physical infrastructure

Results 26 - 50 of 85Sort Results By: Published Date | Title | Company Name
Published By: Panduit     Published Date: Aug 28, 2018
Interested in learning how the right physical and network infrastructure approach in your colocation data center facility can help you stabilize costs, provide better security, and help promote growth for you and your tenants? Download the Panduit white paper Optimizing Colocation Infrastructure Strategies to learn how to overcome the challenges of aging colocation data center infrastructure and onboard new tenants quickly.
Tags : 
panduit, colocation, data center, data center management, infrastructure, colocation provider
    
Panduit
Published By: Panduit     Published Date: Nov 28, 2018
If you’re looking to build, expand, or modernize your facility with converged physical infrastructure solutions, be sure to download our cheat sheet Key Questions to Ask a Prospective Converged Physical Infrastructure Solutions Vendor.
Tags : 
panduit, colocation, converged infrastructure
    
Panduit
Published By: Cisco     Published Date: Jan 21, 2015
Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.
Tags : 
cisco, surveillance, ip-enabled, devices, data, integration, iot, business, security, business technology
    
Cisco
Published By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : 
iaas, solution, cloud-based
    
ProfitBricks
Published By: Equinix     Published Date: Oct 20, 2015
In real estate, the most important factor is location, location, location! Your services are not quite as sensitive to the physical position of your technology, but location certainly can be a pivotal factor in optimizing your service design and service delivery. Ideally, location shouldn’t matter; however, it does have an e?ect on customer experience. When technology services were simpler, location was largely irrelevant, but now the complexity of new services demands a strategy more in line with your BT agenda than your former IT agenda. The e?ects of regulatory, cost, risk, and performance factors will vary based on the physical location of your technology resources. Colocation providers, cloud service providers, and even traditional hosting services o?er plenty of evolving options to help infrastructure and operations (I&O) professionals balance these factors to optimize service design and delivery.
Tags : 
data center, optimizing service, infrastructure and operations, service design and delivery, cloud service, hosting services, enterprise applications
    
Equinix
Published By: Schneider Electric     Published Date: Jun 04, 2015
This paper shows how virtualizing a data center’s IT resources can have certain consequences related to the physical infrastructure.
Tags : 
virtualisation, data center, cloud computing, cooling and management, cooling, power and cooling
    
Schneider Electric
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms, security
    
Entrust Datacard
Published By: HP Data Center     Published Date: Mar 25, 2009
In this White Paper IDC sees the use of static x86 server configurations is quickly becoming an outdated concept with the introduction of modern solutions based on blade architectures, which can offer both intelligent configuration and management and the ability to perform physical-to-virtual migration to promote uptime and efficient resource usage. When combined with the quickly maturing x86 hypervisor technologies available from a variety of solution providers, the synergy of blade architectures and virtualization offers customers the ability to dramatically increase utilization of their server investments, boost uptime, provide a more resilient and available infrastructure, and roll out new infrastructure and services more quickly.
Tags : 
hp data center, virtualization, x86, hypervisor technologies, it infrastructure, blade architecture, basic virtualization, advanced virtualization, hp c-class bladesystem, unvirtualized, legacy rehosting, virtualized deployment, it benchmarks, total cost of ownership, tco, scalability, cost reductions, system management, it management
    
HP Data Center
Published By: McAfee     Published Date: Feb 06, 2013
The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively, and require a new generation of flexible security architectures.
Tags : 
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Flexible, top-rated security and high performance for proactive protection across physical and virtual infrastructure.
Tags : 
hybrid data center, data center, data center security, virtualization, virtual data center, virtual machines, cloud computing, virtualized security, virtualization anti virus, hypervisors, virtual desktop security, virtual desktops
    
McAfee
Published By: Acronis     Published Date: Dec 28, 2011
Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis
    
Acronis
Published By: Acronis     Published Date: Jan 20, 2012
Today, the cloud stirs up all manner of possibilities for handling data protection, but the cloud also brings many challenges: security, bandwidth, connection availability and data recovery.
Tags : 
acronis, data, data management, virtualization, infrastructure, hybrid, backup, data recovery
    
Acronis
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security, real-time targetin engine, service packs, it infrastructure, patching, auditing, it management, business technology, data center
    
Dell Software
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
This whitepaper will provide an overview of cloud computing, identify some challenges and considerations for using the cloud, and will look at how best to manage a combination of physical and virtual systems throughout your infrastructure in order to support your business objectives.
Tags : 
shavlik, cloud computing, infrastructure, physical and virtual system, patching, os migration
    
Shavlik Technologies
Published By: NetApp     Published Date: Sep 24, 2013
Many organizations have adopted virtualization as a standard for server workloads. But virtualization has not proven to be the “game changer” many organizations had envisioned. IT departments face huge challenges related to server sprawl, which has actually increased with virtualization. Although virtualization has brought benefits beyond the physical paradigm of one operating system per server, the true optimal infrastructure for organizations comes with adopting a private cloud infrastructure. Check out this white paper to learn the benefits of a private cloud and discover how deploying one private cloud solution can provide: Consolidated resources Flexible services Easy provisioning of new environments And more
Tags : 
best practices, private cloud, netapp, cloud, technology, windows server, security, data center
    
NetApp
Published By: Microsoft     Published Date: Jul 20, 2018
If you’re like most developers, you spend about two-thirds of your time building and the rest of your time learning. Sometimes your research is proactive, based on personal interest or a desire to maintain your skills, but more likely it’s out of necessity—learning what you need to tackle your next big project. Not long ago, new projects assumed an on-premises or hosted approach, forcing you to spend considerable time on essential requirements like scalability, availability, and security. Today, you still must deliver on those essentials, but the apps you’re building need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and delight users in new ways. Cloud services not only deliver “built-in” scalability and availability, but also provide an unprecedented range of prebuilt functionality for driving innovation into your apps—ready to evaluate for your next project, without your having to worry about physical infrastructure and the related ove
Tags : 
    
Microsoft
Published By: IBM     Published Date: Aug 08, 2012
Manage physical and virtual assets, maintain your infrastructure and capital equipment and maximize the efficiency of your people, processes and assets with predictive analytics.
Tags : 
ibm, technology, asset management, business management, predictive analytics, physical assets, virtual assets, infrastructure, capital equipment, business technology
    
IBM
Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss, business technology
    
IBM
Published By: CDW     Published Date: Mar 31, 2015
A wireless network is a platform for enabling enterprise-wide access to an organization's applications and data. Wireless infrastructure allows users to take the office with them wherever they go. The wireless network provides employees and guest workers with untethered access to voice, video, data and applications regardless of their physical location. With the influx of mobile devices and increase in Wi-Fi connections, organizations are already starting to see a paradigm shift to "wireless by default" and "wired by exception." Watch this video to see how our solution architects upgraded the Shawnee Mission School District's aging network infrastructure.
Tags : 
wireless network, networking, applications, data, infrastructure, update, it management, wireless
    
CDW
Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
An Intelligent Roadmap for Capacity Planning Many organizations apply overly simplistic principles to determine requirements for compute capacity in their virtualized data centers. These principles are based on a resource allocation model which takes the total amount of memory and CPU allocated to all virtual machines in a compute cluster, and assumes a defined level of over provisioning (e.g. 2:1, 4:1, 8:1, 12:1) in order to calculate the requirement for physical resources. Often managed in spreadsheets or simple databases, and augmented by simple alert-based monitoring tools, the resource allocation model does not account for actual resource consumption driven by each application workload running in the operational environment, and inherently corrodes the level of efficiency that can be driven from the underlying infrastructure.
Tags : 
capacity planning, vmturbo, resource allocation model, cpu, cloud era, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee