Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mission critical

Results 301 - 325 of 395Sort Results By: Published Date | Title | Company Name
Published By: IBM Corp     Published Date: Sep 23, 2011
Networked storage is being deployed in combination with server virtualization by an increasing amount of organizations interested in - consolidation, reduced costs, improved flexibility and availability of mission-critical applications. This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment. Download now to find out the results.
Tags : 
ibm, technology, esg, storage system, vmware, storwize v7000
    
IBM Corp
Published By: HP     Published Date: Sep 01, 2011
Read this whitepaper to learn how your organization can overcome the challenges associated with legacy networks to the mission-critical data center.
Tags : 
data center, converged infrastructure, business continuity, flexfabric, energy efficiency, infrastructure, power and cooling, data center design and management
    
HP
Published By: IFS     Published Date: Aug 15, 2011
Enterprise asset management (EAM) software is a mission-critical tool for asset-intensive industry. These tips from some of the world's most prominent EAM experts will help you select the right EAM solution. The importance of usability, the ability to manage outside contractors and other important considerations are covered here.
Tags : 
ifs, eam, enterprise asset management, asset-intensive industry, usability, contractors, project management, workforce, lean maintenance
    
IFS
Published By: Micro Focus     Published Date: Apr 27, 2011
This white paper and accompanying webcast highlight what makes VisiBroker the best fit for mission critical needs, and how its intelligent engineering delivers high throughput and reliability for both server-centric and decentralized application architectures, and onto the cloud.
Tags : 
micro focus, visibroker, corba, object request broker, distributed application
    
Micro Focus
Published By: Emerson Network Power     Published Date: Feb 07, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with. We will then show you the value proposition of Emerson's solutions, which can help you to: . Adapt data center infrastructure without increased cost; . Improving efficiency without added risk; . Maximize existing infrastructure investments; . Ensure availability of mission-critical services; and . Extend the life of existing infrastructure. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures
    
Perimeter E-Security
Published By: Polycom Inc.     Published Date: Oct 14, 2010
This white paper discusses the approaches to creating a scalable, intelligent, distributed video infrastructure that supports the requirements of today's video-enabled organizations.
Tags : 
polycom, scalable unified communications, video conference, uc intelligent core, communication servers, networking, ip networks, ip telephony, server hardware, servers
    
Polycom Inc.
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Coverity, Inc.     Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Arcserve     Published Date: Jul 26, 2010
Adopting an effective application performance management strategy is a critical step in managing complex Web revenue and generating mission critical applications to deliver a high-quality end-user experience.
Tags : 
ca technologies, performance optimization, web application, application performance management, apm, customer experience
    
Arcserve
Published By: Red Hat     Published Date: Jul 16, 2010
This paper tells managers evaluating middleware how it's done and why JBoss Enterprise Middleware products are an ideal platform for deploying mission-critical applications.
Tags : 
red hat, open source, jboss enterprise middleware, deployment platform, software localization, soa, application integration
    
Red Hat
Published By: Savvis     Published Date: Jul 07, 2010
By choosing Savvis as a provider for all its infrastructure, Wall Street Systems is succeeding in the fiercely competitive SaaS marketplace by delivering reliable, scalable, mission-critical solutions to its highly demanding client base.
Tags : 
savvis symphony, saas, software-as-a-service, infrastructure
    
Savvis
Published By: HP Virtualization     Published Date: Mar 22, 2010
Virtually every organization understands that its successful operation depends on the continuous availability of its applications. Most companies rely on internal applications-ranging from enterprise resource planning to payroll systems-to keep the wheels of their enterprise turning. They also depend on external-facing applications for everything from selling products to their customers to automating the supply chain with suppliers and partners. The failure of any of these mission-critical applications could be catastrophic to a business.
Tags : 
business continuity, servers
    
HP Virtualization
Published By: Coverity, Inc.     Published Date: Feb 26, 2010
Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Stratus Technologies     Published Date: Nov 11, 2009
You probably know Stratus Technologies' fault-tolerant ftServer systems and services for delivering uptime of nearly 99.9999% for the world's most essential applications. What you might not know is how effectively - and how simply - our mission-critical Support Services let your enterprise protect this industry-leading availability. Our focus on preventing downtime and data loss brings you much more than basic break-fix support. If you're used to average server support, get ready to experience meaningful differences. One example: It's not uncommon for Stratus Support Services to identify problems before our customers do. Stellar satisfaction ratings of 96% or higher show the value our clients place in these services.
Tags : 
activeservice, stratus, fault tolerance, ftserver, application management, virtual technician
    
Stratus Technologies
Published By: Exel     Published Date: Sep 11, 2009
In challenging economic times, companies look for new ways to control costs and improve efficiency. To address these issues, manufacturers are taking a hard, strategic look at Maintenance, Repair and Operations (MRO) supply. Commonly known as "indirect materials," MRO supply includes a vast array of items that support internal operations, ranging from safety gloves and office supplies to spare parts for mission-critical industrial equipment and tooling.
Tags : 
mro, exel, supply, repair, operations, maitenance, mission critical, supply chain
    
Exel
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load, service monitoring, port check (standard and custom ports), number of processes running, specific process monitoring, database monitoring, mysql replication monitoring, oracle rman backup monitoring, vpn monitoring: farend ping test, load-balanced ip monitoring, external url monitoring, centralized ids, logging monitoring
    
NeoSpire Managed Hosting
Published By: Bocada     Published Date: Aug 21, 2009
This strategic view is the proverbial "gold" that can be mined from your data protection systems; it is the asset that will enable IT management to prioritize activity to bring activities in line with business objectives and communicate policy compliance to corporate officers and data owners.
Tags : 
data consolidation, data protection, business management, business value, security policies, security policy, policy management, mission critical, mission critical data, bocata, bocada
    
Bocada
Published By: Groundwork Open Source     Published Date: Aug 21, 2009
IT teams have long recognized that an enterprise-class IT management system is absolutely essential, especially given the mission-critical nature of most corporate IT networks. In order for robust IT monitoring and management functionality, they had no alternative but to use a proprietary solution. Download this white paper to learn about Open Source alternatives.
Tags : 
open source, network management, openview, open view, monitoring, open source network, open source networks, groundwork, groundwork open source
    
Groundwork Open Source
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase, wireless
    
Sybase
Published By: BMC Control M     Published Date: Jul 22, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management, enterprise applications
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management
    
BMC Control M
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Has your organization run into difficulties adapting to evolving business conditions? Is there interest in being able to increase the efficiency of your operational processes? Are your business experts looking to more easily control the decisions within mission-critical systems? If you have answered 'yes' to any of the above, you may benefit from integrating a Business Rules Management System (BRMS) into your organization's overall enterprise architecture.  Learn more today!
Tags : 
ibm, organization, brms, business conditions, business rules management system, enterprise, improvement, profitabilty, decrease cost, enterprise applications
    
IBM ILOG.
Published By: HP     Published Date: Jul 08, 2009
This guide provides a comprehensive look at a complete data protection and recovery solution, with valuable information to help you choose the solution that best fits your business requirements and budget, and get the assurance you need - knowing your assets are protected. Learn more today!
Tags : 
storageworks, disk to disk, d2d, data protection, recovery, server, rack, storage, roi, hp services, rdx removable disk backup, disaster recovery, dat tape, tape, tape library, capacity, lto, linear tape open, one-button disaster recovery, obdr
    
HP
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.