Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

base

Results 1 - 25 of 4858Sort Results By: Published Date | Title | Company Name
Published By: SimpliVity     Published Date: Jan 04, 2016
The hyperconvergence story has many chapters. In this small book, I discuss the trends that are leading modern IT to hyperconverged infrastructure. I also discuss both the technical and business benefits that come from implementing a data center based on hyperconverged infrastructure.
Tags : 
simplivitydcd, data center design and management
    
SimpliVity
Published By: Schneider Electric     Published Date: May 05, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
datacenters, tco, capacity, modular design, load, cost, architecture, networking
    
Schneider Electric
Published By: Schneider Electric     Published Date: Aug 21, 2017
A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”.
Tags : 
cloud computing, private cloud, public cloud, storage infrastructure, hyperconvergence, data center
    
Schneider Electric
Published By: Schneider Electric     Published Date: Aug 21, 2017
This paper explains how to specify the physical infrastructure for an IT pod and describes optimum configurations based on available power feeds, physical space, and targeted average rack power densities.
Tags : 
data centers, networking, architecture, it pod, infrastructure, data center
    
Schneider Electric
Published By: SimpliVity     Published Date: Jan 07, 2016
There’s no denying that hyperconverged infrastructure is hot right now, promising to dramatically shift the way infrastructure is procured, deployed and managed. But questions remain. Is it actually addressing the real-world concerns faced by real-world customers? What are the catalysts driving organizations to evaluate hyperconvergence and are they finding that the results match the hype when they actually do deploy? Get the fast facts from this SimpliVity eBook based on research from ActualTech Media, segmented and re-analyzed just for EMEA.
Tags : 
desktop virtualisation, cloud computing, cloud management, networking, data center
    
SimpliVity
Published By: Raritan     Published Date: Sep 07, 2016
Learn how a simple USB port can save you hundreds of thousands by eliminating copper- based network infrastructure costs, facilitating PDU setup and upgrades, and increasing physical security.
Tags : 
usb, raritan, security physical security, network, ports, networking, security, software development
    
Raritan
Published By: Server Technology     Published Date: Dec 07, 2015
It has been obvious for some time that the power distribution system within the data center is the key opportunity to focus upon in order to actively manage the rising costs of power and more specifically, identify problems and waste in real-time. With future-thinking organizations sharing knowledge between Facilities and IT, the push for more intelligence within this rack-based power infrastructure has become urgent with higher rack power densities. In fact, proactive power management at all stages in the distribution chain within enterprise data centers has become the requirement to feed efficiency studies and data center infrastructure management (DCIM) style optimization initiatives.
Tags : 
data centers, power, pdus, dcim, data center design and management
    
Server Technology
Published By: Cisco     Published Date: Sep 27, 2019
Check out this infographic that illustrates how Cisco’s subscription-based software is designed to make networking simple.
Tags : 
    
Cisco
Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware
Published By: Dell SB     Published Date: Jul 31, 2019
Take back control of your infrastructure projects and build the business case using your own data with Dell EMC’s Live Optics. We can help create a defensible proposal, unique to your environment, using your Live Optics data. Take the guess work out of your projects and build a new infrastructure based on your actual needs. When can we set up a call to discuss?
Tags : 
    
Dell SB
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
    
Experian
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
A network of digital twins visually communicates information about products, manufacturing, supply chain, service, and customers for program, scenario, and role-based analysis, and ultimately better collaboration across your business network.
Tags : 
    
SAP EMEA Global
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: HERE Technologies     Published Date: Oct 01, 2019
There are many challenging tasks when developing autonomous driving features to cope with the various changes to the environment. Often lane markings are faded or are covered with snow or dirt and can be difficult for a camera-based detection system. In this report, VSI addresses the application of HD map assets to improve the safety and performance of automated vehicle features within the context of lane keeping and trajectories. VSI has been examining applications of HD maps in our test vehicle. In a previous report, we discussed map-based Adaptive Cruise Control (ACC) using the advised speed attributes from HERE’s HD map data. In this report, we apply HERE’s HD map data to a lane keeping application and examine performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach.
Tags : 
    
HERE Technologies
Published By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: BillingPlatform     Published Date: Jul 30, 2019
Organization leaders and companies of all sizes are leveraging digital transformation in their industry, market, and business using a myriad of disruptive technologies like connectivity, the Internet of Things, blockchain, business intelligence and big data. CFOs who manage to get in front of these technologies will lead their businesses to greater success. This eBook illustrates how cloud-based billing management offers the quickest path toward this transformation. Download this eBook to explore how the right solution can help you: • Monetize IoT and increase revenue • Launch product innovations quickly • Automate billing to improve customer retention • Leverage the cloud to reduce costs Adapting today can mean the difference between success and obsolescence. With the right billing solution your business can thrive in these challenging times. Discover how today.
Tags : 
    
BillingPlatform
Published By: BillingPlatform     Published Date: Jul 30, 2019
Discover How Cloud-based Billing Delivers Transformation Enterprise leaders and companies of all sizes are leveraging digital transformation through disruptive technologies like the Internet of Things, AI, business intelligence and big data. This eBook demonstrates 5 strategies for leading the charge for change within your business. Discover how to quickly leverage digital transformation in your technology stack and monetize it quickly with cloud-based billing. Download this eBook to explore how the right solution can help you: • Launch product innovations quickly • Monetize IoT and increase revenue • Automate billing to improve customer retention • Leverage the cloud to reduce costs Adapting today can mean the difference between success and obsolescence. With the right billing solution your business can thrive in these challenging times. Discover how today!
Tags : 
    
BillingPlatform
Published By: BillingPlatform     Published Date: Jul 30, 2019
See How BillingPlatform Mediates IoT Devices for Global Success Read this case study to see how a global transportation provider utilized cloud-based billing to make the most of their Internet of Things devices and overcome regional taxation issues. This ClearChannel subsidiary needed to enable a complex, IoT-based business model and chose BillingPlatform for its superior data and monetization capabilities.
Tags : 
    
BillingPlatform
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.