computing

Results 1 - 25 of 2046Sort Results By: Published Date | Title | Company Name
Published By: Avanade DACH     Published Date: Aug 01, 2018
Je besser die Daten, desto besser die Künstliche Intelligenz Sie möchten Ihre Kunden und deren Verhalten besser verstehen? Ihnen eine maßgeschneiderte Customer Experience bieten? Oder neue Geschäftsfelder identifizieren? Es ist vielleicht nicht immer offensichtlich: Aber die Grundlage jeder gut funktionierenden KI sind Daten. In unserem Leitfaden zeigen wir Ihnen in sechs Schritten, wie Sie Ihre Daten auf innovative Weise organisieren. So schaffen Sie eine optimale Grundlage, um künftig das Beste aus künstlicher Intelligenz, Cognitive Computing und maschinellem Lernen herausholen zu können.
Tags : 
    
Avanade  DACH
Published By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: IBM     Published Date: Aug 01, 2018
EMA discusses Serverless computing as a top priority among companies, & why IBM Cloud Functions ranks for rapid ramp up and Hybrid Cloud.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 08, 2018
IBM Cloud Private For Dummies provides insights into the role of the private cloud and how it supports changing requirements for computing.
Tags : 
    
IBM
Published By: Tripp Lite     Published Date: Jun 28, 2018
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. End users may assume they need to increase cooling capacity, but this is often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
    
Tripp Lite
Published By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
    
Avi Networks
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
    
Amazon Web Services
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: Epson     Published Date: May 14, 2018
Over the past few years, improvements in mobile devices, Wi-Fi, and cloud computing have made mobile point of sale (POS) solutions e ective and a ordable for businesses of all sizes. Tablets have emerged as the most popular platform for mobile POS solutions, and you may have already heard the buzz about them. There’s a reason for all the hullaballoo. In addition to integrating payments and making retail transactions more e cient than using a traditional electronic cash register (ECR), tablet POS solutions can provide robust management data. A tablet POS solution makes sense for many retailers, particularly if you’re looking to: • replace an ECR or want to have a mobile POS in place on opening day • unlock new pro t-making and cost-saving opportunities • expand your business • keep pace with ever-changing customer expectations Figuring out which tablet POS solution is the best for your business may seem like a huge challenge. But don’t worry. Taking the right approach, by using too
Tags : 
    
Epson
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas, service level agreement, vaas, mashup, enterprise communications
    
NEC
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Zebra Technologies     Published Date: Sep 05, 2018
Retailer taps mobile computing to optimize markdowns, omnichannel fulfillment, and enhance the shopper experience
Tags : 
    
Zebra Technologies
Published By: Alcatel-Lucent     Published Date: Dec 02, 2009
Faster, more powerful and dense computing hardware generates significant heat and imposes considerable data center cooling requirements.
Tags : 
data center design and management, distributed computing, internetworking hardware, power and cooling
    
Alcatel-Lucent
Published By: Lenovo and Intel     Published Date: Aug 02, 2018
Having the right, scalable, IT systems to handle large compute workloads, while tapping into massive data sets, is critical to a project's success and even the success of your business. HPC solutions, powered by Intel® technology, offer greater value potential by combining the density of blade computing with the economics of rack-based systems. Learn how businesses like yours are using HPC technology to expand IT infrastructure, improve development, accelerate overall innovation, and stay on budget. Get the white paper.
Tags : 
lenovo, intel, systems, technology
    
Lenovo and Intel
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security
    
Astaro
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Using your allotted resources wisely is admirable. However, have you thought in detail about the real costs associated with using “white box” servers? The Cisco Unified Computing System™ (Cisco UCS®) delivers advantages, including a lower total cost of ownership (TCO), beyond those that white-box servers can deliver.
Tags : 
cisco, usc, resources, whitebox servers, tco, storage, it management
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
The widespread use of mobile devices — smartphones and tablets — provides anytime, anywhere computing and communications resources for individuals worldwide. Both smartphones and tablets have made the transition from a personal resource, acquired and supported by consumers, to a professional resource, provided and supported by employers. For midsize firms around the world, those with 100–999 employees, mobile resources play a key role in improving workplace productivity as well as allowing greater flexibility in how and where work is done. New collaboration resources also allow staff in different locations to work together as efficiently and effectively as staff in the same office. The challenge for IT management is how best to coordinate the different collaborative and mobile resources and provide secure management of mobile devices and collaboration tools while enhancing workforce agility and productivity.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In this era of digital disruption, businesses must be more agile to capture opportunities. Many viewed cloud computing technology as the way to do this, promising to address agility, scalability, and cost. But in moving to the cloud, many found that its security, compliance, and performance did not fully meet their needs. Additionally, previous common thought was public cloud is less expensive than private cloud. We now know that is not true in all cases. Savvy businesses realise hybrid IT, which includes both offpremises and on-premises services, enables better agility. After initial experience with public cloud offerings, businesses learned that many workloads are best hosted onpremises, primarily due to security, compliance, performance, control, and cost issues.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Im heutigen Zeitalter bahnbrechender digitaler Neuerungen müssen Unternehmen agiler handeln, um Geschäftschancen nutzen zu können. Viele haben dabei auf die Cloud Computing-Technologie gesetzt, da sie darauf ausgerichtet ist, die Agilität zu verbessern, die Skalierbarkeit zu steigern und die Kosten zu senken. Bei der Umstellung auf die Cloud mussten viele Unternehmen aber feststellen, dass das damit verbundene Maß an Sicherheit, Compliance und Leistung ihren Anforderungen nicht in vollem Umfang gerecht wird. Bisher war man zudem allgemein der Meinung, dass eine Public Cloud kostengünstiger als eine Private Cloud ist. Heute wissen wir, dass dies nicht in allen Fällen zutrifft. Kluge Unternehmen haben erkannt, dass Hybrid IT, die sowohl externe als auch lokale Services umfasst, mehr Agilität ermöglicht.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Cloud computing is rapidly entering an entirely new phase – one destined to prove far more transformative and disruptive than the initial phase of cloud deployment. Cloud is driving a comprehensive transformation of digital assets in organizations of all stripes as IT decision-makers begin to view the emerging cloud construct as a proxy for the transformation of IT itself.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.