RecruitingBlogscom

Follow Us:

 

deployment

Results 101 - 125 of 1566Sort Results By: Published Date | Title | Company Name
Published By: B Channels     Published Date: Dec 03, 2018
Long recognized as the market share leader of enterprise backup and recovery software, Veritas NetBackup™ is built to protect the largest and most demanding multi-cloud and data center environments. NetBackup delivers breakthrough capabilities for virtualized and cloud-based deployments that go well beyond what traditional backup practices can achieve.
Tags : 
    
B Channels
Published By: Basho     Published Date: Apr 07, 2015
This whitepaper looks at why companies choose Riak over a relational database. We focus specifically on availability, scalability, and the key/value data model. Then we analyze the decision points that should be considered when choosing a non-relational solution and review data modeling, querying, and consistency guarantees. Finally, we end with simple patterns for building common applications in Riak using its key/value design, dealing with data conflicts that emerge in an eventually consistent system, and discuss multi-datacenter replication.
Tags : 
basho, riak, relational database, nosql, common applications, simple deployments, it management, data management
    
Basho
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Big Bang LLC     Published Date: May 31, 2012
Cost-effective and fully automated device driver management for Microsoft SCCM with the Universal Imaging Utility System Deploy Plug-in. The UIUSD completely eliminates the need for SCCM admins to manage and package drivers.
Tags : 
    
Big Bang LLC
Published By: Black Duck Software     Published Date: Feb 17, 2016
Container technologies like Docker promise to transform the way enterprises develop, deploy, and manage critical applications. However, containers are no panacea. The same challenges around deploying and managing applications in native environments and virtual machines also affect container deployments.
Tags : 
blackduck, docker, container deployments, docker containers, application management, container security, it management, knowledge management, enterprise applications
    
Black Duck Software
Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, Mike Kirkup tells about BlackBerry application platform which simplifies the development, deployment and management of wireless applications. Leverages the core strengths of the BlackBerry solution to mobilize additional business processes and applications.
Tags : 
blackberry, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Apr 15, 2019
Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. Part of the confusion stems from the fact that AI is an umbrella term that covers a range of technologies — including machine learning, computer vision, natural language processing, deep learning, and more — that are in various stages of development and deployment. The use of AI for dynamic pricing and targeted marketing has been in use for a while, but actual AI computing where machines think like humans is still many years from becoming mainstream. T
Tags : 
    
BlackBerry Cylance
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Blue Coat demonstrated bandwidth reduction of up to 95%, and up to 40 times faster response time across all the WAN conditions. Find out more about how the joint solution provides a tremendous improvement in the user experiences of SAP BusinessObjects Enterprise for all WAN conditions tested in this complimentary white paper.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
This paper talks about the strengths and weaknesses of on-premise and could deployments and which organizations need hybrid solution.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Apr 05, 2012
This Webcast , discusses how hybrid web security can tackle these tough challenges. Hear pros and cons of various deployment options and key considerations for even the most cloud-hesitant security professionals.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring, enterprise applications
    
Blue Coat Systems
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
Download this white paper to learn why businesses seeking a competitive edge should deploy video conferencing and the pain points associated with today's video conferencing deployments and how they can be moved to the cloud. You'll also discover how the Blue Jeans cloud video conferencing service is addressing these challenges to make successful video conferencing a reality for businesses of all sizes.
Tags : 
video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
    
Blue Jeans Network
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
Download this white paper to learn why businesses seeking a competitive edge should deploy video conferencing and the pain points associated with today's video conferencing deployments and how they can be moved to the cloud. You'll also discover how the Blue Jeans cloud video conferencing service is addressing these challenges to make successful video conferencing a reality for businesses of all sizes.
Tags : 
video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
    
Blue Jeans Network
Published By: Blue Prism     Published Date: Mar 15, 2019
Blue Prism, the inventor of the term Robotic Process Automation (RPA) and the market leader in enterprise RPA, recently engaged Knowledge Capital Partners (KCP) to survey their client deployments. We used proprietary KCP research tools, and this report summarizes our findings. Based on finalized quantitative survey results as well as our ever-growing library of qualitative case investigations, the report analyzes the management practices and behaviors that underpin the exceptional value achieved by Blue Prism customers as outlined in our January 2018 report “Robotic Process Automation: Benchmarking the Client Experience.”
Tags : 
    
Blue Prism
Published By: BlueData     Published Date: Aug 19, 2015
Many organizations seeking to get started with Hadoop implementation have resorted to the public cloud to avoid the complexities of deployment. Organizations are always looking for an opportunity to take advantage of the simplicity of cloud deployment and the efficiencies of multi-tenant operations on premise. Download this white paper to see why there is a greater need to simplify on-premise deployment and see how this will greatly improve manageability and security.
Tags : 
big data, hadoop, hadoop-as-a-service, multi-tenant, and infrastructure, data center
    
BlueData
Published By: BlueData     Published Date: Aug 19, 2015
Big Data is on virtually every enterprise’s to-do list these days. Recognizing both its potential and competitive advantage, companies are aligning a vast array of resources to access and analyze this strategic asset. However, despite best intentions, the majority of these Big Data initiatives are either extremely slow in their implementation or are not yielding the results and benefits that enterprises expect. Download this white paper to learn how to solve the Big Data intention-deployment gap and see how you can make your infrastructure in a flexible, easy-to-use platform that will provide in-depth analytics.
Tags : 
big data, big data intention-deployment, in-depth analytics, hadoop, data management, data center
    
BlueData
Published By: BlueData     Published Date: Aug 19, 2015
As companies seek to better understand their customers, their opportunities, and themselves, they are embracing new technologies such as Hadoop and NoSQL to better manage and manipulate their data. Yet a complete solution for big data has many moving parts while at the same time these moving parts are continuously evolving. Download this white paper to figure out how to make all the moving parts work smoothly together and see how this will ease frustration with business users and free up your IT teams time to handle other issues.
Tags : 
big data infrastructure, hadoop deployment, spark, analytics software, big data, data management, data center
    
BlueData
Published By: BlueData     Published Date: Mar 13, 2018
In a benchmark study, Intel compared the performance of Big Data workloads running on a bare-metal deployment versus running in Docker containers with the BlueData software platform. This landmark benchmark study used unmodified Apache Hadoop* workloads
Tags : 
big data, big data analytics, hadoop, apache spark, docker
    
BlueData
Published By: BMC ESM     Published Date: Nov 05, 2009
Realizing its existing processes and tools were inadequate, labor intensive and error-prone, Morgan Stanley began looking for a new application deployment solution in early 2007. While not required in the initial assessment, Morgan Stanley also hoped to find a tool that would also provide capabilities such as hardware and operating system provisioning.
Tags : 
bmc esm, deployment, morgan stanley, hardware, operating system, management, application automation, operations manager, bladelogic, deploy application, application release manager
    
BMC ESM
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
Box
Published By: Box     Published Date: Jan 16, 2015
How do you know what the right storage set up is for you? How do you ensure that you're using best practices when implementing? As IT virtualization continues to become more and more prevalent, the storage component of the virtualization architecture continues to play a critical role in performance and availability. Additionally, the ability to benchmark and predict storage performance in a virtualized environment is essential to an efficient and well-run VDI setup. Download now and learn how to select and size the best storage array for your VMWare deployment to maximize your VM density and increase ROI.
Tags : 
nexgen, flash, qos, vmware, storage, software development, it management
    
Box
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top