product data

Results 476 - 500 of 651Sort Results By: Published Date | Title | Company Name

IDC Video Marketscope

Published By: Cisco     Published Date: Jan 05, 2015
This study includes an analysis of 11 worldwide enterprise videoconferencing equipment vendors. To qualify for inclusion in this IDC MarketScape study, vendors must offer a portfolio of enterprise-class videoconferencing products, solutions, and services either directly and/or through channel partners.Basic capabilities of the vendor offerings should include support for high-definition (HD) video and audio technology, availability of data collaboration tools and applications for use within a video session, and the ability to integrate with UC portfolios and business applications, among other criteria.
Tags : 
mobile, video collaboration, portfolios, investments, unified communications, wireless, data management
    
Cisco

Secure Access and Continuity in a Virtualized and BYOD World whitepaper

Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE

Protecting Technology Infra: Importance of Secure Access and Continuity Sol

Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE

Business Continuity And Breach Protection

Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
Symantec

Case Study: CPI’s Cabinets Prepare Telefônica Vivo for the Future

Published By: Chatsworth Products     Published Date: Nov 21, 2014
Chatsworth Products (CPI) helped the largest telecom in South America, Telefonica Vivo, consolidate its seven data centers into one highly energy-efficient facility in Brazil. Improvements were so impressive, the data center was considered the most efficient data center in the country.
Tags : 
chatsworth, chatsworth products, data center, data center optimization, energy, power and cooling, racks
    
Chatsworth Products

Case Study: Environmental Systems Designs (ESD) - Automated Protection and Enhanced Productivity

Published By: Nasuni     Published Date: Nov 19, 2014
The global architecture and engineering firm Environmental Systems Design, Inc., had enough capacity to handle its data. The challenge was protecting that data. The firm would often have 15TB of data in production at a given time and its existing backup solutions simply could not keep pace. After quickly outgrowing several other systems, ESD turned to Nasuni’s enterprise storage as a service. Now, thanks to Nasuni’s automated backup, which delivers unlimited versioning, fast disaster recovery and an unmatched RPO, IT can stop worrying about backup and focus on its core mission of enhancing business productivity.
Tags : 
automated protection, enhanced productivity, data protection, backup solutions, it management, knowledge management, enterprise applications, data management
    
Nasuni

Make Your Data Work for You with Effective Requirements Management

Published By: IBM     Published Date: Nov 12, 2014
The right requirements management tool can help you bridge the gap between customers, requirements, and deliverables and build the product that meets your need. Learn about effective requirements management techniques to save time and cost of your global teams.
Tags : 
ibm, requirements, requirements management, product management, it management, data, requirements management tool
    
IBM

DCIG: Making The Right Flash Memory Storage Array Buying Decision

Published By: HP     Published Date: Nov 05, 2014
Organizations no longer have to wait months or years to deploy an all-flash storage array into their environment to host their applications. The technologies in this most recent iteration of the HP 3PAR StoreServ 7450 ensure that organizations get the performance they need, the cost at which they need it and the platform stability to offer it up to as many applications as they see fit. By taking advantage of the HP 3PAR StoreServ 7450 platform, organizations may confidently begin their journey into the all-flash world of tomorrow today with the knowledge that it will meet their various manageability, performance and scalability requirements along the way. Download this whitepaper now.
Tags : 
flash memory, memory storage, buying decision, all-flash storage, data management, storage management, data reduction, performance production, proven data, software service, storeserv, it management, knowledge management, enterprise applications
    
HP

Content is the New Perimeter: The Security and Regulatory for Information Rights Management

Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks

THE CENTER OF PERFORMANCE: ENHANCING THE APP EXPERIENCE FOR END-USERS

Published By: Equinix     Published Date: Oct 27, 2014
In today’s technology-rich world, customers and employees demand the highest level of application performance. Failure to provide access to applications that consistently perform well anytime, anywhere, and on any device, often leads to lower productivity, customer dissatisfaction, decreased revenue and market share, and damage to brand reputation. This paper explores the challenges that today’s CIOs face in regard to application performance, and how a more strategic data center approach, like distributing applications closer to your users, can help optimize application performance and reduce IT costs.
Tags : 
data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity, network, drive, evolution, landscape, server, mobile, technology, globalization, stem, hyperdigitization, consumer, networking
    
Equinix

Predictive Maintenance for Dummies

Published By: IBM     Published Date: Oct 16, 2014
Maximize asset productivity and process efficiency by gaining insight from your data.
Tags : 
asset productivity, predictive maintenance, process efficiency
    
IBM

Better Decision Support for Product Management

Published By: IBM     Published Date: Oct 10, 2014
Learn about making better product decisions with a Rational Focal Point solution for product portfolio management.
Tags : 
ibm, product management, decision support, smarter decisions, successful products, finding data, software tools, product portfolios, innovation, decision criteria, it management, best practices, business management, product lifecycle management
    
IBM

ESG:  Extending the Data Center to the Cloud

Published By: NetApp     Published Date: Sep 24, 2014
41% of ESG research respondents reported that the cloud enabled them to realize IT cost reductions with 26% seeing improvements in productivity.  Learn how you can achieve these benefits by reviewing common IT scenarios detailed in private and hybrid cloud, data protection, BYOD and data movement use cases.
Tags : 
data center, cloud, cost efficient, cloud delivery model, it costs, productivity improvement, enterprise applications, data management
    
NetApp

NetApp Hybrid Array with Flash Pool™ Technology

Published By: NetApp     Published Date: Sep 22, 2014
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate. In this lab evaluation, NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In the report, you’ll dis cover how Demartek test engineers documented a 283% gain in IOPS and a reduction in latency by a factor of 66x after incorporating NetApp Flash Pool technology.
Tags : 
flash pool, fas storage systems, ssd, online transaction processing, cluster storage
    
NetApp

Increase Rack Cooling Efficiency and Solve Heat-Related Problems

Published By: Tripp Lite     Published Date: Sep 11, 2014
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. Users may assume that they need to increase cooling capacity, but this is expensive and often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
cooling, efficiency, heat-related, server rooms, data center, computing, equipment, performance, shutdowns, airflow, downtime, optimize, haphazard, rack enclosures, spot cooling, rack cooling, best practices
    
Tripp Lite

Reinventing Data Masking: Secure Data Across Application Landscapes

Published By: Delphix     Published Date: Sep 10, 2014
Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.
Tags : 
secure data, digitization, data breaches, privacy regulations, sensitive data, internal, customer information, application landscapes, database development, data protection, database security
    
Delphix

Lab Validation Report NEC Express5800/R320 Server

Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable, customers, third-party, evaluation, security, information, data management
    
Intel Corporation

Shifting Workloads and the Server Evolution

Published By: HP     Published Date: Sep 08, 2014
Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect
Tags : 
servers, innovative, management, mobility, security, computational, technologies, mainframes, cloud, productivity, workloads, big data, storage
    
HP

Access Business data your way, securely

Published By: HP     Published Date: Aug 26, 2014
Eliminate the guesswork from selecting products and services for your evolving network access and business protection needs. HP Just Right IT portfolio solutions help avoid business interruptions by ensuring reliable access to your data. HP servers and storage solutions help consolidate islands of business information while delivering cost savings, reliability, and agility. HP offers the industry’s most comprehensive data protection and retention portfolio for midsize businesses like yours. And through its cloud-based support portal, HP Technology Services can proactively identify and fix them remotely to keep your business running smoothly. Discover how
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork, agility, cost-saving, quality of service, servers, productivity
    
HP

Capitalizing on the Power of Big Data for Retail

Published By: IBM     Published Date: Aug 06, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data. If retailers succeed in addressing the challenges of “big data,” they can use this data to generate valuable insights for personalizing marketing and improving the effectiveness of marketing campaigns, optimizing assortment and merchandising decisions, and removing inefficiencies in distribution and operations.
Tags : 
ibm, retail, data, big data, power, stores, interact, social media
    
IBM

How Banks can use Customer Profitability Analytics to Thrive in Uncertain Times

Published By: IBM     Published Date: Aug 06, 2014
Customer Profitability Analytics enables banks to analyze customer, account, product, and transaction data and apply costing models to determine a bank-wide view of profitability. Applying predictive analytics, they can model future behavior and derive a lifetime value for each customer.
Tags : 
ibm, banking, customer, profit, analytics, costing models
    
IBM

Supercharge Salesforce.com initiatives with a 360° view of the customer

Published By: IBM     Published Date: Aug 05, 2014
IBM® InfoSphere® Master Data Management (MDM) helps organizations gain a comprehensive and accurate 360-degree view of their customers. This 360-degree view, when integrated with a CRM solution such as Salesforce.com, helps organizations improve the effectiveness of their CRM initiatives to help companies: -Increase user productivity -Improve sales and marketing performance to increase win rate and revenue -Mitigate risks associated with poor customer data Download here to learn more!
Tags : 
ibm, salesforce, mdm, crm, initiatives, data, it management, data management
    
IBM

Three Ways System Downtime Affects Companies and Four Methods to Minimize It

Published By: Globalscape     Published Date: Jul 31, 2014
Downtime happens and often at the worst time possible. Organizations experiencing downtime face direct and indirect costs from the loss of critical systems. This whitepaper discusses a Globalscape survey of 283 IT professionals and end users revealing the frequency of unplanned downtime, the effects on organizations, including average costs, and what IT administrators can do to minimize core system failure.
Tags : 
globalscape, downtime, productivity, it environments, critical systems, mission-critical systems, data loss prevention, security, load balancing, highly-scalable infrastructures, servers
    
Globalscape

Agile Masking Transforms Data Security

Published By: Delphix     Published Date: Jun 27, 2014
Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.
Tags : 
data security, masking products, agile masking, solution, creation, delivery, security, it management, data management
    
Delphix

5 Ways Dropbox for Business Keeps Your Data Protected

Published By: Dropbox for Business     Published Date: Jun 09, 2014
Protecting your data isn’t a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we’ve designed the product itself. Download here to find out how we’ve built Dropbox for Business to keep data safe for all our users.
Tags : 
dropbox, business, data, protect, security, data management, data center
    
Dropbox for Business
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.