Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

configure

Results 1 - 25 of 171Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Plus de 400 000 employés répartis dans environ 400 entreprises, dont Polycom, Qantas et Toyota, utilisent déjà CA Project & Portfolio Management SaaS (CA PPM SaaS) pour réduire les coûts, stimuler l’adoption et prendre de meilleures décisions métier. Avec l’aide de CA Services, les organisations peuvent rapidement déployer et configurer CA PPM SaaS, pour simplifier les processus d’achat, l’utilisation et la gestion de la solution.
Tags : 
    
CA Technologies EMEA
Published By: Cisco EMEA     Published Date: Dec 13, 2017
Cisco Meraki MS switches are 100% cloud-managed and can be fully configured from any Internet-accessible location before ever being powered on. Simply add the switch serial number (or order number for large deployments) to your network using the Meraki web-based dashboard. Once added, the switch is fully configurable. When the switch is first powered on and connected to the Internet, it will pull its settings from the cloud.
Tags : 
configuration, zero touch, deployment, ports, bandwidth, wire security, trends
    
Cisco EMEA
Published By: AppDynamics     Published Date: Sep 21, 2017
Performance challenges can add up quickly with a poorly configured cloud setup, and companies must get serious if they hope to transition to the cloud successfully. Businesses may be turning to the cloud at a breakneck pace, but that speed is leaving many without a clear plan as to how they want to reach their end destination.
Tags : 
    
AppDynamics
Published By: Splunk     Published Date: Aug 17, 2018
With the growing need to effectively monitor your infrastructure, metrics have emerged as a way to gain insight to the trends and problems within your IT environment. collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside another tool, such as Splunk, to help identify trends, issues and relationships you may not be able to observe otherwise. This e-book gives you a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment. Download your complimentary copy of “A Beginner’s Guide to collectd” to learn how to: *Get and configure collectd *Analyze collectd data *Use Splunk and collectd together to analyze large amounts of infrastructure data
Tags : 
    
Splunk
Published By: JumpCloud     Published Date: Sep 29, 2014
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : 
ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas, active directory
    
JumpCloud
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how innovative IT and ops teams leverage LDAP and Active Directory for their IaaS.
Tags : 
ldap, active directory bridge, user management, idaas, iam, ssh access, linux, hosted ldap, openldap, linux useradd, identity, sso, configure ldap, aws, cloud servers, iaas, active directory
    
JumpCloud
Published By: Oracle CPQ BB     Published Date: Feb 05, 2016
Recent Aberdeen research on Configure/Price/Quote solutions helps sales operations practitioners reduce the friction at the end of the B2B sales cycle. If you are implementing a CPQ deployment, make sure you get your money's worth by supporting it with these best practices.
Tags : 
    
Oracle CPQ BB
Published By: Dell Storage     Published Date: Apr 17, 2012
Watch the Dell EqualLogic step-by-step demonstration that shows how quickly and easily you can configure and manage the PS Series.
Tags : 
    
Dell Storage
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Microsoft Windows Deployment Services (WDS) provides an accessible, flexible way to perform mass deployments of current and legacy Windows operating systems. Using customized answer files and taking advantage scripting and other tools with WDS can help dramatically reduce the time to perform highly configured mass deployments with minimal infrastructure impact.
Tags : 
dell, microsoft windows deployment services, windows operating systems, wds, os deployment, windows server, platforms
    
Dell Windows Server
Published By: Apstra     Published Date: Feb 21, 2019
Modern data centers based on hyperscale, leaf-spine switching architectures are growing so large and complex they are outstripping the capacity of operators to engineer, configure and manage these networks using traditional tools and techniques. As a result, data center operators are looking for new ways to automate workflows, maximize uptime and increase operational agility while reducing operating costs
Tags : 
acg, data center efficiency
    
Apstra
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
    
Cisco EMEA
Published By: Red Hat     Published Date: Jan 07, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another. In March 2018, Re
Tags : 
    
Red Hat
Published By: Anaplan     Published Date: Sep 19, 2019
Réalisée par Mint Jutras, cette étude analyse la plateforme de planification intégrée d’Anaplan, sa proposition de valeur et ce qui la différencie des solutions du marché. « Le moteur de planification en mode cloud d’Anaplan peut conjuguer les avantages de deux mondes : il est déployé en tant que plateforme suffisamment souple pour s’adapter à vos besoins spécifiques. Mais au delà d’un outil technique, c’est une plateforme métier dont la facilité d’utilisation permet aux utilisateurs dépourvus de compétences techniques de concevoir, de modéliser et de configurer des applis… Cette plateforme métier dispose d’un plan vivant et dynamique qui s’adapte à l’évolution des objectifs et des conditions du marché. L’analyse prédictive renforce cette approche, ce qui permet non seulement d’adapter les plans aux changements lorsqu’ils surviennent, mais également d’anticiper au mieux les évolutions qui se profilent. Voulez-vous en savoir plus ? Téléchargez le rapport dès maintenant.
Tags : 
    
Anaplan
Published By: Red Hat     Published Date: Aug 22, 2018
In the emerging digital enterprise, there’s a good chance some application development will be taking place outside the information technology department. It’s not that the role of IT is in any way being diminished – in fact, IT managers are getting busier than ever, overseeing the technology strategies of their enterprises. Rather, the pieces are in place for business users to build and configure the essential business applications they need, on a self-service basis, with minimal or no involvement of their IT departments. As the world moves deeper into an era of ongoing disruption from digital players – be they startups, or teams within established enterprises – technology has become an essential part of every job, from the boardroom to the boiler room. Accordingly, the discipline of IT is no longer confined to the data center or development shop. Many business managers and professionals are building, launching or downloading their own applications to achieve productivity and respond
Tags : 
    
Red Hat
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes a set of best practices to deploy a 1,500-user virtualized Exchange 2007 environment using VMware® ESXT 3.5. Specifically, this project demonstrates how to configure and deploy the Exchange 2007 Mailbox, Hub Transport, and Client Access server roles onto individual VMware virtual machines (VMs), which in turn are deployed onto a single VMware ESX Server. The environment includes HP ProLiant c-Class Blade servers connected to an HP StorageWorks 4400 Enterprise Virtual Array (EVA4400) Disk Array.
Tags : 
exchange 2007, vmware, esx 3.5, virtualized exchange 2007
    
HP Virtualization
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy
    
Lumension
Published By: Intel     Published Date: Nov 13, 2019
The combination of the SAP HANA platform and Intel® Optane™ DC persistent memory means that enterprises now have new ways to approach data tiering and management. Downtime can be significantly reduced because SAP HANA doesn’t have to reload data back into main memory after a server reboot, and more data can remain in the “hot” tier of main memory, which increases the amount of data that can be analyzed at a time. See this new infographic for a quick summary. Intel® Optane™ DC persistent memory also benefits SAP HANA by providing a higher memory density than DRAM, in addition to being byte-addressable. Up to three terabytes of Intel® Optane™ DC persistent memory is available per CPU socket on systems configured with future Intel® Xeon® Gold processors and future Intel® Xeon® Platinum processors, which means that an eight-socket server can contain up to 24 terabytes of Intel® Optane™ DC persistent memory.
Tags : 
    
Intel
Published By: Intel     Published Date: May 22, 2017
While IMS is not new, complete virtualization of IMS (vIMS) is new. Network functions virtualization (NFV) provides operators with the ability to rapidly and inexpensively deploy, configure, launch, and upgrade services, which can lead to faster time to market and lower operating costs, providing an important competitive advantage against traditional CSPs and new OTT service providers. It can also reduce the business risk associated with new service introductions. This agility allows operators to offer trials of new service offerings on a much larger scale, leading to acceleration of new revenue generation.
Tags : 
    
Intel
Published By: Intel     Published Date: Aug 17, 2017
Virtualizing the IMS will bolster competitiveness for communications service providers. This Intel solution brief details how vIMS and NFV provides operators the ability to rapidly and inexpensively deploy, configure, launch, and upgrade services and provide a competitive advantage and accelerating new revenue generation.
Tags : 
    
Intel
Published By: Dell     Published Date: Oct 24, 2014
This start-up guide provides instructions on how to configure the Dell™ PowerEdge™ VRTX chassis with Microsoft® Windows Server® 2012 in a supported failover cluster environment. These instructions cover configuration and installation information for chassis-shared storage and networking, failover clustering, Hyper-V, Cluster Shared Volumes (CSV), and specialized requirements for Windows Server 2012 to function correctly with the VRTX chassis.
Tags : 
server configuration, role configuration, virtual disks, server installation
    
Dell
Published By: CA Technologies     Published Date: Feb 13, 2015
IT services are all about people, and the people’s most precious resource is time. They want to be more productive, but service management tools haven’t always helped. CA Cloud Service Management is a leap forward, a powerful but flexible solution that is built for speed—rapidly accelerating time-to-value where other SaaS solutions fall short. With CA Cloud Service Management, you can implement in days, configure without programmers, and automate end-user requests. A true SaaS solution means you get the latest capabilities the minute they are available and simplified pricing gives you predictable costs—no nickel and diming or haggling over complex pricing charges.
Tags : 
cloud monitoring, cloud service management, data, data management, data sheet, it services
    
CA Technologies
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA
Published By: Sanbolic     Published Date: Dec 03, 2007
Clustered volume manager enables administrators to centrally configure and assign storage assets in a SAN storage environment in Microsoft System Management Server 2003 and Microsoft Operations Manager 2005 environments.
Tags : 
windows, storage, san, nas, sanbolic
    
Sanbolic
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.