Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

environment

Results 1 - 25 of 2633Sort Results By: Published Date | Title | Company Name
Published By: Comarch     Published Date: Dec 20, 2017
How to consolidate large scale IT infrastructure platforms to private cloud environment?
Tags : 
cloud, migration, private cloud, infrastructure ibm, comarch, comarch it infrastructure
    
Comarch
Published By: Anixter     Published Date: Nov 23, 2015
This report tackles the challenges, standards and best approaches to thermal efficiency in existing facilities largely due to them being more prevalent when compared to a new facility. You will be introduced to four best practices that are absolutely critical to achieving an optimal thermal environment. The report also explores the future of datacenter cooling and introduces emerging technologies.
Tags : 
thermal efficiency, data centers, anixter, data center
    
Anixter
Published By: SimpliVity     Published Date: Jan 07, 2016
This eBook is designed to help forward-looking IT Managers envision a different way of working —where simplicity replaces complexity. We’ll look at what makes managing today’s IT environments so challenging—increasing com- plexity, poor visibility and constraints on budgets and space. Then we’ll help you visualize a new way of working that greatly simplifies the challenges of managing data, infrastructure and operations. Imagine way of working in which you have the time to really help your company improve the way it does business, and save you money.
Tags : 
data centers, it manager, hyperconverged, simplivitydcd, convergence
    
SimpliVity
Published By: Raritan     Published Date: Mar 02, 2016
5 Reasons Environmental Sensors are used in all Modern Data Centers
Tags : 
raritan, power, processing, energy management, data center efficiency, power management, instrumentation, data center, pdu, dcim, power distribution, networking
    
Raritan
Published By: Raritan     Published Date: Sep 05, 2016
Sensors are an easy to install, cost-effective way to reduce energy costs, improve reliability, and increase capacity for future data center growth. See why you should be using them.
Tags : 
data center
    
Raritan
Published By: Raritan     Published Date: Sep 07, 2016
Nowadays, rack PDUs offer more than simple power distribution. They provide power and environment monitoring, infrastructure management, remote power management, and more. Read the handbook and learn how rack PDUs can change the way you mange power in your data center!
Tags : 
pdus, power distribution, remote power, power management, racks, datacenter, raritan, networking, security, data center
    
Raritan
Published By: Juniper Networks     Published Date: Mar 14, 2017
This IDC White Paper sets out a business value assessment of Juniper Network’s portfolio in IP Networking and security in the context of IDC research into the priorities and challenges faced by network managers in data center environments.
Tags : 
bandwidth management, convergence, ethernet networking, fibre channel, infrastructure, internetworking hardware, ip networks, juniper_dcd, ip telephony, local area networking, migration, network architecture, network management, network performance, network provisioning, tcp/ip protocol, vpn, data center
    
Juniper Networks
Published By: Trend Micro     Published Date: May 11, 2015
Read more to find out how Trend Micro’s modern data center security is optimized to help you safely reap the full benefits of your virtualized environment.
Tags : 
security, data center, networking
    
Trend Micro
Published By: Trend Micro     Published Date: May 11, 2015
VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments.
Tags : 
visibility, security, data center, networking
    
Trend Micro
Published By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
" Use your choice of environments, maintain control, and do it all cost efficiently."
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
We’re in the era of hybrid cloud, an integrated combination of public and private cloud environments. Most companies moving into the public cloud today are making strategic decisions about which applications should go to the cloud and which should stay on-premises. Get acquainted with hybrid cloud management strategies and solutions, and learn what critical components must be addressed as you plan your hybrid cloud environment.
Tags : 
private cloud, hybrid cloud
    
Hewlett Packard Enterprise
Published By: Google     Published Date: Aug 23, 2018
"Cloud platforms are rewriting the way that companies work, serving as a vital foundation for digital transformation. Companies should brace for challenges that will need to be met as they transition from in-house systems to hybrid-cloud, multi-cloud, and public-cloud environments. Learn how an open-source strategy and consistent governance will help your company use multi-clouds to compete in the digital world. Download the Harvard Business Review Analytic Services report and find out more."
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software APAC
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Cohesity     Published Date: Aug 21, 2018
Today's backup and recovery is complex. 68% of organizations find their IT environments more complex than they were 2 years ago! Infrastructure silos are driving unnecessary data copies which can be difficult to manage and inefficient. Organizations need a modern solution that can simplify their backup and recovery global. Download this white-paper to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
    
Spredfast
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Forcepoint     Published Date: Aug 31, 2018
Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
    
Forcepoint
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This paper introduces a brief explanation of digital continuity and the opportunities and threats that it faces. The movement of product information to the digital domain in the 21st century has meant that we do not have physical items, like pieces of paper, which we can authenticate as being reliable information for decision making. Digital continuity is meant to remedy shortcomings of the digital environment by ensuring that information is unique, authoritative, current, and consistent, or more simply, has the characteristic of singularity. This paper includes: • Digital continuity within the Product Lifecycle • Digital continuity within manufacturing • Threats to digital continuity If we implement digital continuity correctly, we have all the advantages of the singularity of paper documents, but with the instantaneous and simultaneous ability to access the latest, updated information. Offered Free by: Dassault Systemes
Tags : 
    
Dassault Systèmes
Published By: KPMG     Published Date: Jul 10, 2018
Manufacturers are already investing in select industry 4.0 technologies and capabilities. But their investments won’t automatically deliver success. What strategy should you follow to become an i4.0 leader? Read this report to find out: • how leading manufacturers invest to optimise the benefits of industry 4.0 • why deploying at the right scale is key to delivering enterprise value • what capabilities, controls and culture are required to support i4.0 success • how to use i.4 to deliver better value for customers • why i.4. leaders are bringing suppliers into the i4.0 environment.
Tags : 
    
KPMG
Published By: HotSchedules     Published Date: Sep 11, 2018
There’s no two-second rule when it comes to the law, and in today’s legal environment, maintaining compliance is crucial now more than ever. This ebook provides an overview of the labor laws that impact restaurants today and the high cost of non-compliance. It also presents the features of an automated system that gives restaurants the capabilities they need to meet today’s increasingly complex labor compliance regulations—so they can avoid the high price of non-compliance and create work environments that better serve their employees’ needs and rights.
Tags : 
    
HotSchedules
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.