RSS feed Get our RSS feed

News by Topic

virtual pc

Results 26 - 45 of 45Sort Results By: Published Date | Title | Company Name
By: Intel     Published Date: Jun 10, 2011
Join Intel IT leaders and participating companies HP, Lenovo, Absolute Software, Citrix, and Symantec for a morning packed with the latest technology, expert advice and demos.
Tags : business technology, intel, cloud, data, client security, desktop virtualization, kvm, encryption
     Intel
By: IBM     Published Date: May 04, 2009
The latest servers from IBM have one thing in common - the new Intel Xeon 5500 series processors. This white paper will explain the benefits of the new processors, including speed and performance.
Tags : ibm, express seller, virtualization, intel, xeon, processor, 5500, bladecenter
     IBM
By: IBM     Published Date: May 04, 2009
Intel faces a familiar challenge: do more with less. With compute capacity growing exponentially and chip size expectation shrinking, the new 5500 series delivers on both fronts. This white paper delivers test results that show increased performance and speed along with greater efficiency.
Tags : ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x
     IBM
By: IBM     Published Date: Oct 21, 2009
This paper examines the impact and adoption rates of 11 Green IT initiatives in mid-size organizations around the world.
Tags : green it, ibm, server virtualization, storage consolidation, desktop virtualization, pc power management, printer consolidation, remote conferencing
     IBM
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : security
     CDW-Trend Micro
By: Amazon     Published Date: Nov 07, 2013
This planning and implementation guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) to run a high-availability and site-resilient Exchange architecture.
Tags : amazon web services, microsoft exchange, aws cloud, cloud, web services, servers, processor, memory
     Amazon
By: LiveOps     Published Date: Oct 05, 2010
Over the past decade, organizations have been increasingly moving away from environments where data is centrally accessed and stored and into distributed, more efficient virtualized environments.
Tags : liveops, contact center, security, cloud, virtualization, virtual, infrastructure, network security
     LiveOps
By: LiveOps     Published Date: Nov 15, 2010
While delivering software as a service (SaaS) from the cloud has distinct advantages, the market is so filled with hype, it is difficult to decipher between what is myth and what is reality.
Tags : liveops, contact center, security, cloud, virtualization, virtual, infrastructure, network security
     LiveOps
By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : aerohive, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services
     Aerohive
By: Aerohive     Published Date: Apr 11, 2012
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase.
Tags : aerohive, wlan, lan, branch office, cloud computing, remote networks, vpn, cloud enabled networking
     Aerohive
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
     Mentor Graphics
By: HP     Published Date: Apr 13, 2014
Cut the cost and complexity of managing you large, hybrid server estate. Learn how Turkcell, the leading GSM operator in Turkey, reaps benefits from server automation including reductions in the time needed to check adherence to security compliance policies from 55 hours to 20 minutes and cutting the time taken to provision virtual PCs from five days to 40 minutes.
Tags : hp operations orchestration, hp server automation, hp support, it case study, turkcell, bsm, business service management
     HP
By: VMware     Published Date: Sep 20, 2018
Download the new white paper from VMWare that explores the possibilities of virtualizing HPC throughput in computing environments.
Tags : vmware, hpc, high powered computing, virtual hpc
     VMware
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Virtela is unique in its ability to meet these challenges for the enterprise participating on the global stage. This paper outlines the capabilities and benefits of Virtela's Global Service FabricSM.
Tags : virtela, business continuity, global service fabric, virtual network operator, vno, gsf, rpc, multi-carrier routing
     Virtela Communications, Inc.
By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security
     Red Hat
By: Citrix Systems     Published Date: Oct 08, 2012
Today's organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working with demanding high-end applications, to task workers performing standard, relatively predictable processes. A one-size-fits-all approach to desktop virtualization cannot meet all the different requirements of these users.
Tags : citrix, desktop, virtualization, shared desktop, remote pc
     Citrix Systems
By: ipoque     Published Date: Feb 14, 2019
Area of business ? Leader in virtualized mobile networks, providing virtualized network solutions to top-tier CSPs Challenge ? vEPC helps CSPs transform their network architecture in order to move to SDN/NFV, reducing overall costs ? Providers of virtualized network solutions have to create a market differentiator to assert their position successfully in an increasingly competitive marketplace Solution ? By embedding the easy-to-implement highperformance DPI-engine R&SŪPACE 2 from Rohde&Schwarz, the vEPC vendor can focus on their core competencies in NFV and gain a competitive advantage in the rapidly growing NFV market Benefits ? The strong partnership between the vEPC vendor and Rohde&Schwarz ensures the high performance of the vEPC solution ? Sourcing R&SŪPACE 2 guarantees a rap
Tags : 
     ipoque
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics