configuration

Results 301 - 325 of 532Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Sep 24, 2012
Employ the newest DellT server technology, with high-density memory, balanced I/O and the latest processors, for your enterprise virtualization and business processing environments.
Tags : hardware, dell, high availability, virtualization, virtualized infrastructure
     Dell
By: Dell     Published Date: Sep 24, 2012
Make IT the engine for your business success. The newest generation PowerEdgeT family is engineered with the right combination of features and performance scalability to handle tough workloads for both large and small data center environments.
Tags : it infrastructure, dell, server and storage configuration, data center, high availability, clustering, data, infrastructure configuration, network configuration
     Dell
By: IBM     Published Date: Oct 01, 2012
Read this data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : automated deployment, automated management, smbs, it solutions
     IBM
By: IBM     Published Date: Jul 09, 2012
IBM PureFlex Systems combine advanced IBM hardware and software with "patterns of expertise" and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : ibm, technology, software, customer, smb group research, storage
     IBM
By: Intel     Published Date: Aug 10, 2012
Intel AMT configuration is the gateway to manageability enabling time and cost-saving capabilities to manage and secure our PCs across the enterprise.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise securirty, save time, save money, cloud computing, virtualization, security
     Intel
By: Intel     Published Date: Aug 10, 2012
Learn how Intel Core vPro with SCS8.0 can help make Setup easy with an array of features from scanning to applying patches right from IT desk.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization
     Intel
By: VMTurbo     Published Date: Oct 24, 2013
This paper details VMTurbo’s approach to controlling workloads and the virtualized infrastructure in the desired state, leading to significant improvements in infrastructure efficiency and operational cost savings while assuring the storage performance of virtual workloads.
Tags : vmturbo, software defined control, sdc, workload, rightsizing, workload rightsizing, optimization, workload configuration, virtual environment, infrastructure, virtualized infrastructure, operational cost, data center
     VMTurbo
By: New Relic     Published Date: Jun 05, 2014
Configuration management (CM) tools like Puppet and Chef are really useful for keeping your systems in line, but what about your infrastructure? The Really Awesome New Cisco confIg Differ—or RANCID for short—is the first step in tackling this problem. Download to learn more!
Tags : new relic, devops, configuration management, rancid
     New Relic
By: New Relic     Published Date: Jun 05, 2014
The majority of IT professionals either don’t know anything about DevOps or just have a general understanding of the big picture. If you fall into either of those categories, this discussion is meant for you. In the following pages, we answer a number of basic questions—questions that probably sound much like your own.
Tags : new relic, devops, configuration management, it professionals
     New Relic
By: Box     Published Date: Jan 16, 2015
Desktop management at any scale is a tedious job. Imaging, reimaging, and troubleshooting desktop systems consume valuable IT resources, and keep employees from being productive. Securing the information generated on desktops, tablets, and smartphones is no simple job either. Many organizations are deploying virtual desktop infrastructures (VDI) for these reasons. But for deployment to be successful, computing and storage infrastructures must deliver high-quality, predictable, and productive user experiences. Often, the best way to accomplish this is through flash-based storage solutions due to its low latency/high IOPS nature. Unfortunately many IT professionals aren't sure what type of flash array is best for their needs or how to ensure that all elements of their VDI work seamlessly. Download now and learn how to validate a provide VDI configuration across NexGen N5 Hybrid Flash Array, VMWare Horizon View, Cisco Unified Computing System™(UCS), and Cisco Nexus Switches.
Tags : nexgen, hybrid, flash, qos, quality of service
     Box
By: HP     Published Date: Oct 01, 2014
If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, HP commissioned Forrester Consulting to evaluate the state of enterprise hybrid cloud environments and how they are being managed. Forrester developed a hypothesis that tested the assertion that enterprise IT operations teams struggle to recognize and manage this hybrid state — a hypothesis that was proven out.
Tags : hybrid, cloud, world, state, company, managing, reality, enterprise, environment, consulting, configuration, services, material, hypothesis, operations
     HP
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security
     ThreatTrack Security
By: Kenandy     Published Date: Jan 28, 2015
What do Star Trek and Enterprise Resource Planning (ERP) have in common? Apart from each being a bold adventure, both have experienced a rebirth as a next generation. In recent reports, Mint Jutras describes the next generation of ERP in terms of new technology that enables: new ways of engaging with ERP custom configuration without programming more innovation better integration
Tags : next generation erp, custom configuration, innovation, integration, erp for manufacturing
     Kenandy
By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
     MobileIron
By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : centrify, compliance, security, aws, dome9
     AWS
By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
     ThousandEyes
By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
     ThousandEyes
By: VMware     Published Date: Dec 18, 2012
This presentation will be available to audience members until June 21, 2014 at 09:00 AM Pacific Daylight Time.
Tags : virtualization, cloud, vmware, security, compliance
     VMware
By: Amazon     Published Date: Nov 07, 2013
This planning and implementation guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) to run a high-availability and site-resilient Exchange architecture.
Tags : amazon web services, microsoft exchange, aws cloud, cloud, web services, servers, processor, memory, storage, log replication, network traffic, resiliency, availability, configuration, deployment
     Amazon
By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration, data center, vmware, virtualization, stratavia
     Stratavia
By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
     TDi Technologies
By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : tripwire, breach, detection, security, configuration and change management, compliance
     Tripwire
By: IBM     Published Date: Jul 23, 2009
Download this white paper and find out  how technological advances are enabling collaboration to extend across the enterprise and through outsourced resources with globally distributed development. (GDD)  Learn how GDD is enabling companies to expand their operations on a  worldwide basis, cost and skills arbitrage, and reduced time to market.
Tags : ibm, ibm telelogic, global collaboration, global distributed development (gdd), wide area network (wan), application lifecycle management (alm), lan, software configuration management
     IBM
By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
     Qualys
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com