RSS feed Get our RSS feed

News by Topic

scribe

Results 376 - 400 of 842Sort Results By: Published Date | Title | Company Name
By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
     Webroot
By: HP     Published Date: Jul 22, 2014
HP offers an approach to the modern data center that addresses systemic limitations in storage by offering Tier-1 solutions designed to deliver the highest levels of flexibility, scalability, performance, and quality—including purpose-built, all-flash arrays that are flash-optimized without being flash-limited. This white paper describes how, through the incorporation of total quality management throughout each process and stage of development, HP delivers solutions that exceed customer quality expectations, using HP 3PAR StoreServ Storage as an example.
Tags : 3par, storeserv, storage, data, solutions, flash
     HP
By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : san, storage area networks, vmware, software, migration
     HP Virtualization
By: HP     Published Date: Jun 02, 2008
VMware describes their partnership with HP storage and how the HP StorageWorks EVA4400 is a great fit for many small and medium businesses that want the advantages of virtualization.
Tags : hp eva 4000, hp eva 4400, storage, storage virtualization, virtualization, virtual storage
     HP
By: HP     Published Date: Oct 22, 2008
HP is pleased to introduce disk encryption for the HP StorageWorks XP24000 and HP StorageWorks XP20000 Disk Arrays. This white paper describes the encryption feature including the background of what the challenge is that the product addresses, what the feature consists of and how it is ordered.
Tags : disaster proof, 4aa2-2629enw, xp24000, xp20000, disk arrays, encryption, storageworks, security
     HP
By: HP     Published Date: Jun 05, 2014
Fast-growing data and widespread virtualization have ratcheted up data protection challenges no matter what the size of your business. This paper will describe the challenges of data protection, why deduplication is critical to meeting the challenges, how HP is achieving its vision of federated dedupe with StoreOnce – and what HP’s StoreOnce VSA announcement and achievement means to backup services providers, enterprises with remote or branch offices and small and medium businesses as well.
Tags : hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce
     HP
By: NetApp     Published Date: Mar 06, 2018
This Hyper Converged Infrastructure solution brief describes the key benefits of NetApp's next generation HCI solution including enterprise scale, efficient storage architecture, trustworthy data services, and IT operations transformation.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: IBM     Published Date: Jan 09, 2015
This Executive Summary of the Next Generation Data Center white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : service optimization, software defined environment, sde, network virtualization
     IBM
By: IBM     Published Date: Jun 16, 2015
This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures
     IBM
By: IBM     Published Date: Jul 14, 2016
This video describes how data scientists, analysts and business users can save precious time by using a combination of SPSS and Spark to uncover and act on insights in big data.
Tags : ibm, data, analytics, predictive business, ibm spss, apache spark, coding, data science
     IBM
By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast will describe the new features of TSM 6.1 and will recommend strategies for assessing your current environment, upgrading to 6.1 and how to maximize the monitoring benefits. We will include lessons learned and advice for avoiding pitfalls.
Tags : ibm, tivoli, storage manager, tsm, data management, assessment, remote administration, conversion
     Mainline Information Systems
By: IBM Corporation     Published Date: Jun 28, 2011
Their ability to deliver services is highly dependent upon their capability to operate with highly reliable and efficient IT operations. The changes described in this case study will help to assure they will be able to achieve that goal.
Tags : ibm, service management, tivoli, automation, it asset management, service request management, infrastructure, itil
     IBM Corporation
By: IBM     Published Date: Feb 25, 2008
This paper describes the evolution of IBM X-Architecture technology and demonstrates how the melding of industry-standard components with IBM innovation produces servers that offer you a unique set of capabilities with which to effectively manage your business. You’ll see why IBM systems equipped with X-Architecture technologies run faster—yet cooler—use less power, and are more reliable, easier to manage and better for virtualization than competitive servers, and offer a lower total cost of ownership (TCO).
Tags : servers, tco, total cost of ownership, energy, energy efficient, power, reduce power, ibm
     IBM
By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : bell micro, hardware, storage management, vmware, ibm xiv
     Bell Micro
By: IBM Corporation     Published Date: May 22, 2012
In this paper, Ptak/Noel describes the new IBM PureFlex system and the unique management capabilities of the IBM Flex System Manager.
Tags : datacenter management, pureflex, smarter computing, e ibm flex system manager, ibmsmartcloud
     IBM Corporation
By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
     IBM
By: GE Healthcare     Published Date: Mar 04, 2014
Why prepare now for ICD-10? While the October 1, 2014 deadline for compliance may seem to be in the distant future, an informative whitepaper by GE Healthcare describes the importance of advance planning and outlines a plan for success.
Tags : ge healthcare, icd-10, service delivery, billing, claims processing, reimbursement, project management, emr
     GE Healthcare
By: Hewlett-Packard     Published Date: May 13, 2008
Describes the growing need for data backup and recovery solutions, the advantages of disk-based systems, and the software required to manage these systems. The paper also looks at the role of Hewlett Packard's Data Protector software in this strategically important market.
Tags : hp data protection, data protection, idc, analyst, backup, storage, recovery, storage virtualization
     Hewlett-Packard
By: NetApp     Published Date: Aug 26, 2016
Flash storage is taking the enterprise market by storm. With all-flash arrays (AFAs) now available from every major enterprise storage vendor, they are quickly becoming a mainstream general purpose deployment platform for mixed workloads. According to IDC, flash technology will come to dominate primary storage platforms by 2020. Read this independent whitepaper to learn what sets the NetApp AFF apart from other AFAs on the market, and discover why IDC describes the AFF as “the crown jewel” in the NetApp portfolio of all-flash storage solutions.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery.
Tags : dedupe, storeonce, deduplication, backup, data recovery
     Sponsored by HP and Intel®
By: Cisco     Published Date: Dec 21, 2016
As digital workplace initiatives grow, it is vital to examine their impact through a financial business case to obtain funding, structure stakeholder dialogue and secure commitment. Here, we describe how IT leaders can create a convincing business case with a strong link to business benefits
Tags : 
     Cisco
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
     CA Technologies
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics