Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

configure

Results 1 - 25 of 144Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jun 01, 2016
Earlier this year, Schneider Electric launched its preconfigured edge datacenter resources with its SmartBunker and SmartShelter products. In developing these products, Schneider closely examined the requirements for successful, secure, rapid edge deployments in support of the explosion of edge data. The result is a standardized solution that can be customized as required and deployed virtually anywhere.
Tags : 
data center, idc, schneider, iot schneider_uk
    
Schneider Electric
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Plus de 400 000 employés répartis dans environ 400 entreprises, dont Polycom, Qantas et Toyota, utilisent déjà CA Project & Portfolio Management SaaS (CA PPM SaaS) pour réduire les coûts, stimuler l’adoption et prendre de meilleures décisions métier. Avec l’aide de CA Services, les organisations peuvent rapidement déployer et configurer CA PPM SaaS, pour simplifier les processus d’achat, l’utilisation et la gestion de la solution.
Tags : 
    
CA Technologies EMEA
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technolog
Tags : 
    
Amazon Web Services
Published By: Cisco EMEA Tier 3 ABM     Published Date: Dec 13, 2017
Cisco Meraki MS switches are 100% cloud-managed and can be fully configured from any Internet-accessible location before ever being powered on. Simply add the switch serial number (or order number for large deployments) to your network using the Meraki web-based dashboard. Once added, the switch is fully configurable. When the switch is first powered on and connected to the Internet, it will pull its settings from the cloud.
Tags : 
configuration, zero touch, deployment, ports, bandwidth, wire security, trends
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Commvault     Published Date: Jul 06, 2016
Forget about the complex task of building your own solution. Commvault offers a portfolio of integrated backup appliances that allow you to go from power-up to backup in less than an hour. Each appliance combines Commvault’s industry-leading software with pre-configured and optimized hardware, including an option that uses NetApp’s category-leading NetApp E-Series storage system. To further simplify ordering and deployment, the appliances include a licensing option aligned to the usable storage capacity (e.g., 36TB of NetApp E-Series storage includes 36TB of Commvault back-end terabyte licensing). Or you can purchase the hardware separately and use it with Commvault’s traditional front-end terabyte capacity licensing. Either way, Commvault serves as the single point of contact for software and hardware support issues, and the installation wizard allows you to be up and running quickly regardless of the option you choose.
Tags : 
commvault, backup appliances, netapp e-series, backup, industry leading software, netapp, turnkey solution, converged, it management
    
Commvault
Published By: Red Hat     Published Date: Aug 22, 2018
In the emerging digital enterprise, there’s a good chance some application development will be taking place outside the information technology department. It’s not that the role of IT is in any way being diminished – in fact, IT managers are getting busier than ever, overseeing the technology strategies of their enterprises. Rather, the pieces are in place for business users to build and configure the essential business applications they need, on a self-service basis, with minimal or no involvement of their IT departments. As the world moves deeper into an era of ongoing disruption from digital players – be they startups, or teams within established enterprises – technology has become an essential part of every job, from the boardroom to the boiler room. Accordingly, the discipline of IT is no longer confined to the data center or development shop. Many business managers and professionals are building, launching or downloading their own applications to achieve productivity and respond
Tags : 
    
Red Hat
Published By: Dell Server     Published Date: Aug 24, 2018
Dell EMC provides VMware vSAN Ready Nodes that combine a wide range of Dell hardware and VMware vSAN software into a ready-to-order package. These include the new single-socket Dell EMC PowerEdge R7415 servers powered by the AMD EPYC 7000-series processors. These Dell EMC vSAN Ready Nodes are validated and configured to meet hyper-converged workload needs while taking advantage of lower single-socket licensing costs from VMware.
Tags : 
    
Dell Server
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Datacenter improvements have thus far focused on cost reduction and point solutions. Server consolidation, cloud computing, virtualization, and the implementation of flash storage capabilities have all helped reduce server sprawl, along with associated staffing and facilities costs. Converged systems — which combine compute, storage, and networking into a single system — are particularly effective in enabling organizations to reduce operational and staff expenses. These software-defined systems require only limited human intervention. Code imbedded in the software configures hardware and automates many previously manual processes, thereby dramatically reducing instances of human error. Concurrently, these technologies have enabled businesses to make incremental improvements to customer engagement and service delivery processes and strategies.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Jusqu’à présent, les améliorations du datacenter se sont limitées à la réduction des coûts et à des solutions ponctuelles. La consolidation des serveurs, le Cloud computing, la virtualisation et l’implémentation de stockage Flash ont contribué à réduire la prolifération des serveurs, ainsi que les coûts de personnel et d’installations associés. Regroupant ressources de calcul, de stockage et de réseau au sein d’une même solution, les systèmes convergés se révèlent particulièrement efficaces dans la baisse des dépenses de personnel et de fonctionnement. Ces systèmes définis par logiciel (software-defined) exigent peu d’interventions humaines. Le code intégré dans le logiciel configure le matériel et automatise de nombreux processus autrefois manuels, ce qui réduit considérablement le risque d’erreurs humaines. Ensemble, ces technologies ont permis aux entreprises d’améliorer progressivement les processus et stratégies d’engagement client et de prestation de services.
Tags : 
    
Dell EMC & Intel
Published By: Dell     Published Date: Oct 24, 2014
This start-up guide provides instructions on how to configure the Dell™ PowerEdge™ VRTX chassis with Microsoft® Windows Server® 2012 in a supported failover cluster environment. These instructions cover configuration and installation information for chassis-shared storage and networking, failover clustering, Hyper-V, Cluster Shared Volumes (CSV), and specialized requirements for Windows Server 2012 to function correctly with the VRTX chassis.
Tags : 
server configuration, role configuration, virtual disks, server installation
    
Dell
Published By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for Exchange 2013 are right-sized solutions including servers, storage, networking and services that have been optimized for Microsoft Exchange. There are two HP Flex-Bundles for Exchange. One has been configured for customers who have 200–499 mailboxes and another one for customers with 500-1000 mailboxes. These solutions are low risk investments because HP understands how to build infrastructures for Microsoft environments and applications. HP and Microsoft have the longest standing relationship in the IT industry spanning 30 years. During this time, HP has gained a deep and comprehensive understanding of Microsoft products. HP has more than 34,000 trained Microsoft specialists, with over 13,000 of them attaining Microsoft-certification. HP has been named Microsoft Enterprise Partner of the Year five times and is Microsoft’s largest Gold Certified partner.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: Cisco     Published Date: Oct 08, 2015
Miercom was engaged to conduct a comparative testing of two high-capacity L2 and L3 network switches: the popular Cisco Catalyst 4500E, and a comparably configured, competitive switch, the FastIron SX 1600, from Brocade Communications Systems.
Tags : 
network switches, communications systems, cisco catalyst, enterprise applications, infrastructure, network architecture, network management, network performance, quality of service, server hardware
    
Cisco
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
    
Oracle APAC
Published By: Puppet     Published Date: Aug 03, 2016
After you set up your users and groups, the next thing you’ll want to do is configure the software running on your machines. In this webinar, you’ll get a taste of the many kinds of services and packages Puppet can manage on Windows. We’ll present some common use cases that will help you get some quick wins under your belt, including: - Managing Windows services (Windows Time, Disk Defragmenter, etc.) - Installing packages - Managing Windows maintenance tasks via WMI by executing arbitrary PowerShell code - Creating scheduled tasks in the Task Manager Puppet can do a lot, but we always recommend starting small and building on your success. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: DellEMC and Toshiba SSDs     Published Date: Jul 04, 2018
Dell EMC provides VMware vSAN Ready Nodes that combine a wide range of Dell hardware and VMware vSAN software into a ready-to-order package. These include the new single-socket Dell EMC PowerEdge R7415 servers powered by the AMD EPYC 7000-series processors. These Dell EMC vSAN Ready Nodes are validated and configured to meet hyper-converged workload needs while taking advantage of lower single-socket licensing costs from VMware. Dell commissioned Demartek to evaluate the performance of the new Dell EMC PowerEdge R7415 servers that use the AMD EPYC 7000-series of processors. Mixed enterprise workloads were run in this VMware vSAN cluster using one model of the AMD EPYC processor in each of three identical nodes. Then the tests were repeated using different models of AMD EPYC processors in the vSAN cluster nodes.
Tags : 
    
DellEMC and Toshiba SSDs
Published By: Dell Storage     Published Date: Apr 17, 2012
Watch the Dell EqualLogic step-by-step demonstration that shows how quickly and easily you can configure and manage the PS Series.
Tags : 
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 28, 2012
Dell vStart systems eliminate the barriers that prevent IT organizations from exploiting the full benefits of virtualization. Prepackaged, preconfigured and ready to run, vStart is a complete virtual solution that is optimized to launch.
Tags : 
dell, virtualized infrastructure, vstart
    
Dell Storage
Published By: CA Technologies     Published Date: Aug 24, 2017
• Use CA Live API Creator to deliver running prototypes in hours. Convert business requirements into working software. • Not just for wireframes, but also for running systems, databases, logic and user interfaces. It’s as simple as a spreadsheet and just as fast. • Impress your business users with results in hours to get their feedback on the data model and logic. Iterate instantly. • All you need is in the box. No IDE to install or configure. Just use your browser.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
• CA Live API Creator permet de livrer des prototypes opérationnels en quelques heures à peine. Convertissez vos besoins métier en logiciels opérationnels. • CA Live API Creator convient aux modélisations filaires, mais aussi aux interfaces utilisateur, à la logique, aux bases de données et aux systèmes opérationnels. C’est aussi simple qu’une feuille de calcul et tout aussi rapide. • Impressionnez vos utilisateurs métier en leur présentant des résultats en quelques heures à peine. Intégrez ensuite leurs commentaires dans la logique et le modèle de données pour finalement assurer une itération instantanée. • Tout ce dont vous avez besoin est à votre disposition. Pas d’environnement de développement intégré à installer ni à configurer. Votre navigateur suffit.
Tags : 
    
CA Technologies
Published By: Workday     Published Date: Oct 06, 2014
Configurer Workday en fonction des besoins de votre organisation
Tags : 
benefits of flexibility and agility, configuration of workday, configure workday to your needs, networking, software development, enterprise applications, platforms
    
Workday
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.