RecruitingBlogscom

Follow Us:

 

hardware

Results 551 - 575 of 846Sort Results By: Published Date | Title | Company Name
Published By: Pepperdata     Published Date: Jun 25, 2015
Download the white paper, A Highly-Tuned Hadoop Cluster, to learn how to add real-time optimization technology to performance tuning strategy to: • Monitor and control the actual use of (and demand for) each kind of hardware resource by task • Identify ‘holes’ in the cluster where a node could temporarily do more work • Eliminate the need to physically separate workloads to ensure performance
Tags : 
    
Pepperdata
Published By: Intel     Published Date: Apr 11, 2019
Intel teamed up with Philips to show that servers powered by Intel® Xeon® Scalable processors could be used to efficiently perform deep learning inference on patients’ X-rays and computed tomography (CT) scans, without the need for accelerators. The ultimate goal for Philips is to offer artificial intelligence (AI) to its end customers without significantly increasing the cost of the customers’ systems and without requiring modifications to the hardware deployed in the field.
Tags : 
    
Intel
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The focus of this report is performance testing of the core services of an OCS Enterprise Edition Consolidated Configuration and as deployed on an HP BladeSystem and HP StorageWorks solution. One requirement for any solution deploying more than one server in a pool is a hardware load balancer. In this solution a F5 BIG-IP Local Traffic Manager is used.
Tags : 
hp bladesystem, hp storageworks, server deployment, microsoft office communications server, platforms, storage
    
F5 Networks Inc
Published By: VMware Dell     Published Date: Jan 31, 2008
As Perimeter Church's congregation expanded, their IT staff needed to find a way to meet the growing IT needs of the church with limited staff. Download this case study to learn how the Perimeter IT team has been able to perform its administrative functions much more effectively with VMware technology.
Tags : 
server management, servers, server, virtual server, virtual machine, vmware, server software, infrastructure, hardware costs, cost control, church
    
VMware Dell
Published By: Wheelhouse Technologies     Published Date: Mar 23, 2012
This white paper gets advice from phone system managers who were in the forefront of remedying phone system disasters. Topics like buying incompatible hardware, brands with bad customer service, or companies with bad SIP service are covered.
Tags : 
phone system, wheelhouse, wheelhouse, technologies, yachts, fleets, workboats, marine, maintenance, spare parts, services, owners, operators, fleet managers, enterprise applications, telecom
    
Wheelhouse Technologies
Published By: ITManagement     Published Date: Nov 06, 2007
Our handy comparison chart lines up the vendors in the market and compares the most important factors in a networking equipment decision.
Tags : 
networking, network management, switch, ethernet networking, gigabit networking, mbps, gigabit, ethernet, ethernet switch, network management, internetworking hardware, switches, stack, stacking, stackable, infrastructure, itmanagement, it management, tippit
    
ITManagement
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper extends the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute published in July 2012, The purpose of this original research was to learn how organizations deploy full disk encryption solutions for desktop and laptop computers as well as the determination of total cost and benefits for organizations using this technology. A reanalysis of this research allows us to formulate new findings that compare the total cost of ownership of software versus hardware-based full disk encryption solutions.
Tags : 
ponemon, tco, software, hardware, full disk, encryption, total, cost, ownership
    
WinMagic Inc.
Published By: Oracle     Published Date: Apr 16, 2018
O gerenciamento de banco de dados é caro e complicado. Conforme aumenta o número de aplicativos e bancos de dados, os custos e complicações podem multiplicar-se. Uma solução, seria um sistema de hardware e software projetado especificamente para que o software de banco de dados otimize as operações de banco de dados, tanto para o desempenho quanto para a simplificação administrativa. O Oracle Exadata é a única plataforma que proporciona desempenho ideal do banco de dados e eficiência para dados mistos, análises e cargas de trabalho OLTP. Com uma gama completa de opções de implantação, ele permite que você execute seu banco de dados Oracle e cargas de trabalho de dados onde e como desejar — on-premise, na nuvem da Oracle, na nuvem do Cliente em seu data center ou em qualquer combinação desses modelos.
Tags : 
executar, banco, dados, oracle, exadata
    
Oracle
Published By: Dell     Published Date: Oct 23, 2008
The stark reality of the data center today is mixed platforms, operating systems and hardware. Fortunately Windows Vista has been engineered to integrate smoothly into these so-called hybrid environments, as you’ll learn in this podcast featuring Microsoft expert Chris Ross.
Tags : 
dell, integration of windows vista, vista hybrid environments, it management, platforms
    
Dell
Published By: Eaton     Published Date: Jun 01, 2012
Server virtualization empowers businesses to lower hardware spending, simplify administration and boost availability. For IT and facilities managers, however, it introduces challenges and opportunities.
Tags : 
power management, server virtualization, business continuity, data center, virtual machines, server utilization, business technology
    
Eaton
Published By: Eaton     Published Date: Feb 08, 2017
Server virtualization empowers businesses with significant advantages that include reduced hardware expenses, simplified administration and heightened availability. As a result, nearly 80 percent of server workloads supported by x86 hardware are now running on virtual machines, according to Gartner estimates. However, despite its widespread adoption and benefits, the technology is not without its challenges.
Tags : 
    
Eaton
Published By: Dell EMEA     Published Date: Mar 05, 2019
In a business environment increasingly threatened by aggressive malware, ransomware and data theft, Dell client devices and the Dell endpoint security portfolio deliver a unique combined hardware and software solution, integrating revolutionary threat prevention with enterprise-class encryption and authentication, all managed from a single console. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: Dell     Published Date: May 04, 2015
Read now to learn how you can get the most out of your private cloud, as well as the hardware and software components of this architecture.
Tags : 
    
Dell
Published By: Tripp Lite     Published Date: Jan 24, 2007
Voice over IP (VoIP) is exploding in popularity as an application for business data networks. As a result, a company can lower its hardware and service costs while raising productivity through the use of more customizable telephony applications.
Tags : 
voice over ip, voip, ip telephony, call center management, quality of service, network infrastructure, infrastructure, power, voip deployment, voip implementation, power supply, tripplite, tripp lite
    
Tripp Lite
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, security, it management, data management
    
HP
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies
Published By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security, kernel level security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security
    
McAfee
Published By: Veeam '18     Published Date: Mar 13, 2018
Some customers are pushing independent software vendors to come out with their own appliances. Be careful what you ask for, because you may create something that you weren’t looking for. What happens if your favorite backup software product suddenly starts putting out its own appliance? At a minimum, other appliances from other vendors may cease to exist. Why should a big-box vendor partner with your backup software product only to compete with them? What happens when someone at the helm starts realizing that by creating a tighter integration between the software and the hardware, the company increases its bottom line enough to make that worthwhile? You may find yourself forced to buy a different hardware product than you want in order to keep the software that you like.
Tags : 
data management, vendors, software, customers, product
    
Veeam '18
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : 
software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware, citrix, technology integration, data integration, data management, data center
    
Dell Software
Published By: Intel     Published Date: May 22, 2017
This white paper will detail the challenges in deploying SDNenabled NFV, share how the integrated DCEngine hardware and software architecture overcomes these challenges, and provide some brief case study examples showcasing the benefits of this comprehensive solution offering.
Tags : 
    
Intel
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Cloud is coming of age: It’s no longer just a tool for business efficiency; it’s necessary for the speed and agility required to compete in the digital economy. Until recently, CIOs have considered Cloud deployments in terms of Public versus Private Cloud merits, but the answer needs to be both. It’s a new way of thinking—and a new model for enterprise IT, creating an application delivery engine that drives digital transformation.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top