RSS feed Get our RSS feed

News by Topic

technical

Results 151 - 175 of 596Sort Results By: Published Date | Title | Company Name
By: CA Technologies EMEA     Published Date: Aug 07, 2017
Generate rich virtual data that covers the full range of possible scenarios and provide the unconstrained access to environments needed to deliver rigorously tested applications on time and within budget. Model complex live system data and apply automated rule-learning algorithms to pay off technical debt and uncover in depth understanding of composite applications, while exposing virtual data to distributed teams on demand and avoiding testing bottlenecks.
Tags : virtual services, data, avoid project delays, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
     CA Technologies EMEA
By: Schneider Electric     Published Date: Feb 12, 2018
This white paper explains the technical terms of power factor, crest factor, and surge factor. The use of these terms in specifying UPS is explained.
Tags : 
     Schneider Electric
By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
     Cohesity
By: IBM APAC     Published Date: May 14, 2019
Machine Learning For Dummies, IBM Limited Edition, gives you insights into what machine learning is all about and how it can impact the way you can weaponize data to gain unimaginable insights. Your data is only as good as what you do with it and how you manage it. In this book, you discover types of machine learning techniques, models, and algorithms that can help achieve results for your company. This information helps both business and technical leaders learn how to apply machine learning to anticipate and predict the future. You will find topics like: - What is machine learning? - Explaining the business imperative - The key machine learning algorithms - Skills for your data science team - How businesses are using machine learning - The future of machine learning
Tags : 
     IBM APAC
By: Cisco     Published Date: Sep 27, 2018
As the world of traditional manufacturing fuses with information technology, organizations are tapping into a level of technical orchestration never attainable before. Symphonies of systems facilitate real - time interactions of people, machines, assets, systems, and things. This is the Smart Factory; the factory ecosystem of the future. It is an application of the Industrial Internet of Things (IIoT) built with sets of hardware and software that collectively enable processes to govern themselves through machine learning and cognitive computing
Tags : 
     Cisco
By: Lenovo and Microsoft     Published Date: Aug 13, 2013
In the wake of major security, management, and interface limitations, Microsoft has decided to end support for Windows XP. This decision has important implications for corporate management as it presents a number of risk, security, operations, and compliance issues. This white paper looks at the top five issues that business management must be aware of and provides non-technical business justifications for driving a migration program forward.
Tags : windows xp, migration, managment, top 5 threats to business
     Lenovo and Microsoft
By: Diligent     Published Date: Aug 05, 2016
When organizations engage a board portal provider, they are entrusting them to safeguard sensitive documents and provide a system for managing access to those documents. This trust goes beyond technical specifications.
Tags : board portal, document management, security management
     Diligent
By: Panaya     Published Date: May 31, 2018
When it comes to investing in ERP systems, improving the efficiency and responsiveness of business processes is a top concern for SAP customers. However, among IT professionals, safe delivery is of higher priority than ERP digitalization or starting an IT agility transformation. With SAP S/4HANA, this no longer needs to be a compromise. When moving to SAP S/4HANA, IT professionals need to implement not only the technical upgrade of SAP S/4HANA but also the required customizations, which necessitate an intensive amount of business collaboration and software delivery. And for that to happen, IT needs an enterprise agile delivery solution to gather and implement the business requirements to SAP S/4HANA as quickly as possible without business disruption. Read this white paper to discover how you can transition to SAP S/4HANA and achieve true enterprise agile delivery — a new standard to deliver changes to your SAP environment. Topics include: › Sync business and IT to ensure your ERP solu
Tags : 
     Panaya
By: Pure Storage     Published Date: Apr 10, 2019
This document describes the technical reasons for and benefits of an end-to-end training system and why the Pure Storage® FlashBlade™ product is an essential platform. It also shows performance benchmarks based on a system that combines the NVIDIA® DGX-1™, a multi-GPU server purpose-built for deep learning applications and Pure FlashBlade, a scale out, high performance, dynamic data hub for the entire AI data pipeline.
Tags : 
     Pure Storage
By: Drillinginfo     Published Date: Nov 17, 2015
For this edition of the DI expert series, we’ve prepared some remarkable technical insights regarding the geology of the top plays and emerging formations in the U.S. From comparing the efficiency of Wolfcamp production intervals with the Cline Shale in West Texas, to providing spatial distribution analyses and production trends for the Canyon Granite Wash in the Anadarko, our experts evaluated the complexities of prolific oil and gas regions and outlined essential takeaways. We also examined the sweet spots of the Mississippi Lime play, and offer insights regarding optimal target of penetration for this highly porous, commercially developed region. Lastly, we explored the geology of the world-renowned Eagle Ford Shale Play in the Gulf Coast Basin and provided observations regarding the influence of stress on this prominent play.
Tags : geology, shale, play, technical, insight, formations, efficiency, distribution
     Drillinginfo
By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
     Forcepoint
By: Cloud Direct     Published Date: Jan 17, 2018
Azure Site Recovery replicates your on-premises physical servers and virtual machines to Azure. If an outage occurs in your primary location, you failover to the DRaaS platform within minutes and your applications and workloads will be available. When normal operations resume, you can failback to your primary location. For added reassurance, Cloud Direct is a Microsoft Gold Partner. This means in addition to our own 24/7 support, we also benefit from direct access to Microsoft support for a range of hosting scenarios – including SQL Server, Exchange and SharePoint.
Tags : business, cloud solutions, data centre, smb, systems, technical
     Cloud Direct
By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
     NetApp
By: IBM     Published Date: Jun 16, 2015
IBM takes a broadly integrated approach to hardware, software and multi-vendor support that can help you find new ways to help simplify IT asset management, enhance quality and control costs.
Tags : technology infrastructure, virtualization, it business solutions, software service services, best practices, infrastructure management, technical support relationship, dynamic infrastructure
     IBM
By: IBM     Published Date: Jun 16, 2015
This white paper discusses the different support challenges that can confront you when implementing a smarter infrastructure that includes new solutions like cloud initiatives, virtualized environments and other new breeds of computer models. To keep these solutions running daily, you should consider the level of support that will be required.
Tags : it infrastructure, business intelligence, it solutions, cloud solutions, virtualized environments, it maintenance, it support
     IBM
By: IBM     Published Date: Jun 16, 2015
This brochure talks about the IBM Technical Support Services and it helps: Mitigate business risk with services from a forward-thinking industry innovator, Enhance IT availability with a virtually unmatched global infrastructure, Support your unique needs with extensive, flexible and customizable service options, Facilitate easier access to the support you need, Reduce complexity with a single point of contact for nearly all your IT needs, and Facilitate a positive return on investment and performance results
Tags : it technical support, it availability, support services, return on investment, performance results, global infrastructure, infrastructure management
     IBM
By: Cisco     Published Date: Jun 29, 2015
Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.
Tags : csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation
     Cisco
By: KPMG     Published Date: Jul 18, 2018
As IT spend on cloud continues to rise, one survey of technical professionals estimated as much as 45% could be wasted. Is your organisation staying on top of expenditure? Read this article to find out: • why cloud costs can be so difficult to manage • how to identify and execute wide-scale savings • which five levers to use to manage costs – and the potential reductions each can deliver. Read the insight now:
Tags : 
     KPMG
By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
     CA WA 2
By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : protection, ddos, security, reporting, organization, device
     F5 Networks Inc
By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern
     Progress Software Corporation CEP
By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: LogMeIn     Published Date: Mar 01, 2012
This guide will identify some key ways to keep the Service Desk human and ensure that customer service stays at the front and centre of everything that the Service Desk does.
Tags : customer service, customer support, technical support, service support, service desk, technology
     LogMeIn
By: LogMeIn     Published Date: Mar 01, 2012
Uncover the top eight reasons why you should upgrade your remote support. Don't let customer service fall by the wayside, upgrade to a state-of-the-art solution now!
Tags : remote support, customer support, technical support, technology, it support, customer satisfaction
     LogMeIn
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics