mac os

Results 376 - 400 of 460Sort Results By: Published Date | Title | Company Name

Accelerate Your Success through Virtualization

Published By: Symantec     Published Date: May 02, 2014
Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, data protection, loss data, virtual environment, virtualization, business intelligence, business management
    
Symantec

Virtual Machine Backup and Recovery: Five Critical Decisions

Published By: Symantec     Published Date: May 02, 2014
This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data, best practices, business intelligence, business management, content management, data loss prevention
    
Symantec

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data, security, best practices, business intelligence
    
Symantec

How a Scientific Data Management System Will Help Cut Costs & Boost Productivity

Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how a Scientific Data Management System (SDMS) allowed a pharmaceutical manufacturer to drastically cut costs while also boosting the productivity of all of the company’s employees.
Tags : 
starlims, sdms, productivity, data management
    
STARLIMS

Las redes sociales y las tecnologías: logra el éxito gracias a una estrategia en las redes sociales

Published By: uberVU via HootSuite     Published Date: Apr 07, 2014
Las empresas tecnológicas se enorgullecen de adoptar antes que otras los portales más innovadores del mercado digital. Las empresas líderes, como IBM, son conscientes de que cuando los diversos departamentos de una empresa utilizan las redes sociales para escuchar a su audiencia y a sus colegas, consiguen más información sobre sus clientes, competidores, industria y comunidades. Descarga este informe técnico para descubrir cómo las redes sociales están creando una nueva era en cuanto a conocimiento del cliente y la industria por parte de las empresas tecnológicas. Además, los cargos directivos de la industria están superando los retos que supone integrar las redes sociales en su organización.
Tags : 
hootsuite, social relationship platforms, it leadership, social media, social media advice, success stories
    
uberVU via HootSuite

Security Guide: How To Evade Anti-Virus Detection

Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention, network security, anti spam, application security, intrusion detection, phishing, data protection
    
Rapid7

Making the Most of Your CRM: How Best-in-Class Sales Teams Maximize Revenue and Customer Experience

Published By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : 
oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy, buyer experience, data management, research
    
Oracle

Tying the Shop Floor to the ERP Systems

Published By: Plex Systems     Published Date: Feb 21, 2014
Tying machines on the plant floor to management on the top floor for a real-time glimpse of manufacturing status isn’t just convenient, it’s critical for a company seeking to remain viable in a competitive market. PLEX decreases costs while enabling business growth without additional resources.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production, enterprise resource planning
    
Plex Systems

Foglight Solutions for Cross-Platform Database Performance Management

Published By: Dell Software     Published Date: Feb 19, 2014
Go beyond one-dimensional virtual machine performance. Foglight for Virtualization helps you visualize, analyze and optimize your entire virtual infrastructure health. In this technical brief, learn how Foglight simplifies cross-platform database performance monitoring and management. Read it today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development, data protection
    
Dell Software

Creating a Digital Strategy to Provide Exceptional Digital Experiences

Published By: IBM     Published Date: Feb 14, 2014
People, machines, data, processes are more connected than ever before, in more ways, and at a pace not previously envisioned. Because of this, the means of user interaction are evolving rapidly, and the outcome is an explosion of information increasing at epic rates. Both the opportunity and the challenge for an organization is to execute a strategy to most effectively participate in, exploit and derive ongoing value from the expansive digital world. To evaluate and ultimately better facilitate this, many organizations are specifically defining a digital strategy as part of their overall general business strategy. Central to that digital strategy is the digital experience.
Tags : 
ibm, social media, marketing, crm, customer interaction, digital marketing, digital strategy, customer experience, analytics, rich media, mobile marketing
    
IBM

IBM Network Connectivity Managed Services - Support improved performance and reduced costs and compl

Published By: IBM     Published Date: Oct 10, 2013
With IBM Network Connectivity Managed Services, you can control costs, improve performance and streamline operations with feature-rich services that are designed to help build and proactively manage your enterprise WAN.
Tags : 
ibm, network connectivity, managed services, manage connectivity, improve performaces, reduce business costs, streamline operations, proactively manage, network services, ibm network, networking, business management, business process management, it spending, spend management
    
IBM

Integrated Systems: Should You Buy Compute, Network, and Storage Resources Together?

Published By: NetApp     Published Date: Sep 30, 2013
"As the rapid rise in the number of mobile devices and users creates an explosion in data and virtual machine instances, datacenter transformation becomes imperative for many enterprises. It is essential enterprises move to consolidate resources and cut both capital and operating costs while still providing support for distributed applications. This brief white paper delves into a Q&A with Eric Sheppard, research director of IDC’s Storage Software program, on integrated systems and whether you should buy compute, network, and storage resources together. Read on as you will discover: What integrated systems are, and its benefits The differences between an integrated platform and integrated infrastructure How datacenters are leveraging these new systems today And more" NetApp Privacy Policy
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations, cloud computing
    
NetApp

Whitepaper: Phishing 2.0: Why phishing is the No. 1 web threat, and how web security can protect you

Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security, business technology
    
Webroot

vCPU Sizing Considerations

Published By: Dell     Published Date: Aug 16, 2013
"The number of vCPUs should be one of your most important considerations when sizing virtual machines. But getting the right balance — neither over-allocating nor under-allocating — is a challenge. You’ll need to select the number of vCPUs, the size of the virtual disk, the number of vNICs and the amount of memory. With all those variables, a little guidance is in order. Read the White Paper "
Tags : 
vcpu, sizing, vnics, virtual disk, memory, storage virtualization, application integration, windows, windows server, data warehousing, business technology, virtualization
    
Dell

Agent and Agentless Virtual Machine Backup and Recovery - Unraveling the Myths

Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, knowledge management, business technology
    
Symantec

HP CloudSystem Matrix: Build and manage your laaS

Published By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Learn more about this offering that includes a self-service infrastructure portal for quick auto-provisioning, along with built-in infrastructure lifecycle management to optimize infrastructure, manage the resource pools, and help ensure uptime. CloudSystem Matrix is integrated by design with broad support of heterogeneous environments, including VMware, Microsoft® Hyper-V, and KVM through OpenStack as an enabling technology that manages and provisions virtual machines to the Red Hat KVM hosts.
Tags : 
    
Sponsored by HP and Intel®

Strong Security with Lower Operational Costs and Simplified Compliance

Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci, anti spam, anti spyware, anti virus, application security, auditing, compliance
    
McAfee

Set It and Forget It - Apple Devices in the Enterprise

Published By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : 
apple, devices, patch management, ios, support, end user, security
    
Absolute Software

Chandler Macleod reduces server use 25% while improving application security

Published By: AppSense     Published Date: Nov 26, 2012
Download this case study to learn how Chandler Macleod's CIO was able to utilize the AppSense solution to remove the possibility of any users introducing an executable file to their network while reducing the number of their servers by 25%.
Tags : 
appsense, license compliance, security, application licensing, application security, reduce servers, application management, server hardware, servers, desktop management, business technology, infrastructure management
    
AppSense

Utility Storage: The Ideal Platform for Virtual and Cloud Computing

Published By: Sponsored by HP and Intel®     Published Date: Aug 16, 2012
Server virtualization has transformed corporate IT -- companies have enjoyed major cost savings and have gained flexibility and efficiency. But this has also led to a proliferation of virtual machines and servers that threaten to overwhelm data movement and storage technologies. In this IDG Tech Dossier, learn how utility storage makes for massive consolidation, flexibility and scalability, so IT departments can reduce storage infrastructure and lower costs while improving their ability to respond to fast-changing needs of business units.
Tags : 
utility storage, cloud computing, virtualization, data storage, data center, storage, data management
    
Sponsored by HP and Intel®

Quest Workspace Asset Manager

Published By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : 
software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware, citrix, technology integration, data integration, data management, data center
    
Dell Software

Why build a private Infrastructure-as-a-Service cloud?

Published By: Red Hat     Published Date: May 17, 2012
Virtualization is typically the foundation for and path to the cloud, but by itself can result in virtual machine sprawl and new silos. Red Hat CloudForms, can be used to automate an IT infrastructure, but it's important to set policies up-front.
Tags : 
cloud, cloud computing, private, public, hybrid, risks, benefits, infrastructure, iaas, private infrastructure, red hat, infrastructure-as-a-service, virtualization, open source, networking
    
Red Hat

Zero Downtime Migration to Oracle Exadata using Oracle GoldenGate

Published By: Oracle     Published Date: May 11, 2012
This paper reviews Oracle GoldenGate's capabilities and how it can be used to achieve zero downtime migration and consolidation to Oracle Exadata.
Tags : 
oracle, data warehousing, database, exadata, database machine, infrastructure, operation, operation costs, mobile, growth, payback, architecture, demands, enterprise applications, data management, cloud computing, design and facilities
    
Oracle
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.