RecruitingBlogscom

Follow Us:

 

compute

Results 351 - 375 of 637Sort Results By: Published Date | Title | Company Name
Published By: IBM Corp     Published Date: May 31, 2011
Unique Express implemented a comprehensive Omnix Transport Solution running on an IBM® System x® server. The end result was a dramatically better management of driver and vehicle resources, saving tens of thousands of dollars per year.
Tags : 
unique express, computer-based transport solution, ibm system x server, omnix software, high availability, omnix transport solution, paul casotti
    
IBM Corp
Published By: TeamQuest     Published Date: Apr 09, 2014
Using a simple, easy-to-understand scale from zero to 100, TPI is calculated automatically and provides a simple key performance indicator for overall health. Competitive solutions typically combine several KPIs using simple math to create an overall health KPI. But TPI incorporates more sophisticated analysis that actually understands the queuing behavior of computer systems.
Tags : 
teamquest, tpi, kpi, virtualization, it professionals, optimize software, distributed environment, data center
    
TeamQuest
Published By: TeamQuest     Published Date: Apr 09, 2014
CIOs want IT to demonstrate business value, but only 27% of those surveyed believe IT contributes to the company's strategic business goals. Find out how IT can effectively measure cost and value, properly plan for future business successes, and focus on business goals in this special report from Computer Weekly.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance, data management
    
TeamQuest
Published By: IBM     Published Date: Nov 07, 2012
As companies throughout the world examine the business value of Cloud Computing, it is important to understand how cloud can lower IT expenses. Read on to learn about the savings of cloud computing when compared against traditional infrastructure.
Tags : 
ibm, cloud computer, roi, return on investment, traditional infrastructure, it infrastructure, business technology
    
IBM
Published By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : 
remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage
    
Intel
Published By: CDW     Published Date: Apr 04, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management, data management
    
CDW
Published By: VMTurbo     Published Date: Jun 18, 2013
VMware vCloud Director has created tremendous potential for service providers and enterprises to deliver agile and cost effective Infrastructure-as-a-Service (IaaS) through its ability to automate the self-provisioning of virtual data center service offerings by customers. Since a multitude of commodity cloud providers have appeared seemingly overnight, service providers and enterprises must harness technologies like vCloud Director to reduce the overall cost of delivering compute services. With automated self-service provisioning in place, the next wave of opportunities for cost and performance optimization lies in operations management. This document details how VMTurbo Operations Manager delivers unique business value, addressing significant gaps in VMware vCloud offerings.
Tags : 
compute service, vmware vcloud, director environments, reduce costs
    
VMTurbo
Published By: VMTurbo     Published Date: Aug 15, 2013
This document details how VMTurbo Operations Manager delivers unique business value, addressing significant gaps in VMware vCloud offerings.
Tags : 
compute services, vmware, vcloud director environments, business value
    
VMTurbo
Published By: VMTurbo     Published Date: Dec 09, 2013
Learn about a single compute service that will increase your productivity and decrease your costs while allowing Infrastructure-as-a-Service providers to quickly deploy and grow cloud services with confidence.
Tags : 
vmturbo, compute service, vmware vcloud, director environments, reduce costs, productivity, delivery, infrastructure
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
This whitepaper examines the latency-inducing pitfalls of common VM placement tactics, as well as a network flow approach that minimizes network, compute, and storage latency all at once.
Tags : 
vmturbo, network flow, application performance, vm placement tactics, network flow approach, storage latency, it management, knowledge management
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
An Intelligent Roadmap for Capacity Planning Many organizations apply overly simplistic principles to determine requirements for compute capacity in their virtualized data centers. These principles are based on a resource allocation model which takes the total amount of memory and CPU allocated to all virtual machines in a compute cluster, and assumes a defined level of over provisioning (e.g. 2:1, 4:1, 8:1, 12:1) in order to calculate the requirement for physical resources. Often managed in spreadsheets or simple databases, and augmented by simple alert-based monitoring tools, the resource allocation model does not account for actual resource consumption driven by each application workload running in the operational environment, and inherently corrodes the level of efficiency that can be driven from the underlying infrastructure.
Tags : 
capacity planning, vmturbo, resource allocation model, cpu, cloud era, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: NetApp     Published Date: Sep 24, 2014
Download this report and find out how new hybrid cloud architectures enable you to take advantage of public cloud resources from Amazon, Microsoft, and others while keeping your enterprise firmly in the driver‘s seat. You’ll learn how you can benefit from the elastic compute power of public clouds and still maintain control over your company’s data.
Tags : 
hybrid cloud architectures, public cloud, enterprise family, elastic compute power, control data, enterprise applications, data center
    
NetApp
Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations
    
Plantronics
Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
Intel Security
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Take a structured approach to designing your cloud applications. This cloud computing architecture e-book focuses on architecture, design, and implementation—considerations that apply no matter which cloud platform you choose. The guide includes steps for: Choosing the right cloud application architecture style for your app or solution. Selecting appropriate compute and data store technologies. Incorporating 10 design principles to build a scalable, resilient, and manageable application. Following the five pillars of software quality to ensure your cloud app is successful. Using design patterns that specifically apply to the problem you’re trying to solve. Download the 300-page cloud architecture e-book to explore these best practices, and get access to design review checklists, reference architectures, and more.
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Spend more time building great apps and less time managing server infrastructure. Get your solutions to market faster using Azure Functions, a fully managed compute platform for processing data, integrating systems, and building simple APIs and microservices. In this e-book you’ll find use cases, hands-on steps, and tutorials for quickly configuring your own serverless environments. Explore best practices for Functions, and learn how to: Develop event-based handlers on a serverless architecture. Test, troubleshoot, and monitor Azure functions. Automate administrative tasks from development through to deployment and maintenance. Integrate Functions with other Azure services. Build stateful serverless apps and self-healing jobs using Durable Functions. Download the 325-page serverless computing e-book and get access to dozens of step-by-step recipes for quickly building serverless apps.
Tags : 
    
Microsoft Azure
Published By: CDW     Published Date: Sep 29, 2015
This is a whitepaper about how to build a business case for selecting the optimal solution.
Tags : 
business, solution, operational, expenditures, virtual, desktop, infrastructure, vdi
    
CDW
Published By: CDW - APC     Published Date: Apr 07, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management, data management, business technology
    
CDW - APC
Published By: AWS     Published Date: Oct 31, 2018
Today AMP Ltd. integrates and manages its customer data more efficiently using a single Talend platform that enables data reconciliation, quality-assessment dashboards, and metadata management. Ten billion rows of AMP Ltd. data are computed in less than an hour. In this webinar you will learn how you can modernize your data architecture to help you collect and validate data, act upon it, and transform your organization for the digital age.
Tags : 
amp, cloud, data, customer, reconciliation, digital
    
AWS
Published By: AWS     Published Date: Oct 31, 2018
In this webinar, you will learn about VMware Cloud on AWS, an integrated hybrid cloud offering jointly developed by AWS and VMware delivering a highly scalable, secure and innovative service that enables organizations to seamlessly migrate and extend their on-premises VMware vSphere-based environments to AWS running on next-generation Amazon Elastic Compute Cloud (Amazon EC2) bare metal infrastructure.
Tags : 
vmware, cloud, aws, data
    
AWS
Published By: Cyphort     Published Date: Jun 28, 2016
Computer viruses have plagued personal computers since the original Brain virus began infecting boot sectors in 1986. Originally, these early viruses were annoying, but fundamentally benign in nature. However, once the initial concept of malicious propagating code became established, the actors creating viruses became more sophisticated in their approach. Ultimately, the results of a successful infection were more significant and the impact on an enterprise more severe.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
Published By: Zebra Technologies (Bulldog)     Published Date: Jul 11, 2019
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
    
Zebra Technologies (Bulldog)
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top