"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cloud computing

Results 1 - 25 of 1344Sort Results By: Published Date | Title | Company Name
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Intel otwiera nowe mozliwosci. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Une nouvelle révolution industrielle se profile, alimentée par l’Internet of Everything, les médias sociaux et le Cloud computing, et avec elle des changements fondamentaux dans notre façon de vivre et d’agir. Les DSI d’aujourd’hui se trouvent dans une position unique pour utiliser la technologie afin de créer une valeur ajoutée et des opportunités pour l’entreprise. Intel Inside® pour de nouvelles possibilités. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, et Xeon Inside sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: New Voice Media     Published Date: Sep 19, 2017
This paper touches on the benefits of cloudbased contact centres but focuses on the concerns businesses have about cloud computing - performance, availability and security – and how NewVoiceMedia is successfully addressing them.
Tags : 
    
New Voice Media
Published By: Wasabi     Published Date: Oct 20, 2017
For the past several years cloud storage has been dominated by three main players, Amazon, Google and Microsoft, offering relatively comparable services and solutions. Armed with revolutionary technology and an egalitarian philosophy, Wasabi is transforming what cloud storage can be and do. In this white paper we focus on cloud storage pricing comparing the economics of Wasabi versus the leading cloud storage options. Free trial with no credit card required offer available as well.
Tags : 
cloud storage, wasabi, cloud computing, storage, data protection
    
Wasabi
Published By: IBM     Published Date: Nov 08, 2017
This paper gives key considerations when making a strategic commitment to a database platform.
Tags : 
ibm, cloud, cloud computing, database
    
IBM
Published By: IBM     Published Date: Nov 08, 2017
IBM DB2 with BLU Acceleration helps tackle the challenges presented by big data. It delivers analytics at the speed of thought, always-available transactions, future-proof versatility, disaster recovery and streamlined ease-of-use to unlock the value of data.
Tags : 
ibm, cloud, cloud computing, database, ibm db2
    
IBM
Published By: IBM     Published Date: Nov 08, 2017
Flexible deployment options, licensing models help take the challenges out of change. As you move toward the cloud, you're likely planning or managing a mixed environment of on- premises and on- cloud applications. To help you succeed in this transition, you need a trans-formative, mixed-workload database that can handle a massive volume of data while delivering high performance, data availability and the flexibility to adapt respond to business changes.
Tags : 
ibm, cloud, cloud computing, database, ibm db2
    
IBM
Published By: IBM     Published Date: Nov 08, 2017
This paper gives key considerations when making a strategic commitment to a database platform.
Tags : 
ibm, cloud, cloud computing, database
    
IBM
Published By: Oracle Hardware     Published Date: Oct 20, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
    
Oracle Hardware
Published By: Oracle Hardware     Published Date: Oct 20, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most compani
Tags : 
    
Oracle Hardware
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications
    
Virtela Communications, Inc.
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas
    
NEC
Published By: Trintech, Inc.     Published Date: Nov 13, 2017
This eBook’s goal is to help you identify which technology best suits your business, how to get a project like this approved internally, and what you need to think about when it comes to delivery.
Tags : 
trintech, business automation, software implementation, business process automation, bpo, cloud computing, business process management, application integration
    
Trintech, Inc.
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Adecco     Published Date: Sep 25, 2017
Cloud computing generated $100 billion in 2012, which is estimated to be $127 billion by 2017 and an impressive $500 billion by 2020. What was once an innovative technology of the future is now the standard way of doing business. The challenge for companies is to leverage what still works well from their in-house legacy infrastructure and augment that with a new cloudbased infrastructure to meet their future needs. Learn how to transition to advanced cloud usage and build a strong team for your company.
Tags : 
cloud computing, cloud based infrastructure, cloud transition, team building
    
Adecco
Published By: Lenovo     Published Date: Nov 03, 2017
The power of digital transformation (DX) is delivered through devices. But too many digital transformation initiatives focus entirely on broad cloud, app, and software solutions. While end-user computing devices account for only a fraction of DX investments, underestimating their importance can risk your entire initiative. To ensure the success of your DX initiative, you need to have the right devices in the right hands to deliver your transformative experience. In this white paper, you’ll see how to avoid the pitfalls of DX, and how to evaluate your device requirements to maximize the potential of your DX investment. Download the white paper to find out more!
Tags : 
    
Lenovo
Published By: Astaro     Published Date: Jan 19, 2011
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.
Tags : 
astaro, cloud computing, botnets, network, security, network management
    
Astaro
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Cloud computing is rapidly entering an entirely new phase – one destined to prove far more transformative and disruptive than the initial phase of cloud deployment. Cloud is driving a comprehensive transformation of digital assets in organizations of all stripes as IT decision-makers begin to view the emerging cloud construct as a proxy for the transformation of IT itself.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: Sep 12, 2016
Cloud computing is transforming IT in terms of how services are delivered, how infrastructure is deployed and managed, and how IT organizations structure themselves. For the purposes of this study, Forrester is defining a cloud solution as having three major characteristics: “self-service access, full automation of processes and policies, and metering and tracking of usage.”1 It then becomes a question of whether you manage your cloud(s) yourself, outsource it, or use a hybrid combination of private and public cloud resources.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 13, 2016
Dell EMC is the world market leader in converged infrastructure and converged solutions. Through Dell EMC Converged Infrastructure and Solutions Dell EMC accelerates the adoption of converged infrastructure and cloud-based computing models that reduce IT costs while improving time to market. Dell EMC delivers the industry’s only fully integrated and virtualized cloud infrastructure systems, allowing customers to focus on business innovation instead of integrating, validating, and managing IT infrastructure. VCE solutions are available through an extensive partner network.
Tags : 
converged solutions, it transformation, infrastructure systems, operations software, intel, network management, network performance
    
Dell EMC
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Tags : 
cloud, video conference, protection, security, management, application security, security management, productivity
    
LifeSize, a division of Logitech
Published By: Cisco     Published Date: Jul 30, 2015
Adopting both private and public cloud computing models.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory