Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

enterprise server

Results 226 - 250 of 272Sort Results By: Published Date | Title | Company Name
Published By: Skybot Software     Published Date: Jan 19, 2011
This paper provides helpful tips for taking your job schedule to a new level, and how Skybot Scheduler can help you get there.
Tags : 
skybot software, business process automation, enterprise software, system management software, load balancing, monitoring, linux, solaris, unix, windows, windows server
    
Skybot Software
Published By: Solidcore     Published Date: Aug 21, 2009
This white paper examines the problems enterprises currently face with their NT 4 server deployments, outlines the requirements that any effective solution must satisfy, and explains how Solidcore can help enterprises significantly lower the cost of supporting legacy NT 4 deployments.
Tags : 
windows nt, deployment, windows server, server deployment, server implementation, legacy, solidcore, solid core, platforms
    
Solidcore
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
With increasing demands being made on enterprise IT departments to keep up with the accelerating pace of business, infrastructure has to enable more dynamic, eficient application and IT service delivery. Unfortunately, more ofen than not, IT provisioning can be a bottleneck. Traditional means are ofen ineficient. When developers plan their projects and estimate the server, networking, and storage resources they need, they ofen overestimate and pad their requests to ensure what actually gets provisioned is adequate. The formal request comes via an IT ticket, and then the waiting begins. Days, possibly weeks go by before they get the resources they need, and all the while they’re unable to iterate on and evolve core business oferings.
Tags : 
    
SolidFire_NetApp
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. Read on to learn what ESG has to say about Dedupe 2.0 and what's in store.
Tags : 
dedupe 2.0, backup server, data infrastructure, backup server, data transmission, it management, data center
    
Sponsored by HP and Intel®
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
This paper examines enterprise adoption of blade servers in the US, UK and China; the benefits of blade server use; and the connection between enterprise data center management and agility goals and blade server use.
Tags : 
cloud, cloud computing, planning, intel, data center, unified networking, scaled-out storage, server pools, power, power management, enterprise
    
Sponsored by HP and Intel® Xeon® processors
Published By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : 
server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration, data center, vmware, virtualization, stratavia, infrastructure, network management, servers
    
Stratavia
Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Nov 11, 2009
You probably know Stratus Technologies' fault-tolerant ftServer systems and services for delivering uptime of nearly 99.9999% for the world's most essential applications. What you might not know is how effectively - and how simply - our mission-critical Support Services let your enterprise protect this industry-leading availability. Our focus on preventing downtime and data loss brings you much more than basic break-fix support. If you're used to average server support, get ready to experience meaningful differences. One example: It's not uncommon for Stratus Support Services to identify problems before our customers do. Stellar satisfaction ratings of 96% or higher show the value our clients place in these services.
Tags : 
activeservice, stratus, fault tolerance, ftserver, application management, virtual technician
    
Stratus Technologies
Published By: Sybase     Published Date: May 10, 2012
This white paper, based on a survey of database professionals, examines the problems facing many large businesses that are attempting to remain agile while dealing with a mountain of data under management.
Tags : 
adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program, database management programs, relational database management system, relational database management systems, data base manag
    
Sybase
Published By: Sybase     Published Date: May 10, 2012
Sybase's Adaptive Server® Enterprise (ASE) is a high performance relational database management system for mission-critical, data intensive environments that has been meeting these needs for nearly three decades.
Tags : 
adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program, database management programs, relational database management system, relational database management systems, data base manag
    
Sybase
Published By: Sybase     Published Date: May 10, 2012
This webcast discusses the technical benefits of Sybase ASE's compression technology. Watch the recording to learn more and to hear about use cases, strategies for data migration and a look at the performance implications.
Tags : 
adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program, database management programs, relational database management system, relational database management systems, data base manag
    
Sybase
Published By: Symantec     Published Date: Apr 09, 2012
New attacks are threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. These problems are solved by proper use of Extended Validation (EV) SSL certificates for authentication.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of the enterprise networks and breaches of data security. Read on to learn more about how you can prevent spoofing server to server.
Tags : 
spoofing, communications, how to prevent, s2s, preventing spoofing, new attacks, security threats, symantec, it security, it threats, security, it management, enterprise applications
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, networking, security
    
Symantec
Published By: Symantec     Published Date: Dec 28, 2015
Certificates are for more than just Web servers - and code-signing certificates in particular can make your enterprise more secure, make your software more accepted, and even stop malware in its tracks. Learn about the many ways in which code-signing certificates are being used to create more secure, more trustworthy, and more accepted software in a variety of different scenarios.
Tags : 
code signing certificates, enterprise security, web servers, security
    
Symantec
Published By: Symantec     Published Date: Oct 20, 2014
This paper examines the advantages that the integration of Red Hat Enterprise Virtualization and Symantec Cluster Server provides to address application high availability and disaster recovery for virtualized environments.
Tags : 
symantec, red hat, virtualization, disaster recovery, clustering, virtualized applications, network security
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
In this final piece on server virtualization and SSD, Storage Switzerland discusses the power of performance, specifically, the dramatic impact that latent-free storage can make on the virtual environment. Read on to find out more!
Tags : 
desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance, solid state, enterprise
    
Texas Memory Systems
Published By: Unitrends     Published Date: Aug 18, 2015
When it comes to data protection, what matters most? You want the freedom to choose the types of data, applications, and computing platforms you protect. You want to seal off that data from security threats. You need space to house that data—the right space now with room to grow. You want to support older solutions as you evolve your technology environment to modern strategies, at a pace that suits your business. And you need the ability to reach out for that data at a moment’s notice without overstressing your network. In short, you need it all.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server, vps, virtual server, it management, data center
    
Unitrends
Published By: Unitrends     Published Date: Aug 18, 2015
There are always a few "secrets" in any industry—and the backup and restore business has its share. Our secrets are widely known within the industry but are less well-known outside of it—for the obvious reason that none of these secrets helps the majority of the vendors in this space. In this white paper, we will reveal these secrets to you.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server, vps, virtual server, data center
    
Unitrends
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.