paper

Results 8676 - 8700 of 9055Sort Results By: Published Date | Title | Company Name
Published By: HP and Intel ®     Published Date: May 03, 2013
This paper examines how seven enterprise and midsize companies spanning the equipment rental, healthcare, retail, research, and telecommunications (service provider) industries were able to reduce their annual IT cost to deliver compute services by 58% by migrating to a blade platform.
Tags : 
blade, infrastructure, server, virtualization, enterprise, midsize, blade platform
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
The objective of this white paper is to provide IT executives and UNIX subject matter experts (SMEs) with a high level comparison of the UNIX virtualization offerings from HP for Integrity and HP-UX1 vs. IBM for Power and AIX. To assist in making a balanced comparison, this paper provides: - A high-level, feature-to-feature comparison of key areas of virtualization and virtualization management. - Modular table-based comparisons. - Information from publicly available resources.
Tags : 
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
This IDC white paper describes the challenges associated with managing the growing complexity of IT infrastructures, with a focus on support services for the enterprise. It highlights the important role of support services in maximizing system performance and minimizing downtime. The paper also examines the HP Insight Online, HP Insight Remote Support, and HP Proactive Care service offerings, specifically for HP ProLiant Gen8 servers featuring Intel Xeon technologies — including an analysis of the return on investment (ROI) from these programs for existing HP customers.
Tags : 
it infrastructure, roi, enterprise, performance management, downtime, remote support, support
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, desktop virtualization
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
This paper examines historical concerns about Linux virtualization, and assesses why, when, and how enterprises can safely virtualize their critical Linux workloads. We also review a Linux virtualization solution that meets enterprise needs -- the powerful combination of Red Hat Enterprise Virtualization and HP ProLiant Servers.
Tags : 
linux, virtualization, data center, research, enterprise
    
HP and Intel ®
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Lenovo and Microsoft     Published Date: Oct 17, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : 
technology solutions, customer feedback, software, data security, encryption, cyberattacks
    
Lenovo and Microsoft
Published By: Juniper Networks     Published Date: Sep 10, 2014
Understand the changing threat landscape and how to secure your business against Distributed Denial of Service attacks with our Whitepaper. Read about the latest detection and mitigation strategies to ensure always-on protection.
Tags : 
security, ddos attacks, detection, prevention, mitigation strategy, always on-protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Concerned about attacks on web-facing applications? Download the Whitepaper to understand the limitations of next-generation firewalls and learn about three technologies that protect web applications and data centers.
Tags : 
next generation firewalls, application attacks, web-facing applications, firewall limitations, protection technology
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions
    
Juniper Networks
Published By: IBM     Published Date: Sep 06, 2013
An Assessment Of The Current Security Landscape And How to Overcome It -- Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious , organizations need skilled technical staff to meet increasing security and compliance demands. Read this white paper and learn how to survive the technical security skills crisis.
Tags : 
forrester, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands
    
IBM
Published By: BMC Software     Published Date: Apr 24, 2015
This white paper explores the four key elements for modernizing service management through engaging user experiences.
Tags : 
service management, user experience, it efficiency, industrialized it, user productivity, automation
    
BMC Software
Published By: Oracle     Published Date: Oct 25, 2013
Learn about the challenges and opportunities faced by global businesses as they optimize sales resources to develop territories and compensation plans, which are critical in response to emerging market opportunities and complex global economic challenges.
Tags : 
data, instinct, global sales, sales, performance, global sales performance, global business, optimze sales, optimization, economics
    
Oracle
Published By: Thawte     Published Date: Dec 29, 2015
This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Tags : 
cryptography, encryption, security
    
Thawte
Published By: Thawte     Published Date: Dec 29, 2015
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.
Tags : 
    
Thawte
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
In this paper, Ptak/Noel describes the new IBM PureFlex system and the unique management capabilities of the IBM Flex System Manager.
Tags : 
ibm, data center, data center management, ibm pureflex, ibm pureflex system, expert integrated system, computing systems, ibm flex system manager
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
This IBM whitepaper prepares companies to face the impending complexities of the new FASB and IASB lease accounting standards. Learn how smart companies will move beyond the regulations alone and use the regulations as a springboard to transform the way they manage all their assets.
Tags : 
lease accounting, accounting, real estate, asset manager, ibm tririga, new accounting standard, fasb, iasb, compliance
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
"The potential to manage assets more efficiently, replace and upgrade them, and exploit them for purposes beyond their initial role, is significant in all cities in today’s world. However, technologies that support asset management in cities are numerous, fragmented and often inadequate. For any individual city agency, the level of cost and effort required to make improvement may seem daunting. This white paper highlights how Capgemini can help cities to become ‘smarter’: It describes how to offer to city agencies a leading practice asset management technical solution provided as-a-Service. This accelerates implementation, substantially removes funding hurdles, ensures an ongoing quality solution and incentivizes cities to migrate from a fragmented, costly and inadequate model to a common leading-edge solution."
Tags : 
city assets, asset managemnet, efficiency, smart city, work management, architecture, real estate management, facilities management, as-a-service, asset investment planning
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
Today, the retail industry faces daunting challenges as a result of current uncertain economic conditions, conflicting market influences and changes to financial reporting standards. Traditional point solutions utilized in the various phases of the real estate life cycle are no longer adequate to meet these challenges. This whitepaper examines the benefits of implementing life cycle management solutions in the retail environment.
Tags : 
lifecycle management, real estate systems integration, real estate, retail, retailer, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management, integrated workplace
    
IBM
Published By: CCM_Test     Published Date: Dec 04, 2013
short
Tags : 
    
CCM_Test
Published By: NetApp     Published Date: Dec 08, 2014
This white paper focuses on the increasing importance of high availability as enterprises continue to build out a 3rd Platform–based computing infrastructure. As more mission-critical applications requiring extremely high availability are deployed on virtual infrastructure, enterprises must respond using the right storage solutions. The document identifies critical features in the storage infrastructure necessary to meet these requirements for availability and explores how one vendor, NetApp, meets them with its EF-Series AFA solutions portfolio.
Tags : 
all-flash, enterprise storage, platform-based, ef-series, afa solutions
    
NetApp
Published By: NetApp     Published Date: Dec 08, 2014
This paper examines that there are all sorts of elements—differing applications, attitudes, budgets, outcomes for the business—that go into the decision of how much and what type of solid-state storage to use. And how this large range of use cases inherently means that users are going to need a portfolio of solid-state deployment options because no single product is going to solve everything for everyone. The paper then examines NetApp’s flash portfolio and belief that the right storage solution at all times balances performance, capacity, functionality and manageability: this means that for flash too, multiple approaches will become the standard for enterprises as they evolve their long-term IT strategies.
Tags : 
flash storage, flash solutions, it-strategies, netapp, business objectives, solid-state storage, it strategies
    
NetApp
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Start   Previous    341 342 343 344 345 346 347 348 349 350 351 352 353 354 355    Next    End
Search Resource Library