availability

Results 1 - 25 of 857Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
HPE SimpliVity hyperconverged technology for data protection. IDC believes that IT organizations should take a fresh look at data protection and availability and unbind themselves from the limitations of client/server era technologies.
Tags : 
    
Hewlett Packard Enterprise
Published By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : 
assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
Intel Corp.
Published By: Cleversafe     Published Date: Dec 07, 2012
Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs
Tags : 
shutterfly, images, growing, reliability, performance, storage, dispersal
    
Cleversafe
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : 
sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
    
SunGard Availability Services
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
    
Limelight Networks
Published By: IBM     Published Date: Jun 28, 2016
Availability, performance, user interface... Nobody cares. The age of the enterprise is here! Customers are now automatically purchasing any product you release, ensuring the longevity of your enterprise.
Tags : 
best practices, competitive advantage, enterprise, productivity
    
IBM
Published By: Active Power     Published Date: Aug 30, 2011
This paper discusses the methods of implementing a short ride through system with higher reliability and predictability than with traditional methods
Tags : 
caterpillar, electrical and electronic, backups, caterpillar inc., high availability, backup power, backup power supply, battery backup
    
Active Power
Published By: SAP     Published Date: Apr 14, 2011
The focus for companies willing to tap into the growing mobile opportunities should be on moving from experimentation to the creation of a mobile business case and strategy, while recognizing that the challenges associated with fragmentation will persist.
Tags : 
mobile trends, thomas husson, julie ask, consumer product strategy, forrester, fragmentation, availability, mobile ecosystem
    
SAP
Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey
    
CloudEndure
Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical
    
Stratus Technologies
Published By: CradlePoint     Published Date: Sep 04, 2014
Today, the widespread availability of 3G and 4G cellular or wireless broadband networks enables digital signage to be deployed virtually anywhere. Combined with cloud-enabled network management and content delivery systems, 3G and 4G wireless broadband networks are propelling digital signage deployments at an accelerated pace. In countless venues, digital signage networked via wireless broadband signal penetrates hard-to-reach locations, new markets, and can achieve a faster return on investment.
Tags : 
cradlepoint, digital signage, cloud-enabled software as a service, wireless broadband cellular signal
    
CradlePoint
Published By: HPE Intel     Published Date: Mar 15, 2016
Accelerate your journey to an all-flash data center with Hewlett Packard Enterprise Storage Consulting solutions. Slash costs and double performance with HPE 3PAR StoreServ All-flash arrays. Now you no longer need to choose which apps to take to flash; take them all and you won’t regret it. We deliver maximum performance, highest availability, Tier-1 data services, ease of management, and robust data protection at the lowest total cost of ownership (TCO) on the market when you engage with HPE Storage Consulting to provide an end-to-end all-flash solution.
Tags : 
    
HPE Intel
Published By: Emerson Network Power     Published Date: Nov 19, 2009
Download your free white paper today to get a better understanding of the trends driving data center design and management and how you can use them to reduce costs, improve equipment utilization and ensure high availability!
Tags : 
emerson network power, liebert, data center trends, data center design and management, high availability, flex capacity, high density, eco availability
    
Emerson Network Power
Published By: Pure Storage     Published Date: Feb 02, 2017
Read on to find out how your business can: - Simplify IT Management and Administration - Improve Performance and Application Availability - Reduce Total Cost of Ownership - Enhance IT and Business Agility
Tags : 
flash storage, cloud applications, cost, performance, it management, business agility
    
Pure Storage
Published By: LiveOps     Published Date: Aug 03, 2012
This paper will first discuss the impact of cloud computing, consumerization of IT, and the emergence of social media in driving the transition from traditional on-premises call centers to a superior model, the cloud contact center.
Tags : 
cloud computing, consumerization of it, consumerization, on-premises call centers, cloud contact center, contact center operations, functionality, cloud-based customer service
    
LiveOps
Published By: Scalebase     Published Date: Mar 08, 2013
Technology analyst firm 451 Research offers a brief overview of ScaleBase’s Data Traffic Manager software for dramatic scaling of MySQL databases beyond the capabilities of MySQL 5.6.
Tags : 
shard, cluster, high availability, failover, mariadb, mysql, read/write, scalability
    
Scalebase
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : 
high availability, disaster recovery, vision, vision solutions, ibm
    
Vision Solutions
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
    
KACE
Published By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql
    
Marathon Technologies
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: May 27, 2008
Server virtualization isn't just for big companies. Entry-level virtualization tools are free or low-cost, and there are many benefits to virtualization (including saving money).
Tags : 
vmware, virtualization, server virtualization, data center, fc san, fibre, networkattached storage, nas
    
VMware/Intel Server Refresh and Cost Savings
Published By: Microsoft     Published Date: Jul 20, 2018
When you’re in the software business, your resources can be spread pretty thin. You like to stay focused on building great software, but there are always distractions— from supporting sales opportunities to assisting with customer deployments and troubleshooting existing installations. With so much time spent maintaining the status quo, few cycles remain for modernizing your technology, streamlining internal operations, delivering new customer value, and broadening your customer base. More likely than not, your offerings are based on an on-premises approach, forcing you and your customers to spend considerable time on essential requirements like infrastructure, scalability, availability, and security. Today, you still must deliver on those essentials, but the solutions you’re building—or, more accurately, the solutions you want to be building—need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and wow users in new ways. At the same time, y
Tags : 
    
Microsoft
Published By: IBM     Published Date: Mar 20, 2014
Application downtime is just one of many costs associated with a fragmented application performance management (APM) strategy. Learn the 5 steps to simplify Application Performance Management through this infographic.
Tags : 
ibm, apm, application services, data center, application downtime, business implications, visibility, infrastructure
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library