virtual physical

Results 101 - 122 of 122Sort Results By: Published Date | Title | Company Name

Network Virtualization: 6 Best Practices for Overcoming Common Challenges

Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn how a simple, open and smart network can help with accelerating the deployment and delivery of applications. This Whitepaper on Network Virtualization best practices explains how to transform and bridge the virtual and physical networks.
Tags : 
network virtualization, best practices, networking, juniper, juniper networks, network architecture, network performance, storage virtualization, server virtualization, data center design and management, virtualization
    
Juniper Networks

Networks That Know Virtualization eBook

Published By: Juniper Networks     Published Date: Feb 18, 2015
Get our eBook on Virtualization and learn how you can improve business agility and service delivery via an open, agile network architecture. This eBook explains how to bridge the physical and virtual worlds and simplify connections across multiple data centers.
Tags : 
juniper, juniper networks, virtualization, storage virtualization, server virtualization, cloud computing
    
Juniper Networks

ASG's Business Service Portfolio Virtualization Management

Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions

Learn 8 Reasons Why One Backup Solution for Virtual and Physical Machines is Best

Published By: Symantec     Published Date: Jan 02, 2014
Learn 8 reasons why you should only use a single backup and recovery solution for all your servers and see how you can avoid high costs and negative consequences.
Tags : 
backup solution, virtual machines, innovation, security, best practices, vulnerability management
    
Symantec

Enterprise Strategy Group (ESG) Achieving Best Practices for Virtual Machine Backup and Recovery

Published By: Symantec     Published Date: Jul 11, 2014
This Lab Validation report from ESG provides you with best practices to create an environment that offers you simple unified data protection across physical and virtual landscapes, maximum protection and data availability, and reduced storage needs and operational costs. Find out how Symantec Backup Exec 2014 measures up against best practices in virtual data protection.
Tags : 
strategy, group, virtual machines, unified data, simple, physical and virtual landscapes, storage, protection, networking, security, it management
    
Symantec

Cisco and EMC VSPEX Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Private cloud technologies have proven themselves in large data centers and hosting organizations. The ability to quickly deploy new virtual machines, make configuration changes to virtual machines, live migrate virtual machines to different hosts before performing maintenance on physical components, and other benefits like this have cut operational expenses.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

IBM Power Systems Offer a Smart Alterative to Windows Servers

Published By: IBM     Published Date: Jun 19, 2008
Maintaining data security, performance, availability and recoverability is a growing challenge. The IBM Power platform offers many advantages in performance, scalability and key functional capabilities to support key database serving. In addition, it simplifies virtualization, making it easier to reduce the number of physical servers required. This ITG report shows the advantages of the IBM Power platform as an alternative to commodity Windows servers in mid-sized companies.
Tags : 
ibm, express seller, data management, servers, windows server
    
IBM

IBM Power Systems: Cost-Effective Linux Database Serving

Published By: IBM     Published Date: Jun 19, 2008
Maintaining data security, performance, availability and recoverability is a growing challenge. The IBM Power platform offers cost-effective performance, scalability and key functional capabilities to support Linux-based database serving. It also simplifies virtualization, making it easier to reduce the number of physical servers required. This ITG report shows the advantages of the IBM Power platform for Linux database serving in mid-sized companies.
Tags : 
ibm, express seller, linux, data management, servers
    
IBM

Melio FS Simplifies Storage Management and Virtual Machine Migration

Published By: Sanbolic     Published Date: Dec 03, 2007
Microsoft® System Center Virtual Machine Manager provides a comprehensive management solution for the virtualized data center that enables increased physical server utilization and centralized management of virtual machine infrastructure.
Tags : 
storage management, virtual storage, sanbolic, storage, storage virtualization
    
Sanbolic

Enabling Virtualization in the Datacenter

Published By: Neterion     Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
Tags : 
virtualization, data center, data centers, datacenters, resource management, it management, network management, virtual, virtual storage, neterion, networking, gigabit networking, infrastructure, internetworking hardware, ip networks, local area networking, network architecture, iscsi, storage area networks, server virtualization
    
Neterion

Virtualization and Disk Performance

Published By: Diskeeper Corporation     Published Date: Oct 30, 2008
Virtualization does have its dangers, as it incurs greater stress on physical resources. While under utilization of CPU may be a driving factor to virtualize servers, other hardware resources may become overtaxed. Given that a host system has limited ability (depends on application) to page memory used by the guest systems, the most recognized bottleneck to address is physical memory (RAM). Options to programmatically alleviate memory bottlenecks incur performance issues when the disk is re-introduced. Another major component and perhaps less acknowledged is the disk subsystem. In many cases, depending the purpose and application of the guest/virtual systems, the disk bottleneck will be the most significant barrier to performance. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Tags : 
diskeeper corporation, virtualize servers, virtualizations, divergence, convergence, enterprise applications, storage, server virtualization
    
Diskeeper Corporation

Transforming Business Continuity with VMware Infrastructure and Dell EqualLogic

Published By: VMware Dell     Published Date: Sep 29, 2008
VMware virtual machines are hardware-independent so any physical server can serve as a recovery target for any virtual machine. Organizations can significantly reduce the cost of hardware for disaster recovery by repurposing underutilized existing servers for recovery targets and disaster recovery testing. VMware Infrastructure also simplifies and accelerates recovery, helping IT organizations meet their time-to-recovery targets.
Tags : 
vmware, dell, disaster recovery, vmotion, iscsi, sans, equallogic, data protection, backup and recovery, storage virtualization, server virtualization
    
VMware Dell

Private Cloud Without Network Automation - Can It Be done?

Published By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox

Creating Business Value Through Location-Based Intelligence

Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services, business technology
    
SAP

What to Look for in a Data Protection Solution for Virtual Environments

Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, storage, data management, business technology
    
Symantec

A Comparison of PowerVM and x86-Based Virtualization Performance

Published By: IBM     Published Date: Sep 27, 2013
Virtualization has moved to the forefront of many organizations’ IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
ibm, ibm powervm, ibm powervm virtualization, virtualization, virtualization technology, x86, servers, business technology
    
IBM

Thinking Windows 10? Think Simple, Scalable, and Secure Deployments with Desktop Virtualization

Published By: VMware AirWatch     Published Date: Jul 20, 2017
Over 350M Windows 10 devices have been deployed in less than a year, and the recent Windows 10 anniversary update has accelerated the planning of Windows 10 rollouts for the vast majority of enterprises.  This is the perfect time to evaluate your desktop deployment strategy.  In this session, we will discuss the how VMware Horizon can enable your journey to Windows 10, and the benefits of centrally deploying Windows 10 through virtual desktops. We will also discuss how VMware provides a comprehensive solution by managing your physical endpoints through AirWatch as well.
Tags : 
    
VMware AirWatch

Dell EMC Hyperconverged VxRack System 1000

Published By: Dell EMC     Published Date: Feb 23, 2017
Enterprises of all sizes are undergoing massive data center modernization initiatives. They are looking to use technology to cut costs and drive competitive advantage. At the core of many of these transformations is an effort to reengineer IT delivery models to enable cloudlike flexibility of resources, and reduce both capital expenditures and operational overhead. That is giving rise to the private cloud movement. Indeed, private cloud adoption is accelerating and maturing. IT organizations are looking to the private cloud for the elasticity it can provide to add or remove resources as required. In fact, ESG research reveals that more than three-quarters of organizations would classify their private cloud deployment as either an advanced internal cloud or a basic internal cloud. Those organizations that have virtualized at least half of their production applications are more than twice as likely as their more physical infrastructure-dependent counterparts to categorize their environme
Tags : 
    
Dell EMC

Build Strong Security Starting from the Device-Level

Published By: Lenovo and Intel     Published Date: Oct 17, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo and Intel

Connecting Physical and Virtual Networks with VMware NSX and Juniper Platforms

Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

vSRX Services Gateway: Protecting the Hybrid Data Center

Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks

Security Considerations and Best Practices for Securing Containers

Published By: Tenable     Published Date: Feb 05, 2018
12 Steps for Addressing Container Security Containers are an integral tool for most DevOps. While containers themselves do not have inherent security issues, they are often deployed unsecurely, causing security issues around vulnerabilities, visibility, compromise and compliance. How can the DevOps team looking for increased agility work with more closely with the security team looking for reduced risk? Download this Gartner report to: - Understand the unique security challenges posed by containers - Learn how security and risk management leaders concerned with cloud and emerging technologies can engage with and enable secure DevOps - Take 12 steps that will help you adopt containers with a level of acceptable, manageable risk that approaches the use of virtual or physical machines
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Start   Previous    1 2 3 4 5     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.