configuration

Results 301 - 325 of 521Sort Results By: Published Date | Title | Company Name
By: New Relic     Published Date: Jun 05, 2014
Configuration management (CM) tools like Puppet and Chef are really useful for keeping your systems in line, but what about your infrastructure? The Really Awesome New Cisco confIg Differ—or RANCID for short—is the first step in tackling this problem. Download to learn more!
Tags : new relic, devops, configuration management, rancid
     New Relic
By: New Relic     Published Date: Jun 05, 2014
The majority of IT professionals either don’t know anything about DevOps or just have a general understanding of the big picture. If you fall into either of those categories, this discussion is meant for you. In the following pages, we answer a number of basic questions—questions that probably sound much like your own.
Tags : new relic, devops, configuration management, it professionals
     New Relic
By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : nexgen, hybrid, flash, qos, quality of service
     Box
By: HP     Published Date: Oct 01, 2014
If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, HP commissioned Forrester Consulting to evaluate the state of enterprise hybrid cloud environments and how they are being managed. Forrester developed a hypothesis that tested the assertion that enterprise IT operations teams struggle to recognize and manage this hybrid state — a hypothesis that was proven out.
Tags : hybrid, cloud, world, state, company, managing, reality, enterprise
     HP
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security
     ThreatTrack Security
By: Kenandy     Published Date: Jan 28, 2015
What do Star Trek and Enterprise Resource Planning (ERP) have in common? Apart from each being a bold adventure, both have experienced a rebirth as a next generation. In recent reports, Mint Jutras describes the next generation of ERP in terms of new technology that enables: new ways of engaging with ERP custom configuration without programming more innovation better integration
Tags : next generation erp, custom configuration, innovation, integration, erp for manufacturing
     Kenandy
By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
     MobileIron
By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : centrify, compliance, security, aws, dome9
     AWS
By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
     ThousandEyes
By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
     ThousandEyes
By: VMware     Published Date: Dec 18, 2012
This presentation will be available to audience members until June 21, 2014 at 09:00 AM Pacific Daylight Time.
Tags : virtualization, cloud, vmware, security, compliance
     VMware
By: Amazon     Published Date: Nov 07, 2013
This planning and implementation guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) to run a high-availability and site-resilient Exchange architecture.
Tags : amazon web services, microsoft exchange, aws cloud, cloud, web services, servers, processor, memory
     Amazon
By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration
     Stratavia
By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
     TDi Technologies
By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : tripwire, breach, detection, security, configuration and change management, compliance
     Tripwire
By: IBM     Published Date: Jul 23, 2009
Download this white paper and find out  how technological advances are enabling collaboration to extend across the enterprise and through outsourced resources with globally distributed development. (GDD)  Learn how GDD is enabling companies to expand their operations on a  worldwide basis, cost and skills arbitrage, and reduced time to market.
Tags : ibm, ibm telelogic, global collaboration, global distributed development (gdd), wide area network (wan), application lifecycle management (alm), lan, software configuration management
     IBM
By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
     Qualys
By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
     Qualys
By: Dell Software     Published Date: Jul 18, 2012
Paper: Make Group Policies Do Mor
Tags : group policy, white paper, technology, customer, desktop, configuration, gpos, wmi
     Dell Software
By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover how to complete more application integration projects by delivering in days what used to take months of custom programming.  Find out how an appliance-based approach to application integration uses “configuration, not coding” to dramatically simplify and accelerate integration projects, while cutting costs by up to 80%.
Tags : erp, crm, integration, data integration, application integration, castiron, cast iron, scm
     Cast Iron Systems
By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover why traditional software and custom coding solutions are obsolete when solving integration problems in a SaaS environment and how they’re rapidly being replaced by Integration Appliances that use “configuration, not coding” to quickly integrate your SaaS applications with your business-critical data.
Tags : saas, software as a service, erp, scm, crm, data integration, application integration, marketing automation
     Cast Iron Systems
By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : integration, enterprise application integration, eai, application integration, castiron, cast iron
     Cast Iron Systems
By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had only two choices for integrating SAP solutions, complex and expensive platforms like EAI or write custom code. Integration Appliances offer companies a third option, one that dramatically simplifies and accelerates SAP integration by using a “configuration, not coding” approach to rapidly connect SAP applications with a wide variety of applications, without burdening specialist resources.
Tags : eai, sap, castiron, cast iron, enterprise resource planning, erp, crm systems
     Cast Iron Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com