Skip to content
 

environments

Results 1 - 25 of 1005Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
" Use your choice of environments, maintain control, and do it all cost efficiently."
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
We’re in the era of hybrid cloud, an integrated combination of public and private cloud environments. Most companies moving into the public cloud today are making strategic decisions about which applications should go to the cloud and which should stay on-premises. Get acquainted with hybrid cloud management strategies and solutions, and learn what critical components must be addressed as you plan your hybrid cloud environment.
Tags : 
private cloud, hybrid cloud
    
Hewlett Packard Enterprise
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: IBM     Published Date: Jul 02, 2018
After several years of relentless hardware and software innovation, the mainframe is at an inflection point from being a supporting platform of transaction revenue to becoming a source of revenue growth and innovation. Organizations are evolving toward what IDC calls the “connected mainframe.” The platform is transforming from a revenue-supporting machine into a revenue-generating machine and is increasingly playing a central role in organizations’ digital transformation (DX) journey. Key steps in achieving the connected mainframe require organizations to modernize and integrate the platform with their internal and external environments. IDC finds that these modernization and integration initiatives lead to new business innovations, which in turn are driving revenue growth and improving organizational operational efficiency.
Tags : 
    
IBM
Published By: VMware     Published Date: Jul 24, 2018
This IDC White Paper offers an overview of the new datacenter infrastructure trends that are being driven by a need to solve traditional datacenter challenges that still exist today. This paper also offers insight into a recent IDC survey of different customers running VMware vSAN, a software-defined, hyperconverged solution. The survey was conducted during the second half of 2017 to understand the real-world value VMware vSAN provides when deployed within production environments. 
Tags : 
    
VMware
Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv
    
Bell Micro
Published By: MuleSoft     Published Date: Jul 13, 2018
"Businesses are currently experiencing a generational shift in competitive and operational environments due to a convergence of technological, social, and economic forces. A single characteristic is emerging as the key factor that determines a company’s success: speed. API-led connectivity is the integration approach that will provide the speed organizations are looking for. It provides an approach for connecting and exposing assets. With this approach, companies can deliver today’s projects faster than ever before while also building an infrastructure to increase productivity on future projects and an enterprise ready for change. In this paper, you'll learn: -How to adopt an API-led connectivity approach that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks, exposed by APIs. -How to structure these building blocks across distinct systems, process and experience layers, to achieve both greater organizational agility and
Tags : 
    
MuleSoft
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 20, 2009
Managing service delivery in todayís complex and dynamic business environments demands new and different approaches from IT. The explosive growth and the rate of change of information has brought particularly daunting challenges for IT that have contributed to incredibly complex underlying infrastructures. To get a true picture of all of the components necessary to support an IT or Business Service, you must access and bring together data that resides in disparate data silos throughout the enterprise.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Gigaom     Published Date: Aug 08, 2018
Managing application testing in large organizations is not getting any simpler. In this Webinar, experts from enterprise software delivery provider Plutora to build a picture of the challenge and what can be done about it.
Tags : 
plutora, devops, software testing, application testing, software delivery, quality assurance, agile, test environments
    
Gigaom
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix
    
Vision Solutions
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jul 06, 2008
This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
    
IBM
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible. Like larger companies, midsize firms must make sure that they are effectively coordinating on-premise, public cloud, and private cloud capabilities. Unlike large companies, though, midsize firms are limited in both financial and technical resources to design and coordinate effective solutions to meet specific needs. Rather than invest in a major overhaul of their IT environments, midsize firms have to move incrementally, supplementing current resources with new cloud and on-premise capabilities that provide the performance needed to prosper in an increasingly competitive environment.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
For years, experienced data warehousing (DW) consultants and analysts have advocated the need for a well thought-out architecture for designing and implementing large-scale DW environments. Since the creation of these DW architectures, there have been many technological advances making implementation faster, more scalable and better performing. This whitepaper explores these new advances and discusses how they have affected the development of DW environments.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Veritas     Published Date: Sep 30, 2016
Learn how having one backup and recovery solution on a converged platform that can unify, manage and protect mixed workloads across the enterprise allows IT to reduce administration and infrastructure costs, even in the most complex environments.
Tags : 
    
Veritas
Published By: HPE Intel     Published Date: Mar 14, 2016
Innovative companies around the world have embraced a modernized, business-centric approach to IT, delivering orchestrated solutions that help achieve better business results. Now, more efficient and agile servers support this innovation by combining compute, storage, and networking resources to manage entire IT environments as programmable elements that are flexibly tailored to meet changing business demands. With HPE ProLiant Gen9 servers, you can redefine your IT infrastructure so that it’s converged, software-defined, cloud-ready, and workload-optimized. HPE ProLiant Gen9 servers can help organizations align IT infrastructures with key business outcomes: running operations efficiently, accelerating IT service delivery, and increasing business productivity and performance.
Tags : 
    
HPE Intel
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
Building on 25 years of server market leadership, the HPE ProLiant Gen9 portfolio—which includes HPE OneView software for simplified, converged management—offers optimal performance, increased storage, reduced energy consumption, and greater visibility and control across IT environments. Now everyone from enterprises to small and medium businesses (SMBs) can lower the cost of IT services, reduce delivery times, and improve their overall performance to gain a competitive edge. Download this white paper to learn more about the HPE ProLiant Gen9 portfolio.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
HPE Helion—Hewlett Packard Enterprise’s portfolio of cloud products and expert services built on an open architecture with support for a wide variety of environments—is designed to help you be successful in the Idea Economy. It realizes the potential of hybrid and the power of cloud with the experience, governance, and technology you need to accelerate your business.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.