"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

it hardware

Results 276 - 300 of 536Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : 
heat, data center, heat monitoring, hardware, datacenter, mission critical, monitoring, network management, servers, green computing, power and cooling
    
HP
Published By: HP     Published Date: Oct 09, 2008
Despite its six syllables, 'virtualization' is a straight - forward concept. It can enable your organization to get more value not only from computer and storage hardware but also from the labor required to keep your systems up and running. Virtualization is an approach to pooling and sharing IT resources so the supply of resources—processing power, storage, networking and so on—can flexibly and automatically meet fluctuating business demand. Virtualization can improve the quality of your IT services, enabling more consistency and predictability of operational availability.
Tags : 
mission critical, virtualization, storage, data management, storage virtualization
    
HP
Published By: HP     Published Date: Oct 09, 2008
Increase utilization, decrease energy costs with data center virtualization In the past, IT departments have responded to demands for new services and better performance by adding more hardware, resulting in underutilized technology silos and server sprawl. Today, many organizations are turning to virtualization technologies that facilitate consolidation and increased utilization. In short, virtualization brings the ability to pool, share and dynamically reallocate data center resources – and helps fulfill the promise of higher utilization and lower energy consumption and lower costs.Join us and learn why HP is well prepared to help you assess and address your needs. Find out what key virtualization partners -- such as VMware, Microsoft and Citrix – bring to the table and how HP can help you leverage their technology and expertise.
Tags : 
mission critical, virtualization, hewlett-packard company, enterprise applications, data management
    
HP
Published By: HP     Published Date: Sep 06, 2011
Read how blade servers offer a number of advantages over traditional rack-mount servers which will result in less hardware usage and increased ROI.
Tags : 
virtualization, blades, energy saver, infrastructure, servers, blade servers, storage virtualization, data center design and management
    
HP
Published By: Burton Group     Published Date: Apr 08, 2008
Increasing power demands and space limitations in the data center have begun to transition server virtualization technologies from luxuries to necessities. Server virtualization provides a path toward server consolidation that results in significant power and space savings, while also offering high availability and system portability. Today, vendors are building hardware and software platforms that can deliver virtualization solutions at near-native performance.
Tags : 
burton group, virtual server, virtual machine, virtualization, server virtualization, virtual architecture, virtualization architecture, virtual, network architecture
    
Burton Group
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
smart credentials, hardware, software, passwords, features, outdated physical access
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Dell     Published Date: Oct 23, 2008
The stark reality of the data center today is mixed platforms, operating systems and hardware. Fortunately Windows Vista has been engineered to integrate smoothly into these so-called hybrid environments, as you’ll learn in this podcast featuring Microsoft expert Chris Ross.
Tags : 
dell, integration of windows vista, vista hybrid environments, it management, platforms, windows, itil
    
Dell
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This white paper is focused on the design and architecture of an OCS 2007 environment in an HP BladeSystem infrastructure. The document outlines a building block approach to deploying OCS on the HP BladeSystem and focuses on how the design decisions around levels of availability, scalability, and the OCS 2007 feature set impact the hardware that is deployed and the version of OCS that is used. The white paper also covers a brief overview of the Microsoft Unified Communications framework including Microsoft Exchange Server 2007 and Office Communications Server 2007 and an overview of the HP BladeSystem architecture and how the HP BladeSystem can help lower the total cost of ownership (TCO).
Tags : 
hp bladesystem, ocs, voip, storage, blade servers, microsoft exchange, windows server
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The focus of this report is performance testing of the core services of an OCS Enterprise Edition Consolidated Configuration and as deployed on an HP BladeSystem and HP StorageWorks solution. One requirement for any solution deploying more than one server in a pool is a hardware load balancer. In this solution a F5 BIG-IP Local Traffic Manager is used.
Tags : 
hp bladesystem, hp storageworks, server deployment, microsoft office communications server, platforms, storage, blade servers
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP resource provisioning combines the best features of each virtualization model by enabling BIG-IP LTM modules to run sandboxed without sharing resources, while giving them the ability to dynamical scale if/when needed. Resource provisioning is a new model in hardware virtualization, one that will change the face of application delivery and Application Delivery Controllers moving forward.
Tags : 
big-ip, resource, feature, virtualization, ltm, modules, application, delivery, controller, functionality, solution, control, data, security, wide area networks, access control
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Feb 18, 2009
The recent release of the Environmental Protection Agency (EPA) study on data center energy efficiency is adding fuel to the fire in the research and development of new ways to reduce energy use in centers. The findings, summarized on the EPA website, are staggering: Data centers consumed about 60 billion kilowatt-hours (kWh) in 2006, roughly 1.5 percent of total US electricity consumption -Energy consumption of servers and data centers has doubled in the past five years and is expected to almost double again in the next five years to more than 100 billion kWh, costing about $7.4 billion annually.
Tags : 
green data centers, epa, hp data center, energy consumption, server rack consumption, environmental protection agency, digital power, leed rating system, green grid, engineering economic principles, it hardware productivity, efficient site infrastructure, cooling, voc, co2 emissions, operational continuity, lifecycle cost, environmental impact, it effectiveness, power usage effectiveness
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
When Alcatel bought out Lucent at the end of 2006, the two companies had already begun planning data center consolidations of their own, but the merger changed all that. As it turns out, the merged company created a plan to consolidate 25 data centers and 125 server rooms down to six data centers and just a few server rooms. This change has presented challenges, especially in terms of arranging downtime and dealing with employees' attachment to their servers and applications, but the company is on pace to meet it’s goal of reducing IT operational cost by 25% over three years.
Tags : 
alcatel-lucent, hp data center, it infrastructure, data center transformation, merger, downtime, server application, change management, it operational costs, server infrastructure, consolidation planning, clone, server decommission, hp hardware, networking, it management, enterprise applications, infrastructure, data center design and management
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization, data recovery, trojans, worms, viruses, highly available systems, disk staging, failover, replication, server architecture, mainframe technology, hardware abstraction, encapsulation
    
VMware
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : 
data, database, oracle database appliance, choosing hardware. storage, internal networking, memory, cpu, verify patch compatibility, database appliance manager, rdbms, database deployment, database installation, node, storage node, data management, expense management
    
Oracle Global Marketing
Published By: CDW     Published Date: Oct 10, 2013
Five key items can help reap solid ROI from launching a mobile application strategy. Organizations are demonstrating their interest in mobile apps with their checkbooks.
Tags : 
increase revenue, mobile apps, apps, mobility, mobile device, trademonster, productivity with apps, customer relationships management, crm, mobile app development, mobile hardware, mobile product, wireless, application integration
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security, kernel level security, application security, encryption, security management
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss, ssdt, hardware assisted security, hardware enhanced security, zero-day malware, zero-day rootkit, kernel layer security, application security, encryption, security management, security policies
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security, application security, security management
    
McAfee
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner evaluates a variety of networking vendors providing access layer connectivity. Vendors must have an end-to-end hardware solution, but increasingly, vendor differentiation centers on network services, including guest access, onboarding, security and management tools. Read this whitepaper for more information.
Tags : 
wireless lan, infrastructure, hardware solution, network services, security, technology, best practices, networking, wireless
    
Aruba Networks
Published By: Symantec Corporation     Published Date: Jun 18, 2014
"Although many IT professionals believe that using self-signed SSL certificates can help their organizations lower security costs, the real numbers tell a different story. From data center infrastructure and physical security, to the hardware and software required, to the personnel needed to manage the certificate lifecycle, the true costs of self-signed SSL security can become very expensive, very fast. This paper explores the true total cost of ownership (TCO) for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration."
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation
Published By: CenturyLink     Published Date: Jan 02, 2015
DevOps Unlimited needed to provide application infrastructure for a start-up client which was enjoying rapid growth with its new financial services product. Neither DevOps nor the client wanted to invest in, or manage, its own IT hardware, so a cloud service was the ideal solution. It would give the client the ability to grow rapidly without tying up time, resources and capital expense deploying dedicated IT hardware.
Tags : 
centurylink, devops, enterprise applications, cloud, it hardware, it management
    
CenturyLink
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory