Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

best practice

Results 1 - 25 of 2731Sort Results By: Published Date | Title | Company Name
Published By: Anixter     Published Date: Nov 23, 2015
This report tackles the challenges, standards and best approaches to thermal efficiency in existing facilities largely due to them being more prevalent when compared to a new facility. You will be introduced to four best practices that are absolutely critical to achieving an optimal thermal environment. The report also explores the future of datacenter cooling and introduces emerging technologies.
Tags : 
thermal efficiency, data centers, anixter, data center
    
Anixter
Published By: Anixter     Published Date: Sep 23, 2015
This report covers the complex nature of powering the data center. The drive for improved efficiencies and managing variable IT capacity requirements are top priorities for all data center operators and managers. The intelligent power chain achieved via the right hardware configuration coupled with intelligence and analytics can provide robust gains in five key areas.
Tags : 
    
Anixter
Published By: Chatsworth     Published Date: Oct 06, 2016
In this white paper, we will discuss the following key topics so that your data centre operates more efficiently and cost-effectively: • Growing energy utilisation • Creating cooling efficiencies • Enabling efficiency best practices Furthermore, we will look at great ways to overcome cooling, energy and even design challenges.
Tags : 
data center, power management, pdus, spm, chatsworth_wp, networking, telecom
    
Chatsworth
Published By: Anixter     Published Date: May 22, 2015
Whether it’s for business or education, entertainment or shopping, nearly every financial transaction, phone call or text, movie download or Internet search either now takes place or is recorded in a data center. With nearly everyone’s professional and personal lives dependent upon a healthy ecosystem of data centers, it is only natural that data centers are now targeted by thieves, spies and others maliciously seeking to cause damage or to steal the information contained within a data center.
Tags : 
security strategy, asset management, physical security, data center, data centre, security, risk, risk management, best practice, compliance, cost, capex, opex
    
Anixter
Published By: Anixter     Published Date: Jun 16, 2015
Faster, denser technology is driving costs, and the right high performance cabling is needed to provide stability in the data center. Unsuitable infrastructure can become an expensive problem, delaying necessary upgrades and creating other potential obstacles needed to stay competitive. This report contains the four best practices needed to achieve a high performance, future-ready structured cabling solution for a data center.
Tags : 
network migration, cabling, data speed, network infrastructure, data center, infrastructure, network performance, data center design and management
    
Anixter
Published By: Nexans     Published Date: Apr 20, 2017
According to Cisco’s Global Cloud Index (2015), global data centre IP traffic will grow at a CAGR of 25% between 2014 and 2019 and data centre workloads within ‘traditional’ (as opposed to cloud) data centres will more than double. In this guide you will find best practices to meet the demands of the Digital Economy, with help from DatacenterDynamics and Nexans.
Tags : 
data center
    
Nexans
Published By: LeGrand     Published Date: Oct 18, 2016
Efficiency is a key objective when designing a data center. Efficiency gains are typically focused completely on power and cooling. Efficiencies can be realized in many other areas resulting in additional cost savings, reliable network performance, easier maintenance, flexibility, and scalability.
Tags : 
data center, connection, design, performance, time, space, experience, legrand, networking, security
    
LeGrand
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
    
Google
Published By: ServiceNow     Published Date: Oct 22, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
service, business, infrastructure, remotely, servicenow
    
ServiceNow
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
    
Cisco Umbrella EMEA
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Applause Israel     Published Date: Sep 25, 2018
Startups with digital products are not commonly known to pursue small dreams. Once the basic idea of the product is designed and the industry niche has been identified, leadership is already thinking hard about where and to how many markets the product should be rolled out. The mission is critical: the product must clearly create added value for the user in the local market while reflecting the needs of their local community. The challenge is making those changes in each market without losing sight of the basic idea of the product. The success story of German ecommerce startup Yalwa - The Local Internet Company details three best practices on how young startups can realize the dream of a localized, and thus globally-positioned, digital product.
Tags : 
    
Applause Israel
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Group M_IBM Q418     Published Date: Sep 24, 2018
A multi-cloud world is quickly becoming the new normal for many enterprises. But embarking on a cloud journey and managing cloud-based services across multiple providers can seem overwhelming. Even the term multi-cloud can be confusing. Multi-cloud is not the same as hybrid cloud. The technical definition of hybrid cloud is an environment that includes traditional data centers with physical servers, private cloud with virtualized servers as well as public cloud provisioned by service providers. Quite often, multi-cloud simply means that an organization uses multiple public clouds from many vendors to deliver its IT services. In other words, organizations can have a multi-cloud without having a hybrid cloud, or they can have a multi-cloud as part of a hybrid cloud.
Tags : 
    
Group M_IBM Q418
Published By: SAP     Published Date: Dec 10, 2018
As a finance leader, you must be wondering, where do I begin? In a survey conducted with Oxford Economics with 1,500 finance executives globally, we found 6 common traits shared by leading CFOs that boost business performance and efficiency as well as governance, risk and compliance effectiveness across the company. Discover the 6 ways finance leaders stay ahead of the pack and how you can start to incorporate these best practices into your current function.
Tags : 
    
SAP
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: MuleSoft     Published Date: Nov 27, 2018
IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: The bank’s legacy modernization strategy, and how they used Anypoint Platform Best practices for modernizing legacy SOA web services How to think about re-architecting monolithic applications into microservices The role that APIs play in driving an effective legacy modernization strategy
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
In the wake of recent legislative pressures and the formation of the Digital Transformation Agency, Australian state and federal government agencies face an imperative to deliver superior digital services to employees and citizens without a corresponding increase in budget. As a result, many agencies have turned to IT modernisation as a means of driving more cost-effective digital transformation. The key to successful execution of digital transformation initiatives depends on a new approach to integration and API strategy called API-led connectivity. In this whitepaper, you will learn: Why Australian government agencies must change how they deliver IT projects, and the role integration and an API strategy play in supporting the modernisation of government IT How to build out an API-led architecture within a government agency to realise 2-5x increases in IT productivity How best practice from initiatives like Service NSW provide a model for government agencies to pursue digital trans
Tags : 
    
MuleSoft
Published By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
    
Velaro
Published By: ASG Software Solutions     Published Date: Aug 09, 2008
ITIL provides a framework of customizable best practice initiatives that help organizations consistently deliver high-quality IT services. Effective ITIL implementation adds value to the IT infrastructure and improves business and service delivery.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.