Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical data

Results 301 - 325 of 659Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 19, 2008
Lower your data center energy needs with the advanced power management of the IBM System x3550 Express rack-mount server. It helps manage risk by providing 24/7 access to your business-critical data. In addition, it's budget-friendly with a dense yet powerful design that maximizes your IT investment. Look inside the IBM System x3550 Express and see the high-performance components for yourself in this interactive tour.
Tags : 
ibm, express seller, system x, networking, infrastructure, server hardware, servers, green computing
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Selecting the right server for your business-critical applications is an investment in the future of your business. This datasheet explores the IBM System x3650 server, and shows how it can save energy costs, help you manage growth and complexity, and protect valuable IT investments.
Tags : 
ibm, express seller, ibm system x3650, application server, x3650 datasheet
    
IBM
Published By: HP     Published Date: Oct 29, 2014
Tired of dealing with ID10T errors? Wouldn't life be easier if you reduced the number of ID10T errors and focused more on the critical issues? HP Service Anywhere seamlessly connects service quality, customer satisfaction and staff efficiency through its easy-to-use social collaborative capabilities. The only service desk with embedded Big Data technology, HP Service Anywhere delivers connected intelligence to IT and business users to support proactive problem solving and actionable analytics.
Tags : 
itsm, itil, saas help desk, itil service desk, itil service management, itil change management, itil problem management, hp service anywhere
    
HP
Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds.
Tags : 
applications, systems integration, cloud, development, network architecture, network management, network performance, cloud computing
    
Cisco
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: NetApp APAC     Published Date: Jul 04, 2019
This IDC study provides an evaluation of 10 vendors that sell all-flash arrays (AFAs) for dense mixed enterprise workload consolidation that includes at least some mission-critical applications. "All-flash arrays are dominating primary storage spend in the enterprise, driving over 80% of that revenue in 2017," said Eric Burgener, research director, Storage. "Today's leading AFAs offer all the performance, capacity scalability, enterprise-class functionality, and datacenter integration capabilities needed to support dense mixed enterprise workload consolidation. More and more IT shops are recognizing this and committing to 'all flash for primary storage' strategies."
Tags : 
    
NetApp APAC
Published By: Delphix     Published Date: Jun 27, 2014
Data is increasingly critical to driving business. This IDC Whitepaper outlines how CIOs can understand what the "total cost of data" is across their entire organization and how Delphix can assist them in managing the data that drives the business forward.
Tags : 
idc, report, business gains, idc, cios, total cost of data, organization, manage data
    
Delphix
Published By: IBM     Published Date: Jan 09, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years. An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server ""footprint""
Tags : 
power7, power system, power cooling, power5 based, workload consolidation, power processors, server infrastructure power7 system, ibm
    
IBM
Published By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : 
idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization
    
Red Hat
Published By: New Relic     Published Date: Mar 17, 2015
Application performance management (APM) focuses on monitoring, maintaining, and optimizing the performance and health of business applications across development, test, datacenter, and network environments. As mission-critical enterprise application environments become more complex because of the increased use of cloud, big data, and mobility, APM is becoming a top priority for IT teams that need to quickly and cost effectively track end-to-end application performance, identify and remediate the root cause of performance problems, and maintain service levels required by end users and business stakeholders. SaaS-delivered APM solutions offer rapid time to value for IT organizations that need to implement APM quickly with minimal disruption to the business.
Tags : 
apm, application performance management, big data, application performance, mobility, data center, data management
    
New Relic
Published By: Cisco     Published Date: Sep 16, 2015
. This Technology Spotlight examines the critical role unified infrastructure and cloud management will play in the transformation of today's datacenter operations environments.
Tags : 
ucs, unified computing system, infrastructure, enterprise, it barriers, convergence, cloud computing, data center design and management
    
Cisco
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Whether you are running fleet maintenance using standalone software, pen and paper, or logging detailed spreadsheets, you may be missing a critical piece – the ability to receive real-time data from vehicles. That’s where telematics comes to play. There are hundreds of factors, both expected and unexpected, that could upend your day-to-day maintenance operations resulting in costly vehicle downtime and missed routes. While you can manage fleet preventive maintenance manually, investing in a software solution can automate much of the oversight and management process for fleet maintenance.
Tags : 
    
Vehicle Tracking Solutions
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
In midsize and large organizations, critical business processing continues to depend on relational databases including Microsoft® SQL Server. While new tools like Hadoop help businesses analyze oceans of Big Data, conventional relational-database management systems (RDBMS) remain the backbone for online transaction processing (OLTP), online analytic processing (OLAP), and mixed OLTP/OLAP workloads.
Tags : 
database usage, database management, server usage, data protection
    
Hewlett Packard Enterprise
Published By: Safari Books Online     Published Date: Jun 08, 2009
This white paper outlines some of the most salient challenges and demonstrates how technology managers can enable their development teams to streamline application development and troubleshooting, while keeping them current on emerging technology, new product versions, and changing market trends-allowing them to move right past the gotchas.
Tags : 
safari books, technology, development, streamline, product, branding, market trends, design
    
Safari Books Online
Published By: Apstra     Published Date: Aug 19, 2019
You may have read in the news about horrific security gaps that have the potential of bringing down whole infrastructures, leaking critical business and personal data, and exposing organizations to massive liability. There is no question that improving organizations’ security posture is a critical requirement for infrastructure and security teams.
Tags : 
    
Apstra
Published By: QTS     Published Date: May 28, 2015
Some companies attempt to solve this by hiring a new manager or promoting someone up the ranks, but that only leads to another individual in charge with his or her own ideas of how best to manage facilities. The real problem goes unaddressed.
Tags : 
qts, network operations, critical facilities, data center, efficiency, infrastructure, network architecture, network performance management
    
QTS
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate
    
CDW Symantec
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: IBM     Published Date: Jul 05, 2018
Scalable data platforms such as Apache Hadoop offer unparalleled cost benefits and analytical opportunities. IBM helps fully leverage the scale and promise of Hadoop, enabling better results for critical projects and key analytics initiatives. The end-to- end information capabilities of IBM® Information Server let you better understand data and cleanse, monitor, transform and deliver it. IBM also helps bridge the gap between business and IT with improved collaboration. By using Information Server “flexible integration” capabilities, the information that drives business and strategic initiatives—from big data and point-of- impact analytics to master data management and data warehousing—is trusted, consistent and governed in real time. Since its inception, Information Server has been a massively parallel processing (MPP) platform able to support everything from small to very large data volumes to meet your requirements, regardless of complexity. Information Server can uniquely support th
Tags : 
    
IBM
Published By: CDW     Published Date: Aug 04, 2016
See how we can help you build a data center solution that supports today’s demands and positions your organization for success. Your current data center could be holding you back more than you realize. In today’s fast-paced world, some of your most critical operations revolve around technology. And for those systems to work, you need an infrastructure that’s ready to support your changing workloads and organizational needs. At CDW, we bring you the solutions and the support you need to further your goals. We can assess your environment, design the best approach, deploy your solution and manage it throughout its lifecycle. Because with a flexible, resilient and efficient data center, you can support flexibility, resiliency and efficiency throughout your organization.
Tags : 
technology, best practices, productivity, data, competitive advantage, data center
    
CDW
Published By: Anaplan     Published Date: Aug 28, 2018
The findings of FSN’s Innovation in the Finance Function global survey prove insightful and compelling—and highlight the critical role that innovative planning technology plays in the field of finance. Organizations today are evolving their operating models in conjunction with rising globalization, the value of big data, technological advances, regulatory changes, and demographic shifts. They are also in pursuit of business growth with the same or—in some cases—fewer resources than before.
Tags : 
innovation, finance, function, global, study
    
Anaplan
Published By: Anaplan     Published Date: Sep 07, 2018
The findings of FSN’s Innovation in the Finance Function global survey prove insightful and compelling—and highlight the critical role that innovative planning technology plays in the field of finance. Organizations today are evolving their operating models in conjunction with rising globalization, the value of big data, technological advances, regulatory changes, and demographic shifts. They are also in pursuit of business growth with the same or—in some cases—fewer resources than before.
Tags : 
    
Anaplan
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.