technical solutions

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible. Like larger companies, midsize firms must make sure that they are effectively coordinating on-premise, public cloud, and private cloud capabilities. Unlike large companies, though, midsize firms are limited in both financial and technical resources to design and coordinate effective solutions to meet specific needs. Rather than invest in a major overhaul of their IT environments, midsize firms have to move incrementally, supplementing current resources with new cloud and on-premise capabilities that provide the performance needed to prosper in an increasingly competitive environment.
Tags : 
    
Hewlett Packard Enterprise
Published By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle CX
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
For organisations that aim to modernise their IT environments and limit operational risks that can incur costs, IDC recommends making data protection initiatives a top priority. Modernise data protection to cut IT costs and advance IT Transformation. Modern data protection enables organisations to shrink data backup and recovery windows , which means fewer security breaches and faster resolutions when they do happen. To truly transform IT, modernise your data center to increase IT efficiency and shed technical debt while protecting your bottom line. Drive IT Transformation and results with leading enterprise solutions from Dell EMC powered by Intel®.
Tags : 
    
Dell EMC & Intel
Published By: Citrix Systems     Published Date: Feb 23, 2011
Citrix solution brief explains the technical functionality of Citrix solutions that enable a successful BYO program.
Tags : 
citrix systems australia, byo program, employee productivity, windows desktop, bring your own computer, employee productivity, data security, mobile computing
    
Citrix Systems
Published By: CA Technologies     Published Date: Sep 25, 2017
Today’s adaptive enterprises have to leverage data to remain flexible and responsive, but they need the right data. But it isn’t easy: Many companies struggle to improve technical execution while maintaining the visibility executives need. That’s why we created CA PPM + CA Agile Central, a seamless integration of our agile-management and business-portfolio management solutions. Together, they provide unparalleled visibility into both funding and work across every level of your organization.
Tags : 
funding, increment, planning, value, roadmap, agile central, ca technologies
    
CA Technologies
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Apr 06, 2016
" This eBook will take you through the basics of application release and deployment, and provide best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions Complete the short form to the right to download the eBook."
Tags : 
ibm, application release, devops, deployment, ibm urbancode, software development, enterprise applications
    
IBM
Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite
Published By: Delphix     Published Date: Feb 28, 2013
Agile Data Management eliminates the common barriers to successful agile development, reducing both the cost and the risk of short, parallel development projects. This paper discusses common challenges and the technical solutions for addressing them.
Tags : 
database virtualization, roi, data management, data management software, agile development, application development
    
Delphix
Published By: HP Inc.     Published Date: Jul 17, 2017
As a consumer, it’s more than likely that you own at least one item made by Jabil. Headquartered in the U.S., Jabil is one of the world’s most technically advanced manufacturing solutions providers, working with most major consumer brands across more than 100 facilities in 28 countries. Keeping its customers competitive requires Jabil to stay on the cutting edge of engineering, prototyping, and manufacturing. Producing parts on a 3D printer that meet or exceed traditional manufacturing’s cost, quality, and speed gives Jabil’s customers a new edge in the ultra-competitive consumer products market—a benefit that’s especially important to Dulchinos.
Tags : 
3d printing, printer, print services, hp technology, prototyping, 3d printer, production software, printing solutions, digital manufacturing
    
HP Inc.
Published By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding “virtual data”, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
    
Delphix
Published By: NetApp     Published Date: Mar 06, 2018
Gartner Report: Competitive Landscape for Hyperconverged Integrated Systems. Accelerate business outcomes and achieve growth with hyperconverged integrated systems (HCIS). Key findings: As the hyperconverged integrated system (HCIS) market has matured in the past two years, some smaller providers without sufficient bases, technical resources and cash to survive on their own have exited the market." • "HCIS-only providers that have a sustainable sales advantage based on effective communication of technical strengths that can deliver superior cost savings or performance advantages are most likely to remain viable as the market continues to grow." • "HCIS providers without compelling value propositions to differentiate their offerings against other HCIS solutions are unlikely to survive the increasing competitive pressure that is appearing in the market."
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Oracle     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle
Published By: JBoss Developer     Published Date: Oct 21, 2016
Organizations may believe that simply building new applications to keep up with changing business needs is enough to offer new value to the market. However, between building new applications and maintaining legacy Java EE applications, organizations often end up supporting both traditional and new infrastructures with unchanged or even reduced IT budgets. As the pressure to increase their technical and business agility increases, IT organizations are being forced to re-examine their processes and infrastructure. The result? Architecturally rigid, monolithic middleware is being replaced with solutions that offer agility, flexibility, and rapid development and deployment, such as PaaS.
Tags : 
paas, devops, java ee, i.t, security
    
JBoss Developer
Published By: Microsoft     Published Date: Jul 20, 2018
Cloud is becoming an essential ingredient to a successful IT infrastructure. Recent research by IDC has identified how the growth of cloud as a computing platform has magnified the importance of cloud skills to the success of the enterprise. Moreover, it is becoming clear that IT professionals with cloud skills are strongly influencing both the type of cloud infrastructure and the ultimate pace of adoption of cloud. This puts IT professionals with cloud skills in the driver's seat of their own career. In fact, IT professionals with certifications related to cloud development and operations have dramatically more influence over their organizations' adoption and expansion of cloud services than otherwise similar IT professionals have over the adoption of other types of technical solutions. Cloud skills accelerate the success and career path of IT professionals. The impactful cloud roles are diverse: Multicloud or hybrid cloud management, workload-centric management, and DevOps illustrate
Tags : 
    
Microsoft
Published By: ESET     Published Date: Jan 30, 2008
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
Tags : 
malware, threats, email, threat summary, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software, spam solution, email spam
    
ESET
Published By: NetApp     Published Date: Sep 19, 2013
Download this solutions guide to get a technical overview on building Hadoop on NetApp E-series storage and learn how it will effectively help deliver big analytics with pre-engineered, compatible, and supported solutions ultimately reducing the cost, schedule, and risk of do-it-yourself systems.
Tags : 
netapp, open solution, hadoop, solutions guide, e-series storage, big analytics, big data
    
NetApp
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: NetApp     Published Date: Dec 01, 2009
This technical report (TR) provides guidelines and best practices for integrated architectures and implementations of Microsoft® Hyper-V with NetApp® storage solutions.
Tags : 
netapp, storage, microsoft virtualization, technical report, integrated architectures, hyper-v, cluster network, configuration, back up and recovery, disaster recovery
    
NetApp
Published By: Bomgar     Published Date: Mar 04, 2008
Organizations implemented ITIL with the goal of creating a set of standards to ensure the delivery of high-quality and efficient technical support. However, many organizations are now looking to realize near-term business value from their investments in ITIL. This ITIL Quickguide outlines how organizations can leverage remote support solutions to accelerate ITIL initiatives and realize near-term business value.
Tags : 
service, customer service, customer support, remote support, online helpdesk, online support, help desk, itil, bomgar
    
Bomgar
Published By: IBM     Published Date: Jul 20, 2016
In this white paper we discuss what hybrid cloud is, why it’s inevitable, and how to take advantage of it. We look at some of the barriers to public-cloud adoption, while we cut through unnecessary technicalities to get to the heart of the matter. We also offer a brief overview of the sponsor of this paper and their relevant solutions.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business technology, hybrid cloud, hybrid, enterprise applications
    
IBM
Published By: Esker     Published Date: Jan 21, 2016
EDI solutions may be far from perfect, but their positive impact on the speed, accuracy and efficiency of order processing is unquestionable. There's just one rather large exception... exceptions. Learn how to simplify EDI exception handling by downloading this not-so-technical EDI order processing handbook. You'll discover added values that automation brings to EDI order processing, such as: - Faster resolutions involving less complexities - Reduced needs for IT involvement - Easier access to orders in the EDI workflow - Improved forecasting via intelligent dashboards Learn more about EDI and handling exceptions with order processing automation — download the handbook now!
Tags : 
esker, edi order processing, edi solutions, it management, networking, software development, wireless, enterprise applications
    
Esker
Published By: IBM     Published Date: Feb 13, 2015
With its Application Ready solutions, IBM is outflanking competitors in Technical Computing and fast-tracking the delivery of client business value by providing an expertly designed, tightly integrated and performance optimized architecture for several key industrial applications.
Tags : 
ibm, technical computing, application development, application architecture, architecture, business workflow, business technology
    
IBM
Published By: IBM     Published Date: May 18, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions
Tags : 
application delivery, application deployment, software delivery methods, deployment solutions, automated application release, software development life cycle
    
IBM
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee