HIT Consultant Insightful coverage of healthcare innovation
 

array

Results 326 - 350 of 414Sort Results By: Published Date | Title | Company Name
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes a set of best practices to deploy a 1,500-user virtualized Exchange 2007 environment using VMware® ESXT 3.5. Specifically, this project demonstrates how to configure and deploy the Exchange 2007 Mailbox, Hub Transport, and Client Access server roles onto individual VMware virtual machines (VMs), which in turn are deployed onto a single VMware ESX Server. The environment includes HP ProLiant c-Class Blade servers connected to an HP StorageWorks 4400 Enterprise Virtual Array (EVA4400) Disk Array.
Tags : 
exchange 2007, vmware, esx 3.5, virtualized exchange 2007
    
HP Virtualization
Published By: HP and Intel     Published Date: Aug 13, 2012
This DCIG report details how HP 3PAR F-class midrange arrays provide enhanced levels of VMware integration and optimized virtual machine density so users experience levels of VMware efficiency, performance and visibility well beyond what other midrange arrays natively provide.
Tags : 
hp 3par storage, vsphere integration, virtualization, virtualized environments, data storage
    
HP and Intel
Published By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : 
ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Nginx     Published Date: Jul 15, 2014
Users demand fast application delivery and it is essential for the survival of your business. Meeting the expectations of your users is challenging. NGINX Plus offers a broad array of solutions to solve these challenges, allowing you to delight your users.
Tags : 
nginx, application delivery, web servers, application infrastructure, apache http server, high availability, load balancing, server performance, enterprise infrastructure, application performance, riverbed, reverse proxy, server software, web applications, enterprise software
    
Nginx
Published By: Skyword     Published Date: Nov 14, 2014
Eventually, you’ll want to move your content strategy past awareness-driven content creation and start converting leads. To show meaningful content ROI, you must have a framework in place to create a diverse array of custom content, and this free eBook will give you the tools and strategy to get started. Download it today!
Tags : 
content strategy, content marketing, b2c content, b2b content, content marketing platform, content marketing agency, brand content, branded content, branded content marketing, content marketing strategy, content marketing guide, content marketing plan, contentn strategy guide, content marketing strategies, content marketing services, content marketing software, content marketing platform, content marketing solution, original content, web content marketing
    
Skyword
Published By: Internap     Published Date: Mar 30, 2015
Selecting an Infrastructure-as-a-Service (IaaS) provider can be a complex exercise that involves an array of considerations including business needs, budget, and application requirements. Buyers frequently respond to this complexity by filtering vendors based on variables that are more easily comparable, usually product features, location, and price. By contrast, performance, which is a critical factor to ensuring fit with business needs and ultimately satisfaction with the service, is often ignored. Virtual machine (VM) performance can be challenging to assess because it can vary drastically across vendors, instance sizes and prices, as well as in terms of a particular application’s unique requirements.
Tags : 
infrastructure, benchmarking, cloud computing, database
    
Internap
Published By: Nexsan by Imation     Published Date: Feb 26, 2015
Ballooning data growth and ever-shrinking IT budgets have combined to push higher-density disk arrays to the forefront for almost any organization contemplating investment in new backup solutions. That’s not surprising; after all, the promise of more backup capacity and performance in less data center real estate sounds irresistible to anyone seeking greater efficiency and cost-effectiveness from their existing IT infrastructure.
Tags : 
imation, nexsan, storage, backup, backup and recovery, backup costs
    
Nexsan by Imation
Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco
Published By: Domino     Published Date: Feb 25, 2019
Food and beverage manufacturers today face a host of challenges— SKU proliferation, more frequent line changeovers, finding and retaining skilled employees — all while handling the day-to-day challenges of keeping the line running smoothly in the first place. This demand for continuous improvement has plant managers and line engineers examining every aspect of the production and packaging line for ways to squeeze every bit of performance from every machine, every process, and every employee This white paper from Domino takes a look at how conducting a value stream analysis with a third-party provider can uncover a wide array of opportunities to improve productivity and efficiency. From freeing up labor and reducing errors to shortening changeover time and sharing critical operational knowledge among all stakeholders, a value stream analysis provides a collaborative opportunity to learn and discover new ways to boost productivity without major equipment investments.
Tags : 
    
Domino
Published By: IBM     Published Date: Aug 08, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
technology, fraud prevention, finance, fraud loss reduction
    
IBM
Published By: IBM     Published Date: May 12, 2015
This white paper describes a holistic approach to healthcare cybersecurity, which incorporates sophisticated big data analytics to help better protect and secure the vast array of data healthcare organizations maintain.
Tags : 
healthcare, cybersecurity, big data, security
    
IBM
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Published By: Riverbed     Published Date: Jul 15, 2014
The intelligent economy is here, and it is transforming IT's mandate to deliver business value to the enterprise. Businesses recognize that to remain competitive, they need to embrace a broader array of collaborative applications and create ubiquitous access to these applications at the far reaches of the globe. Ensuring IT is the "must have" resource in new revenue-generating opportunities is top of mind for all IT professionals.
Tags : 
business value, roi, application-awareness, network performance
    
Riverbed
Published By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : 
bsm, business service management, it operations group, it case study, capital one, automation
    
HP
Published By: HP     Published Date: May 14, 2014
As the drive to "do more with less" becomes a mantra for many organizations, optimizing space utilization is a key goal of many IT departments. Storage continues to be one of the major cost components of today's infrastructure deployments. Thin technology, including thin provisioning, offers efficiency benefits that can significantly reduce both capital and operational costs. However, implementations of thin technologies differ with the storage vendors. This Edison Group report looks at thin provisioning technology from the major storage vendors in today's marketplace and compares the thin implementations from seven storage array platforms, including Hewlett-Packard's 3PAR StoreServ Storage arrays.
Tags : 
thin technologies, it departments, 3par storeserve, storage, infrastructure developments
    
HP
Published By: Fusion-io, Inc.     Published Date: May 27, 2014
LMN ARCHITECTS USES IOCONTROL HYBRID STORAGE TO GET THE CAPACITY AND PERFORMANCE ITS GRAPHICALLY-INTENSIVE ENVIRONMENT NEEDS IN A SMALL FOOTPRINT.
Tags : 
fusion-io, iocontrol hybrid storage, equallogic, hybrid storage, hybrid san, hybrid flash array, hybrid storage solution, storage area network, storage area network vendors, iscsi storage, qos, storage qos, automated tiering
    
Fusion-io, Inc.
Published By: Fusion-io, Inc.     Published Date: May 27, 2014
Fusion---iodelivers the world's data faster. From e---commerce retailers to the world’s social media leaders and Fortune Global 500 companies, companies are improving the performance and efficiency of their data centers with Fusion---io technology. ioControl Hybrid Storage from Fusion---io is ideal for customers seeking to virtualize mission---critical workloads, deliver high performance VDI, and control efficient application acceleration across shared storage environments.
Tags : 
fusion-io, infrastructure, hybrid storage, i/o gap, flash storage, hybrid storage, hybrid san, hybrid flash array, hybrid storage solution, storage area network, storage area network vendors, iscsi storage, qos, storage qos, automated tiering
    
Fusion-io, Inc.
Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
CareerSaver
Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
CareerSaver
Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
CareerSaver
Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
CareerSaver
Published By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : 
careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
    
CareerSaver
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.