network resources

Results 76 - 100 of 169Sort Results By: Published Date | Title | Company Name
Published By: CenturyLink     Published Date: Jan 02, 2015
The market for cloud compute infrastructure as a service (a virtual data center of compute, storage and network resources delivered as a service) is still maturing and rapidly evolving. Strategic providers must therefore be chosen carefully.
Tags : 
gartner, magic quadrant, compute infrastructure, storage resources, network resources, strategic providers
    
CenturyLink
Published By: SAP     Published Date: Mar 22, 2016
All participants will use digital innovation to run their enterprise in real time and operate in a global network. They will provide superior products and services for a unique customer experience with the highest safety and environmental standards. This also paves way for new mobility concepts and business models. Our vision is where urban mobility and transportation systems run in a sustainable ecosystem while protecting natural resources and environment. This requires the ability to connect companies, people, and vehicles in real time for accident-free driving with zero-emission operated vehicles.
Tags : 
digital network, digital enterprise, value creation, best business practices, sap
    
SAP
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Cisco     Published Date: Apr 14, 2014
Today's IT departments are increasingly challenged by the complexity of managing disparate components within their data centers. Rapidly proliferating silos of server, storage, and networking resources combined with numerous management tools and operational processes have led to crippling inefficiencies and costs.
Tags : 
cisco, sap, flexpod, data centers
    
Cisco
Published By: F5 Networks Inc     Published Date: Nov 05, 2014
The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources-combined with increased mobility of apps migrating to the cloud and users across multiple devices. As an approach to operationalizing the network, SDN enables organizations to achieve greater economies of operational scale through the use of APIs to automate and orchestrate the network, as well as the application services that support applications. Read this whitepaper to learn how applications are driving new requirements for both businesses and networks that require disruptive, radical change.
Tags : 
sdn, network transformation, modern networks, application resources, cloud migration
    
F5 Networks Inc
Published By: NetApp     Published Date: Sep 30, 2013
"As the rapid rise in the number of mobile devices and users creates an explosion in data and virtual machine instances, datacenter transformation becomes imperative for many enterprises. It is essential enterprises move to consolidate resources and cut both capital and operating costs while still providing support for distributed applications. This brief white paper delves into a Q&A with Eric Sheppard, research director of IDC’s Storage Software program, on integrated systems and whether you should buy compute, network, and storage resources together. Read on as you will discover: What integrated systems are, and its benefits The differences between an integrated platform and integrated infrastructure How datacenters are leveraging these new systems today And more" NetApp Privacy Policy
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations
    
NetApp
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
AtNetPlus - As an IT services company on the front lines of network defense, AtNetPlus takes choosing antivirus software very seriously. After rigorous testing of multiple antivirus products, their IT specialist chose VIPRE for its small footprint and reliable malware detections.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security
Published By: Qwest Business.     Published Date: Jan 27, 2010
Managing Complexity in the Extended Enterprise. Regardless of company size, businesses must balance the increasing cost and effort involved in managing the network with other business functions that also require time, resources, personnel, and management attention.
Tags : 
qwest business, network managed services, enterprise applications, enterprise resource planning, total cost of ownership, productivity, performance management
    
Qwest Business.
Published By: HP     Published Date: Oct 02, 2009
A white paper on HP Storage Essentials support for VMware host virtualization
Tags : 
hp storage, vmware host virtualization, storage resources management solution, storage area network, vmotion, capacity management, reporting and dashboard, hp operations orchestration
    
HP
Published By: Dell Storage     Published Date: Jan 16, 2009
Call it growth, scaling, or expansion – whatever you call it, increasing your storage resources often strikes fear and loathing in the heart of the IT administrator. It conjures up visions of downtime, extra management tasks, frustrated users, and working nights and weekends. In addition, since capacity and performance are intimately connected, increasing storage resources can require balancing changes that affects the entire the SAN.
Tags : 
dell, san, storage area networks, increasing storage resources, downtime, expanding storage
    
Dell Storage
Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall
    
Cisco
Published By: Cisco     Published Date: Jan 29, 2009
Every minute counts in a small company and wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With untethered access to documents, emails, applications and other network resources, employees can roam where they need to and have constant access to the tools required to do their jobs.
Tags : 
cisco, wireless, wireless networks, information sharing, untethered access, wlan, wireless lan, effective communication
    
Cisco
Published By: Cisco     Published Date: Jan 29, 2009
Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.
Tags : 
cisco, wireless networking, productivity tool, mobile workforce, router capacity, access point, secure network, control systems
    
Cisco
Published By: Cisco     Published Date: Jan 29, 2009
Small business telephone systems are available in a variety of configurations, offering an ever-growing range of features and benefits. The most advanced small business telephone systems today run on Internet Protocol (IP) networks—the same network many small businesses use to connect employees, devices and information resources.
Tags : 
cisco, small business phone systems, ip networks, internet protocol, videoconferencing, unified messaging, mobile softphones, automated attendant
    
Cisco
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.
Tags : 
ibm ouncelab, network security, security management, security standards, service-oriented architecture, windows xp, business operations, security
    
IBM Software
Published By: IBM     Published Date: Apr 18, 2012
The term virtualization refers to the creation of virtual machines, virtual networks, and virtual disks (logical images of physical resources) that can execute work and then be returned to a shared resource pool. Cloud computing makes use of virtualization but cloud computing also focuses on allowing computing to be delivered as a service.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, service management, cloud capacity
    
IBM
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade
    
CDW
Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable
    
HP
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: Polycom Inc.     Published Date: Oct 14, 2010
This white paper will look at High Profile from both the business and technology perspectives, and provide answers to these questions.
Tags : 
polycom, h.264 high profile, visual communication, real-time video, video compression
    
Polycom Inc.
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: EMC Backup & Recovery Solutions     Published Date: Apr 02, 2010
EMC backup and recovery solutions for VMware combine industry-leading deduplication storage and software to help you fully realize the benefits of virtualization. VMware servers consolidate production workloads well, but backups create bottlenecks that tax network and storage resources.
Tags : 
emc, data domain, efficiency, vmware, vcenter, server consolidation, servers, data integrity
    
EMC Backup & Recovery Solutions
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys
Published By: WebEx     Published Date: Apr 02, 2009
Virtual collaboration and online meeting technologies are advancing SMBs’ reach without huge investments, thus allowing them to not only save costs and land more sales but to better educate consumers and business partners and serve a greater number of people lost by former logistical barriers. In turn, this knowledge transfer is allowing smaller companies to gain greater mindshare and reach new markets through numerous, innovative applications for traditional Web-based knowledge transfer technology.
Tags : 
webex, web collaboration, online meetings, smb, virtual collaboration, increasing sales, network renovations, sales optimization
    
WebEx
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library