth, processing and storage-intensive, dwp turns to Silver Peak Virtual Acceleration Open Architecture software to accelerate its file transfers and optimize WAN performance.
Tags : wan, productivity, reducing infrastructure costs, silver peak, collaboration
     Silver Peak
By: AWS     Published Date: Oct 31, 2018
In this panel discussion, AWS will join APN IoT Competency Partners, Bsquare (device management software and services), Eseye (global cellular connectivity), and Intel (edge-to-cloud IoT platform spanning sensors, processors, IoT gateways), and cloud infrastructure, for a conversation about the challenges and opportunities of device management. Find out how enterprises can accelerate time to business value with an integrated and fully-managed approach to their connected devices.
Tags : aws, iot, device, management, aws
     AWS
By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
     Amazon Web Services
By: Amazon Web Services     Published Date: Apr 11, 2018
Effectively monitoring and managing cloud infrastructure configuration changes and performing on-going vulnerability analyses through forensics, troubleshooting, audits, and automation are key activities to help secure your AWS environment.
Tags : 
     Amazon Web Services
By: Jelecos     Published Date: Feb 11, 2019
The AWS Well-Architected framework has been developed to help cloud architects utilize best practices to build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for Jelecos and its customers to evaluate architectures and provides guidance to help implement designs that will scale with your application needs over time.
Tags : 
     Jelecos
By: Microsoft Azure     Published Date: Apr 11, 2018
Spend more time building great apps and less time managing server infrastructure. Get your solutions to market faster using Azure Functions, a fully managed compute platform for processing data, integrating systems, and building simple APIs and microservices. In this e-book you’ll find use cases, hands-on steps, and tutorials for quickly configuring your own serverless environments. Explore best practices for Functions, and learn how to: Develop event-based handlers on a serverless architecture. Test, troubleshoot, and monitor Azure functions. Automate administrative tasks from development through to deployment and maintenance. Integrate Functions with other Azure services. Build stateful serverless apps and self-healing jobs using Durable Functions. Download the 325-page serverless computing e-book and get access to dozens of step-by-step recipes for quickly building serverless apps.
Tags : 
     Microsoft Azure
By: QuickPivot     Published Date: Aug 26, 2015
Direct mail creates opportunities that old time direct marketers never imagined.
Tags : direct mail, infrastructure, data, response rate
     QuickPivot
By: EMC Backup & Recovery Solutions     Published Date: Apr 02, 2010
EMC backup and recovery solutions for VMware combine industry-leading deduplication storage and software to help you fully realize the benefits of virtualization. VMware servers consolidate production workloads well, but backups create bottlenecks that tax network and storage resources.
Tags : emc, data domain, efficiency, vmware, vcenter, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
     EMC Backup & Recovery Solutions
By: Oracle Corporation     Published Date: May 11, 2012
This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data.
Tags : oracle, data warehousing, database, exadata, database machine, infrastructure, operation, operation costs, mobile, growth, payback, architecture, demands, enterprise applications, data management
     Oracle Corporation
By: EMC Backup & Recovery Solutions     Published Date: Apr 28, 2010
This document showcases EMC's portfolio of backup and recovery products and describes how they provide the flexibility and scalability to meet the data protection needs of enterprises of all sizes.
Tags : emc, data domain, efficiency, api, disk backup, recovery, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
     EMC Backup & Recovery Solutions
By: IBM     Published Date: Jul 07, 2015
Learn about information integration and governance for data warehousing and big data and analytics.
Tags : data warehouse, bad data, big data, mobility, compute-intensive apps, virtualization, cloud computing, scalable infrastructure, reliability, data management, data center
     IBM
By: Quinstreet - Netapp     Published Date: Jun 11, 2012
After years of adding servers and storage hardware to keep up with demand, the Balwin-Wallace College invested in an initiative to virtualize and consolidate its sprawling computing and storage infrastructure. Download this study to see the results.
Tags : netapp, network storage, cloud computing, virtualization, storage efficiency, data storage, information management, nas, storage
     Quinstreet - Netapp
By: EMC Corporation     Published Date: Jun 12, 2012
Due to rapid data growth and an ambitious virtualization plan, the Belgian town of Balen needed a more cost-effective and scalable storage solution. Find out about how Balen used EMC VNXe to solve their problems in this complimentary case study!
Tags : emc vnx, balen, emc vnxe, san, nas, backup, emc, idc analyst report, virtualization, backup and recovery, vm sprawl, vmware, disaster recovery, infrastructure, avamar, storage
     EMC Corporation
By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
     Splunk
By: IBM     Published Date: Apr 09, 2015
This white paper provides an overview of how cybercriminals circumvent security measures at each stage of a transaction’s lifecycle—pre-login, during login and post-login—and offers strategies to help financial organizations combat malware-driven attacks.
Tags : ibm, it security, password security, malware prevention, security infrastructure
     IBM
By: Red Hat     Published Date: Dec 15, 2015
Bayer Business Services, the Bayer Group’s global competence center for IT and business services, was looking for a way to reduce costs while maintaining the quality of its mission-critical SAP infrastructure.
Tags : 
     Red Hat
By: IBM     Published Date: Nov 03, 2014
Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.
Tags : infrastructure visibility, it complexity, search analytics, problem identification, it management, data management
     IBM
By: IBM     Published Date: Oct 14, 2009
Web conferencing tools ensure that face-to-face meetings can still take place while removing the costs associated with business travel. Now available as a service with no infrastructure costs, these solutions are being used by savvy companies to go more places than boarding a plane or getting in a car allows.
Tags : web conferencing, ibm, infrastructure cost, smb, saas, software-as-a-service, sametime unyte, spend management, travel, productivity
     IBM
By: HPE     Published Date: Feb 11, 2015
It’s essential to align critical applications and infrastructure with your overall modernization program to address risk, optimize benefits, and prioritize your business needs.
Tags : 
     HPE
By: Symantec     Published Date: Apr 09, 2012
In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. Find out more about SSL - in this complimentary white paper!
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
     Symantec
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com