HIT Consultant Insightful coverage of healthcare innovation
 

appliance

Results 76 - 100 of 365Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: May 18, 2017
Today, everything computes. Intelligence has been infused into things no one would recognize as computers: appliances, cars, roadways, clothes, even rivers and cornfields. Tomorrow, many of these things will think, thanks to breakthroughs in cognitive computing. Even the things that don’t think themselves will continue collecting and reporting the massive quantities of data that feed cognitive systems.
Tags : 
ibm, tss, cloud, mobile, appliances
    
IBM APAC
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: PHD Virtual     Published Date: Jul 08, 2013
VMware vSphere Backup & Replication
Tags : 
phd virtual, free offer, vmware backup & recovery, virtual backup appliance, vsphere hypervisor, vba deploys, virtual backup appliance
    
PHD Virtual
Published By: PHD Virtual     Published Date: Jul 09, 2013
Citrix XenServer Backup & Replication
Tags : 
phd virtual, citrix xenserver, phd virtual, virtualized footprint, virtual backup appliance
    
PHD Virtual
Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies
Published By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: VMware     Published Date: Aug 17, 2011
Discover that VSA is resilient and easy to deploy, while enabling you to use advanced vSphere features like vSphere HA, vMotion®, and vSphere DRS.
Tags : 
vsphere, storage, appliance, vsa, smb, storage, gyro, vmware
    
VMware
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
A high level overview and introduction to the VCE VxRail Appliance.
Tags : 
vce, vxrail appliance, hyper converged, intro to vxrail
    
EMC Converged Platforms
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This solution brief describes how VxRail Appliances are the easiest, fastest, most affordable way to implement a VDI infrastructure.
Tags : 
vce, vdi, hyper converged appliances, solution brief, vdi infrastructure
    
EMC Converged Platforms
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: Quantum Corporation     Published Date: Aug 28, 2018
Die einzigartigen mehrstufigen Speicherlösungen von Quantum gewährleisten maximale Verfügbarkeit und Performance Ihres Produktionssystems und tragen gleichzeitig zum Abbau von Speicherkosten bei. Das Kernstück unserer Lösung bildet die DXi-Deduplizierungs-Appliance. Die DXi ist als physische oder virtuelle Appliance erhältlich und sorgt dank patentierter Deduplizierungstechnologie mit Datenblöcken variabler Länge für höchste Datenreduktion und Einsparungen der Netzwerkbandbreite ohne Leistungseinbußen bei Backups und Restores.
Tags : 
    
Quantum Corporation
Published By: Dell EMC     Published Date: Apr 18, 2017
In this paper the case for Hyper-Converged Appliances, and in particular the Dell EMC VxRail Appliance powered by Intel® Xeon® processor, is made from both cost and measurable effort perspectives. Strict reliance on measurables was used in lieu of anecdotal observations or customer quoted benefits in order to provide realistic and repeatable analysis.
Tags : 
dell, emc, hyper-convergence, hyper-converged appliances, analytics
    
Dell EMC
Published By: Dell EMC     Published Date: Apr 18, 2017
Easily deploying a scalable IT building block with enterprise-grade performance and reliability.
Tags : 
dell, dell emc, hyper convergence, performance, vxrail
    
Dell EMC
Published By: Dell EMC     Published Date: Apr 18, 2017
Easily deploying a scalable IT building block with enterprise-grade performance and reliability.
Tags : 
emc, vxrail, hyper-convergence, converged infrastructure, performance
    
Dell EMC
Published By: Dell EMC     Published Date: Apr 18, 2017
In this paper the case for Hyper-Converged Appliances, and in particular the Dell EMC VxRail Appliance, is made from both cost and measurable effort perspectives. Strict reliance on measurables was used in lieu of anecdotal observations or customer quoted benefits in order to provide realistic and repeatable analysis.
Tags : 
emc, vxrail, hyper-convergence, converged infrastructure, performance
    
Dell EMC
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report examines an innovative high speed data compression appliance from IBM.
Tags : 
ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series, centera, snapshot, information infrastructure, smarter systems for a smarter planet, storage, stn6500, stn6800, optimization, primary data compression
    
Ogilvy - IBM UK
Published By: Oracle     Published Date: May 08, 2017
Run your DB & Apps on the Purpose Built Oracle Database Appliance
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 08, 2017
Run your DB & Apps on the Purpose Built Oracle Database Appliance View this video to find out more.
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 09, 2017
Run your DB & Apps on the Purpose Built Oracle Database Appliance View this video to find out more.
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 08, 2017
Run your DB & Apps on the Purpose Built Oracle Database Appliance View this video to find out more.
Tags : 
    
Oracle
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : 
recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
    
Oracle ZDLRA
Published By: Riverbed     Published Date: May 24, 2012
The combination of Riverbed WAN optimization and web content optimization solutions ultimately have the same end goal of improving user performance, the techniques employed serve different use cases.
Tags : 
steelhead appliances, stingray aptimizer, microsoft sharepoint, wan, wbo, web content optimization
    
Riverbed
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.