Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it environments

Results 76 - 100 of 897Sort Results By: Published Date | Title | Company Name
Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous, networking, data center
    
SunGard
Published By: Citrix Online     Published Date: Jul 01, 2010
This new white paper explores the strategic role first-contact resolution plays in support environments, provides best practices for optimising performance and outlines steps for achieving consistent FCR.
Tags : 
citrix online tech, best practices, first-contact resolution, performance driver, fcr, support centre, tco, problem management, measurement, roi, test and measurement
    
Citrix Online
Published By: HP     Published Date: Jan 12, 2012
Once the cloud migration begins, finalizing SLAs with third parties, locking down the security of virtualized environments and investing in identity management, access control and reporting tools to support the new cloud business models will be essential steps to success.
Tags : 
cloud computing, cloud environment, virtualization, technology
    
HP
Published By: Nimble Storage     Published Date: Oct 28, 2013
Understanding the latest developments in storage technology is crucial when planning a virtual server storage architecture, and choosing the wrong storage architecture can dramatically impair your ability to provide application resources and recoverability. This best practices guide will show you how to lay the foundation for an efficient, easy-to-manage storage environment.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint
    
Nimble Storage
Published By: Jamf     Published Date: Aug 12, 2019
Since its origin, Mac has been an instrumental tool in helping K-12 schools provide the right resources to students and staff. As the must-have technology for teachers and computer labs, Mac and its wealth of available apps help ensure success in elementary schools all the way through high school graduation. Now, with more Mac computers making their way into school environments than ever before, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy.
Tags : 
    
Jamf
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: Fujitsu     Published Date: Feb 01, 2018
As schools look to blended learning as a solution to personalize and positively impact student achievement, the need to train and support teachers has become blatantly clear. Thus, districts and schools have allocated scarce resources to the process of onboarding and supporting teachers as new devices such as computers or tables are introduced. However, school leaders and teachers often fail to recognize the need to similarly onboard and support students into new digital environments, instead trusting the inherent technological competencies of the “digital native” student.
Tags : 
digital, native, teachers, leaders, fujitsu
    
Fujitsu
Published By: Fujitsu     Published Date: Feb 26, 2018
As schools look to blended learning as a solution to personalize and positively impact student achievement, the need to train and support teachers has become blatantly clear. Thus, districts and schools have allocated scarce resources to the process of onboarding and supporting teachers as new tools and platforms are introduced. However, school leaders and teachers often fail to recognize the need to similarly onboard and support students into new digital environments, instead trusting the inherent technological competencies of the “digital native” student. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
digital, native, social, entertainment, technology, academic, fujitsu
    
Fujitsu
Published By: Dell EMC     Published Date: Oct 08, 2015
In this article, learn how Dell working with Intel® helps IT leaders overcome the challenges of IT and business alignment, resource constraints and siloed environments through a comprehensive big data portfolio based on choice and flexibility, redefined economics and connected intelligence.
Tags : 
    
Dell EMC
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : 
big-ip, tool, application, system, device, installation, upgrade, production, testing, reboot, go live, stage, administrator, knowledge, solution, networking, it management, wireless, infrastructure, local area networking
    
F5 Networks Inc
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Whether you know it as Industry 4.0, the 4th Industrial Revolution, or Smart Industry, Manufacturing is going through a deep transformation, with changes that are centered around digitalization. While most industries are already on this digitalization path, the disruption is more visible and pronounced in manufacturing because it is expanding virtual data and processes into environments that have been fundamentally about physical products. This transformation has already started, and its impact is expected to be massive. Technical, economic, and social changes are expected across the whole manufacturing ecosystem, with jobs shifting from offshoring back to nearshoring. Strong technology elements driving this digital revolution include 3D printing, robotizing and automation, smart factory with IoT and machine learning, and supply chain digitization. Their impact is profound.
Tags : 
    
TIBCO Software GmbH
Published By: Red Hat     Published Date: Jun 19, 2019
IT and business are changing rapidly. Growth opportunities in new markets, evolving customer behaviors and preferences, increased competitive pressure, and new standards in regulatory compliance are causing organizations to adapt their operations and processes.1 Even so, rigid legacy IT infrastructure can keep you from adjusting to change and reduce the business value of IT. These complex environments often limit flexibility, speed, and scalability, resulting in slow application and service delivery. As a result, your organization can experience broad effects, especially within your IT operations and development teams. Developers need resources to be provisioned and scaled quickly so they can begin work immediately when an idea strikes. They also want more control over those resources while they are in use. However, with complex, hard-to-manage environments and manual processes, IT operations teams often struggle to provide resources and services at the speed that developers demand. Th
Tags : 
    
Red Hat
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: Symantec     Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Tags : 
backup, infrastructure, internetworking hardware, networking hardware, network management, high availability, windows server, server, backup and recovery, servers, symantec, network provisioning
    
Symantec
Published By: Vision Solutions     Published Date: Jul 06, 2008
This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Schneider Electric     Published Date: Jan 27, 2017
The innovative 2SIS technology in Premset MV switchgear is ideal for harsh environments and drastically reduces the probability of an internal arc by fully enclosing all current carrying portions of the switchgear in high dielectric insulating epoxy. Complete the form to download the whitepaper and learn more about the advantages of 2SIS technology!
Tags : 
schneider electric, mv switchgear, shielded solid insulation system, 2sis
    
Schneider Electric
Published By: IBM     Published Date: Jan 27, 2017
For more and more organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. In fact, hybrid cloud is the new norm for IT. IDC says more than 80% of enterprise IT organizations will commit to hybrid cloud by 20171, and 70% of IT decision-makers say they will always have a mix of traditional IT and cloud architectures.2 With important applications and workloads architected across both on-premises and hybrid, public and private cloud environments, business and IT stakeholders must be able to access data with equal efficiency, reliability and speed—regardless of physical location, infrastructure type or time frame.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 28, 2017
For increasing numbers of organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. This paper outlines what readers should consider when making a strategic commitment to a database platform that will act as a bridge from legacy environments to the cloud.
Tags : 
bridging the cloud, database, hybrid cloud, cloud organization, strategic commitment
    
IBM
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2, it management, network architecture, data center design and management
    
CA WA 2
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: Polycom     Published Date: Jul 24, 2014
Build or buy? When manufacturers have sought new leaders, they have typically done both: grooming talent in-house and paying market rates for the best thinkers and managers. With the growing STEM (science, technology, engineering, and mathematics) shortage, companies will be harder-pressed to buy – and keep – top technical talent. Emerging and established leaders will command premium prices and field continual offers, increasing the likelihood they’ll make frequent job changes, taking their industry and institutional knowledge with them. As a consequence, manufacturers will need to build their talent pipeline, empower knowledge workers with the tools and intelligence they need to succeed, and provide professional development opportunities that exceed what competitors offer. This will be a marathon, not a sprint. What’s key to making the race for talent successful: virtual training environments that accelerate learning and innovation.
Tags : 
polycom, management, virtual, training, development
    
Polycom
Published By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
    
ALE
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.