RecruitingBlogscom

Follow Us:

 

overview

Results 51 - 75 of 660Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Dec 05, 2016
This architectural comparison provides an overview of EMC’s XtremIO architecture as it compares to SolidFire’s series of all-flash arrays.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Dec 05, 2016
This SolidFire Definitive Guide provides an overview on storage Quality of Service and its importance in the Next Generation Data Center.
Tags : 
    
NetApp
Published By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : 
endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security, business technology
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware, security, business technology
    
Webroot
Published By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal “cloud-like” initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMC’s Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : 
cloud, bmc, cloud infrastructure
    
BMC Software
Published By: Oracle     Published Date: Oct 29, 2015
The rise of the empowered customer has converged B2B and B2C e-commerce. Despite similarities in the challenges faced by firms in both categories, B2B firms differentiate themselves by using content as a key lever to help buyers do their jobs. This report provides an overview of how B2B and B2C commerce are converging and what B2B firms must do to better interact with today’s business buyers.
Tags : 
oracle, aberdeen convergence brief, b2b, b2c commerce, networking, knowledge management, enterprise applications, business technology
    
Oracle
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover how HPE Advisory Consulting Services consolidates and modernizes workloads and technology siloes, simplifying administration, and improving automation. Learn how IT organizations can support on-demand IT services and enable DevOps, self-service IT and agile development practices, while reducing equipment and operating expenses. This HPE Blueprint provides them with an overview of the steps they need to consider to achieve this outcome. This is valuable information to the IT person, particularly when they don’t know where to begin.
Tags : 
    
Hewlett Packard Enterprise
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud applications, swgs, secure web gateway's, saas
    
Symantec
Published By: VMware     Published Date: Aug 17, 2011
This video webcast provides an overview of virtualization solutions from VMware® and explains the technology and products that enable these solutions.
Tags : 
vmware, vm ware, virtualization, virtual machine, virtual server, virtual pc, virtualization, gyro, business technology
    
VMware
Published By: Adobe     Published Date: Feb 03, 2015
This White Paper provides information on new trends and key findings of Digital Publication Platforms.
Tags : 
digital publication platform, content marketing, social media
    
Adobe
Published By: Adobe     Published Date: Aug 04, 2015
InfoTrends has developed this analysis piece to highlight who we believe to be the top vendors in this market.
Tags : 
digital publishing, digital publishing landscape, digital publishing solution
    
Adobe
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks, email marketing
    
Mimecast
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
A high level overview and introduction to the VCE VxRail Appliance.
Tags : 
vce, vxrail appliance, hyper converged, intro to vxrail, networking, security, it management, wireless, enterprise applications
    
EMC Converged Platforms
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This VxRail solution brief provides an overview and describes benefits gained by Federal Agencies.
Tags : 
vxrail, vce, vdi, federal agencies, solution brief, networking, security, it management, enterprise applications
    
EMC Converged Platforms
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This VxRail solution brief provides an overview and describes benefits gained by State and Local Govt Agencies.
Tags : 
vxrail, vce. vdi challenge, state and local agencies, solution brief, networking, security, it management, wireless
    
EMC Converged Platforms
Published By: MarkLogic     Published Date: Jun 09, 2017
NoSQL means a release from the constraints imposed on database management systems by the relational database model. This quick, concise eBook provides an overview of NoSQL technology, when you should consider using a NoSQL database over a relational one (and when to use both). In addition, this book introduces Enterprise NoSQL and shows how it differs from other NoSQL systems. You’ll also learn the NoSQL lingo, which customers are already using it and why, and tips to find the right NoSQL database for you.
Tags : 
    
MarkLogic
Published By: SolidFire_NetApp     Published Date: May 10, 2016
This document provides an overview of EMC’s XtremIO architecture as it compares to SolidFire. Not intended to be exhaustive, this overview covers select elements where the solutions differ and presents their impact to overall suitability for data center needs.
Tags : 
storage management, performance management, best practices, application integration, data management, data center, business intelligence
    
SolidFire_NetApp
Published By: Dell Server     Published Date: Aug 08, 2018
This paper provides an overview of the changing dynamics in the business world that demand a new approach to IT infrastructure. It provides a perspective for business managers and executives who are looking for a way to align business and IT by facing the challenges of disruption for better business outcomes. We will discuss the Kinetic Infrastructure from Dell EMC powered by Intel® Xeon® Platinum processor, which is designed to support IT flexibility and business agility. In addition, we will describe the first implementation of kinetic infrastructure on the Dell EMC PowerEdge MX system. The paper will explain how Dell EMC is helping businesses to rethink their data center architecture and accelerate their path towards more agility.
Tags : 
    
Dell Server
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Oracle     Published Date: Mar 15, 2016
The rise of the empowered customer has converged B2B and B2C e-commerce. Despite similarities in the challenges faced by firms in both categories, B2B firms differentiate themselves by using content as a key lever to help buyers do their jobs. This report provides an overview of how B2B and B2C commerce are converging and what B2B firms must do to better interact with today’s business buyers.
Tags : 
    
Oracle
Published By: MobileIron     Published Date: Nov 14, 2017
Watch this interactive video to get an overview of Mobileiron's products and the access it can offer you!
Tags : 
mobileiron, software solutions, mobility management
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part I of this series gives an overview of Microsoft’s strategy, and Part II provides a high-level comparison of MobileIron and Microsoft Intune.
Tags : 
mobileiron, microsoft strategy, data analysis, efficiency, webinar
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top