RSS feed Get our RSS feed

News by Topic

technical

Results 26 - 50 of 579Sort Results By: Published Date | Title | Company Name
By: Aruba Networks     Published Date: May 21, 2013
A Farpoint Group Technical Note: 802.11ac: What’s New and Important
Tags : aruba, aruba networks, farpoint technical note, eee 802.11ac standard, lans, phy, wi-fi alliance
     Aruba Networks
By: GlobalSpec     Published Date: Nov 21, 2008
Gain practical tips for making marketing work in a difficult business environment, helping to prevent a downward spiral of falling behind, gain market share from competitors who cut back, and position your company for a surge when conditions improve.
Tags : globalspec, engineering, technical, industrial marketers, marketing investments
     GlobalSpec
By: IBM     Published Date: Feb 19, 2013
This technical white paper presents benchmark results showing greater VM consolidation ratios than demonstrated in previous benchmarks and demonstrating the extent of the performance lead that PowerVM virtualization technologies provide.
Tags : 
     IBM
By: HP Inc.     Published Date: Jul 17, 2017
Three-dimensional printing of useful objects and machine parts is becoming a reality. 3D printing offers the ability to produce—both rapidly and at low cost—short runs or one-of-a-kind parts. HP’s development of HP Multi Jet Fusion technology includes new HP Jet Fusion 3D Printers and an Open Platform that will revolutionize the design, materials, manufacturing, and distribution of 3D parts to drive the digital transformation of manufacturing. This technical white paper provides details on HP Multi Jet Fusion and HP’s strategies and vision to introduce a new era of digital manufacturing.
Tags : print services. hp technology, 3d printing, printer, digital manufacturing, printing solution, digital materials, production software, 3d technology
     HP Inc.
By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : dlp, data loss, security, best practices
     CDW
By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.ą IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : protection, ddos, security, reporting, organization, device
     F5 Networks Inc
By: Liaison Technologies     Published Date: Feb 07, 2014
This how-to-guide has been designed to help you better evaluate a VAN provider and determine the real value of the offer.
Tags : liaison, van, value-added network, transaction management, real value, reduce errors, accuracy of data, provider consolidation
     Liaison Technologies
By: SAS     Published Date: Jun 06, 2018
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
     SAS
By: SAS     Published Date: Oct 18, 2017
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
     SAS
By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : security, technology, best practices, information technology, cyber threats, mobility
     LogRhythm
By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : microsoft sharepoint, data integration, security, sharepoint solutions
     K2
By: Oracle Corporation     Published Date: Apr 01, 2013
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
Tags : database, oracle, storage, data, data warehousing
     Oracle Corporation
By: Oracle     Published Date: Apr 04, 2012
This white paper examines how the versatile design of the Oracle SPARC SuperCluster T4-4 along with powerful, bundled virtualization capabilities makes it an ideal platform for consolidating enterprise servers and workloads and deploying apps.
Tags : supercluster, sparc, t4-4, workloads, oracle exalogic elastic cloud, oracle, elastic capacity, infrastructure
     Oracle
By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security
     Webroot
By: Workforce Software     Published Date: May 26, 2015
In this informative webinar Jason Chester, the CEO and Director of Research for Infogencer, will outline his organisation’s findings on the business challenges surrounding absence management and share insights on addressing these challenges from both a technical and a business perspective.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor
     Workforce Software
By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
     Group M_IBM Q2'19
By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This technical white paper outlines the mission critical reference configuration that is part of the HP Virtual System family.
Tags : virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
     HP - Intel® Xeon® processors
By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : technology, clustrix, online advertising, real time bidding, database, analytics
     Clustrix
By: Dell EMC Storage     Published Date: Mar 27, 2019
This ESG Technical Review documents evaluation of Dell EMC Ready Solutions for AI. We focused on understanding the performance and ease of use of the Ready Solutions for AI with optimized designs for machine learning and deep learning. To validate the full stack performance, we measured the number of images per second processed when training the AlexNet and ResNet50 deep learning networks and evaluated how the integrated solutions can simplify and accelerate AI deployment. The Deep Learning with NVIDIA design featuring Isilon significantly outperformed the competition in training time, delivering 2.9 times the performance of one competitor for an AlexNet deep learning neural network in a GPU accelerated environment and 2.3 times another competitor for a ResNet50 deep learning neural network.
Tags : 
     Dell EMC Storage
By: Dell EMC     Published Date: Mar 27, 2019
This ESG Technical Review documents evaluation of Dell EMC Ready Solutions for AI. We focused on understanding the performance and ease of use of the Ready Solutions for AI with optimized designs for machine learning and deep learning. To validate the full stack performance, we measured the number of images per second processed when training the AlexNet and ResNet50 deep learning networks and evaluated how the integrated solutions can simplify and accelerate AI deployment. The Deep Learning with NVIDIA design featuring Isilon significantly outperformed the competition in training time, delivering 2.9 times the performance of one competitor for an AlexNet deep learning neural network in a GPU accelerated environment and 2.3 times another competitor for a ResNet50 deep learning neural network.
Tags : 
     Dell EMC
By: Cisco     Published Date: Jun 29, 2015
Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.
Tags : csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation
     Cisco
By: Cisco     Published Date: Feb 16, 2016
Since the 1990s, email has evolved from a tool used primarily by technical and research professionals to become the backbone of corporate communications. Each day, more than 100 billion corporate email messages are exchanged.1 Security has naturally become a top priority. But mass spam campaigns are no longer the only security concern.
Tags : cisco, email threat, data, data security, information security, security
     Cisco
By: Group M_IBM Q3'19     Published Date: Jun 21, 2019
This paper explores the merits of agile integration architecture--a container-based, decentralized, and microservices-aligned approach for integration solutions that meets the demands of agility, scalability, and resilience required by digital transformation.
Tags : 
     Group M_IBM Q3'19
By: RedHat     Published Date: May 10, 2017
A practical path to IT modernization powered by Intel and Red Hat This paper discusses the challenges involved in making this decision and offers recommendations as to how to approach IT modernization in a pragmatic, structured way.
Tags : intel, red hat, it modernization, agility, efficiency, reduce costs
     RedHat
By: Winshuttle     Published Date: Dec 04, 2006
This article describes an easy non-technical alternative to LSMW to update customer master records in SAP in fewer steps than LSMW, without technical involvement, and without requiring authorizations in SAP.
Tags : sap, master record, master records, legacy system migration workbench, lsmw, data migration, data management, winshuttle
     Winshuttle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics