configuration

Results 301 - 325 of 536Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Sep 21, 2012
Choosing the right combination of hardware and software for your data center can be a daunting task. This guide provides scalability within these configurations to fit your hardware needs as your business grows
Tags : 
dell, microsoft, virtualization, hardware, infrastructure, virtualized infrastructure, high availability, it infrastructure
    
Dell
Published By: Dell     Published Date: Sep 24, 2012
Employ the newest DellT server technology, with high-density memory, balanced I/O and the latest processors, for your enterprise virtualization and business processing environments.
Tags : 
hardware, dell, high availability, virtualization, virtualized infrastructure
    
Dell
Published By: Dell     Published Date: Sep 24, 2012
Make IT the engine for your business success. The newest generation PowerEdgeT family is engineered with the right combination of features and performance scalability to handle tough workloads for both large and small data center environments.
Tags : 
it infrastructure, dell, server and storage configuration, data center, high availability, clustering, data, infrastructure configuration
    
Dell
Published By: IBM     Published Date: Oct 01, 2012
Read this data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
automated deployment, automated management, smbs, it solutions, business technology
    
IBM
Published By: IBM     Published Date: Jul 09, 2012
IBM PureFlex Systems combine advanced IBM hardware and software with "patterns of expertise" and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm, technology, software, customer, smb group research, storage, business technology
    
IBM
Published By: Intel     Published Date: Aug 10, 2012
Intel AMT configuration is the gateway to manageability enabling time and cost-saving capabilities to manage and secure our PCs across the enterprise.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise securirty, save time, save money
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Learn how Intel Core vPro with SCS8.0 can help make Setup easy with an array of features from scanning to applying patches right from IT desk.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: VMTurbo     Published Date: Oct 24, 2013
This paper details VMTurbo’s approach to controlling workloads and the virtualized infrastructure in the desired state, leading to significant improvements in infrastructure efficiency and operational cost savings while assuring the storage performance of virtual workloads.
Tags : 
vmturbo, software defined control, sdc, workload, rightsizing, workload rightsizing, optimization, workload configuration
    
VMTurbo
Published By: VMTurbo     Published Date: Feb 11, 2014
Automatically and continuously optimizing workload configurations in your virtual environment
Tags : 
vmturbo, virtual environment, optimize workload configurations, workload rightsizing, virtualized data, data centers, infrastructure, risk solutions
    
VMTurbo
Published By: New Relic     Published Date: Jun 05, 2014
Configuration management (CM) tools like Puppet and Chef are really useful for keeping your systems in line, but what about your infrastructure? The Really Awesome New Cisco confIg Differ—or RANCID for short—is the first step in tackling this problem. Download to learn more!
Tags : 
new relic, devops, configuration management, rancid, networking, it management
    
New Relic
Published By: New Relic     Published Date: Jun 05, 2014
The majority of IT professionals either don’t know anything about DevOps or just have a general understanding of the big picture. If you fall into either of those categories, this discussion is meant for you. In the following pages, we answer a number of basic questions—questions that probably sound much like your own.
Tags : 
new relic, devops, configuration management, it professionals, networking, it management
    
New Relic
Published By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : 
nexgen, hybrid, flash, qos, quality of service, it management
    
Box
Published By: HP     Published Date: Oct 01, 2014
If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, HP commissioned Forrester Consulting to evaluate the state of enterprise hybrid cloud environments and how they are being managed. Forrester developed a hypothesis that tested the assertion that enterprise IT operations teams struggle to recognize and manage this hybrid state — a hypothesis that was proven out.
Tags : 
hybrid, cloud, world, state, company, managing, reality, enterprise
    
HP
Published By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : 
cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management
    
ThreatTrack Security
Published By: Kenandy     Published Date: Jan 28, 2015
What do Star Trek and Enterprise Resource Planning (ERP) have in common? Apart from each being a bold adventure, both have experienced a rebirth as a next generation. In recent reports, Mint Jutras describes the next generation of ERP in terms of new technology that enables: new ways of engaging with ERP custom configuration without programming more innovation better integration
Tags : 
next generation erp, custom configuration, innovation, integration, erp for manufacturing, enterprise applications
    
Kenandy
Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron
Published By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: VMware     Published Date: Dec 18, 2012
This presentation will be available to audience members until June 21, 2014 at 09:00 AM Pacific Daylight Time.
Tags : 
virtualization, cloud, vmware, security, compliance, business technology
    
VMware
Published By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : 
server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration
    
Stratavia
Published By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
    
TDi Technologies
Published By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : 
tripwire, breach, detection, security, configuration and change management, compliance
    
Tripwire
Published By: IBM     Published Date: Jul 23, 2009
Download this white paper and find out  how technological advances are enabling collaboration to extend across the enterprise and through outsourced resources with globally distributed development. (GDD)  Learn how GDD is enabling companies to expand their operations on a  worldwide basis, cost and skills arbitrage, and reduced time to market.
Tags : 
ibm, ibm telelogic, global collaboration, global distributed development (gdd), wide area network (wan), application lifecycle management (alm), lan, software configuration management
    
IBM
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.