"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

it hardware

Results 226 - 250 of 472Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Oct 23, 2008
The stark reality of the data center today is mixed platforms, operating systems and hardware. Fortunately Windows Vista has been engineered to integrate smoothly into these so-called hybrid environments, as you’ll learn in this podcast featuring Microsoft expert Chris Ross.
Tags : 
dell, integration of windows vista, vista hybrid environments, it management, platforms, windows, itil
    
Dell
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This white paper is focused on the design and architecture of an OCS 2007 environment in an HP BladeSystem infrastructure. The document outlines a building block approach to deploying OCS on the HP BladeSystem and focuses on how the design decisions around levels of availability, scalability, and the OCS 2007 feature set impact the hardware that is deployed and the version of OCS that is used. The white paper also covers a brief overview of the Microsoft Unified Communications framework including Microsoft Exchange Server 2007 and Office Communications Server 2007 and an overview of the HP BladeSystem architecture and how the HP BladeSystem can help lower the total cost of ownership (TCO).
Tags : 
hp bladesystem, ocs, voip, storage, blade servers, microsoft exchange, windows server
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The focus of this report is performance testing of the core services of an OCS Enterprise Edition Consolidated Configuration and as deployed on an HP BladeSystem and HP StorageWorks solution. One requirement for any solution deploying more than one server in a pool is a hardware load balancer. In this solution a F5 BIG-IP Local Traffic Manager is used.
Tags : 
hp bladesystem, hp storageworks, server deployment, microsoft office communications server, platforms, storage, blade servers
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP resource provisioning combines the best features of each virtualization model by enabling BIG-IP LTM modules to run sandboxed without sharing resources, while giving them the ability to dynamical scale if/when needed. Resource provisioning is a new model in hardware virtualization, one that will change the face of application delivery and Application Delivery Controllers moving forward.
Tags : 
big-ip, resource, feature, virtualization, ltm, modules, application, delivery, controller, functionality, solution, control, data, security, wide area networks, access control
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Feb 18, 2009
The recent release of the Environmental Protection Agency (EPA) study on data center energy efficiency is adding fuel to the fire in the research and development of new ways to reduce energy use in centers. The findings, summarized on the EPA website, are staggering: Data centers consumed about 60 billion kilowatt-hours (kWh) in 2006, roughly 1.5 percent of total US electricity consumption -Energy consumption of servers and data centers has doubled in the past five years and is expected to almost double again in the next five years to more than 100 billion kWh, costing about $7.4 billion annually.
Tags : 
green data centers, epa, hp data center, energy consumption, server rack consumption, environmental protection agency, digital power, leed rating system, green grid, engineering economic principles, it hardware productivity, efficient site infrastructure, cooling, voc, co2 emissions, operational continuity, lifecycle cost, environmental impact, it effectiveness, power usage effectiveness
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
When Alcatel bought out Lucent at the end of 2006, the two companies had already begun planning data center consolidations of their own, but the merger changed all that. As it turns out, the merged company created a plan to consolidate 25 data centers and 125 server rooms down to six data centers and just a few server rooms. This change has presented challenges, especially in terms of arranging downtime and dealing with employees' attachment to their servers and applications, but the company is on pace to meet it’s goal of reducing IT operational cost by 25% over three years.
Tags : 
alcatel-lucent, hp data center, it infrastructure, data center transformation, merger, downtime, server application, change management, it operational costs, server infrastructure, consolidation planning, clone, server decommission, hp hardware, networking, it management, enterprise applications, infrastructure, data center design and management
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization, data recovery, trojans, worms, viruses, highly available systems, disk staging, failover, replication, server architecture, mainframe technology, hardware abstraction, encapsulation
    
VMware
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : 
data, database, oracle database appliance, choosing hardware. storage, internal networking, memory, cpu, verify patch compatibility, database appliance manager, rdbms, database deployment, database installation, node, storage node, data management, expense management
    
Oracle Global Marketing
Published By: CDW     Published Date: Oct 10, 2013
Five key items can help reap solid ROI from launching a mobile application strategy. Organizations are demonstrating their interest in mobile apps with their checkbooks.
Tags : 
increase revenue, mobile apps, apps, mobility, mobile device, trademonster, productivity with apps, customer relationships management, crm, mobile app development, mobile hardware, mobile product, wireless, application integration
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security, kernel level security, application security, encryption, security management
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security, application security, encryption, security management, security policies
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security, application security, security management
    
McAfee
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner evaluates a variety of networking vendors providing access layer connectivity. Vendors must have an end-to-end hardware solution, but increasingly, vendor differentiation centers on network services, including guest access, onboarding, security and management tools. Read this whitepaper for more information.
Tags : 
wireless lan, infrastructure, hardware solution, network services, security, technology, best practices, networking, wireless
    
Aruba Networks
Published By: Symantec Corporation     Published Date: Jun 18, 2014
"Although many IT professionals believe that using self-signed SSL certificates can help their organizations lower security costs, the real numbers tell a different story. From data center infrastructure and physical security, to the hardware and software required, to the personnel needed to manage the certificate lifecycle, the true costs of self-signed SSL security can become very expensive, very fast. This paper explores the true total cost of ownership (TCO) for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration."
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation
Published By: CenturyLink     Published Date: Jan 02, 2015
DevOps Unlimited needed to provide application infrastructure for a start-up client which was enjoying rapid growth with its new financial services product. Neither DevOps nor the client wanted to invest in, or manage, its own IT hardware, so a cloud service was the ideal solution. It would give the client the ability to grow rapidly without tying up time, resources and capital expense deploying dedicated IT hardware.
Tags : 
centurylink, devops, enterprise applications, cloud, it hardware, it management
    
CenturyLink
Published By: CenturyLink     Published Date: Jan 02, 2015
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your IT infrastructure into a more efficient virtual environment. You manage your own hardware, software, and applications to maintain complete control while gaining the cost and growth benefits of colocation.
Tags : 
data center build, facility management, carrier access, global colocation services, it management, knowledge management, enterprise applications, data management, data center
    
CenturyLink
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
This complimentary report will display the biggest benefits of moving to 8x8 Virtual Virtual Office including: -Never have to perform a communications hardware or software upgrade again -Providing more consistent and unified communications service -Improving business processes with prebuilt CRM integration Download Now!
Tags : 
8x8. virtual office, cloud-based solutions, mobile applications
    
8x8 Inc.
Published By: Veeam '18     Published Date: Mar 13, 2018
Disaster recovery (DR) planning has a reputation for being difficult and time consuming. Setting up alternate processing sites, procuring hardware, establishing data replication, and failover testing have been incredibly expensive undertakings. To top it all off, the need for 24x7x365 business application availability threatens to make disaster recovery planning an exercise in futility.
Tags : 
draas, business, applications, planning, business, optimization
    
Veeam '18
Published By: Veeam '18     Published Date: Mar 13, 2018
Some customers are pushing independent software vendors to come out with their own appliances. Be careful what you ask for, because you may create something that you weren’t looking for. What happens if your favorite backup software product suddenly starts putting out its own appliance? At a minimum, other appliances from other vendors may cease to exist. Why should a big-box vendor partner with your backup software product only to compete with them? What happens when someone at the helm starts realizing that by creating a tighter integration between the software and the hardware, the company increases its bottom line enough to make that worthwhile? You may find yourself forced to buy a different hardware product than you want in order to keep the software that you like.
Tags : 
data management, vendors, software, customers, product
    
Veeam '18
Published By: Lenovo     Published Date: Aug 14, 2018
Get our Security Solutions Brochure Backed by deep expertise and supported by a global network of trained and certified technical service professionals, Lenovo’s 360° approach to security gives you the complete experience of: Secure supply chain Best-in-class hardware security Securely developed software Complete component verfication Adoption and extension of security technology
Tags : 
security, supply, chain, hardware, security
    
Lenovo
Published By: Oracle     Published Date: Nov 16, 2017
Two trends are pushing all lines of business—across all industries—toward cloud IT. First, IT is being stretched more than ever. IT organizations are expected to expand services and meet tighter SLAs while having fewer resources, personnel, and skills to work with. With the IT queue growing longer than ever, both IT and LOB leaders are interested in using the cloud to quickly deploy the services users need. For most IT organizations, the current way of doing business does not map to growth or enable the flexibility to compete in the digital age. Rigid and periodic hardware-refresh cycles cannot adequately scale, and applications built for on-premises resources using traditional development and management tools are no longer flexible enough to deliver the agility businesses need to grow or compete.
Tags : 
    
Oracle
Published By: F5 Networks Inc     Published Date: Jun 24, 2015
Enterprises are moving to a software-defined, private cloud data center model for agility, operational efficiency, and a self-service approach to deploying applications and associated services. They are utilizing a two-tier hybrid services architecture to get the benefits of specialized hardware for front door network services and scalable software for application, stack-specific services. Read this whitepaper to learn how to integrate the necessary services with the orchestration and automation systems of a software-defined data center.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency, networking, software development, it management, knowledge management, enterprise applications
    
F5 Networks Inc
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Special Report

Learn more about what’s slowing your operations, the cost of inaction, and how you can start driving availability to meet the speed of customer expectations.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory