virtual physical

Results 1 - 25 of 122Sort Results By: Published Date | Title | Company Name

SAFE Architecture Guide Places in the Network: Secure Data Center

Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco

Aspera FASP high-speed transport

Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119

Blockchain in Manufacturing: The Next Wave of Industry 4.0

Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Whether you know it as Industry 4.0, the 4th Industrial Revolution, or Smart Industry, Manufacturing is going through a deep transformation, with changes that are centered around digitalization. While most industries are already on this digitalization path, the disruption is more visible and pronounced in manufacturing because it is expanding virtual data and processes into environments that have been fundamentally about physical products. This transformation has already started, and its impact is expected to be massive. Technical, economic, and social changes are expected across the whole manufacturing ecosystem, with jobs shifting from offshoring back to nearshoring. Strong technology elements driving this digital revolution include 3D printing, robotizing and automation, smart factory with IoT and machine learning, and supply chain digitization. Their impact is profound.
Tags : 
    
TIBCO Software GmbH

Five Reasons Application Developers Should Consider Data Virtualization

Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Enterprises use data virtualization software such as TIBCO® Data Virtualization to reduce data bottlenecks so more insights can be delivered for better business outcomes. For developers, data virtualization allows applications to access and use data without needing to know its technical details, such as how it is formatted or where it is physically located. For developers, data virtualization helps rapidly create reusable data services that access and transform data and deliver data analytics with even heavylifting reads completed quickly, securely, and with high performance. These data services can then be coalesced into a common data layer that can support a wide range of analytic and applications use cases. Data engineers and analytics development teams are big data virtualization users, with Gartner predicting over 50% of these teams adopting the technology by 202
Tags : 
    
TIBCO Software GmbH

STREAMLINING VM BACKUPS WITH THE PUBLIC CLOUD

Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Currently, this virtualization juggernaut shows no sign of slowing. As businesses recognize the potential for increased reliability and scalability offered by virtual technology, they are ramping up their investments in data center modernization and upgrading. In fact, 33 percent of the respondents to a recent ESG survey on cloud usage said that making greater use of server virtualization was one of their top five spending priorities for the next 12 to 18 months.
Tags : 
    
Druva

HOW TO MOVE VMWARE DATA PROTECTION TO THE CLOUD

Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Protecting these virtualized environments, however, and the ever-growing amount of structured and unstructured data being created, still requires a complex, on-prem secondary storage model that imposes heavy administrative overhead and infrastructure costs. The increasing pressure on IT teams to maintain business continuity and information governance are changing how businesses view infrastructure resiliency and long-term data retention—they are consequently looking to new solutions to ensure immediate availability and complete protection of the
Tags : 
    
Druva

Leader’s Guide to the Future of Work, feat. Gartner Research: “How We Will Work in 2028"

Published By: Avaya     Published Date: Nov 07, 2018
How new technologies will change how people connect with each other and serve customers tomorrow. The Leader’s Guide to the Future of Work, featuring Gartner Research, introduces you to a world where technology helps people connect better – with each other and with their customers. The workplace as we know it today is evolving into a digital, virtual work space, where work becomes more fluid, more project-based and more mobile than today. Where teams communicate and collaborate more effectively, beyond devices, physical locations and functions – even beyond the boundaries of the enterprise. And where humans and machines not only work together, but complement each other effortlessly.
Tags : 
    
Avaya

VM Data Protection for Dummies

Published By: Quantum Corporation     Published Date: Sep 11, 2018
Virtualization is rapidly changing the way business IT operates, from small local businesses to multinational corporations. If you are reading this, chances are good that your company is already taking advantage of virtualization’s benefits. Virtualization means that a single underlying piece of hardware, such as a server, runs multiple guest operating systems to create virtual machines, or VMs, with each of them being oblivious to the others. An administrative application, such as VMware, manages the sharing process, allocating hardware resources, memory, and CPU time to each VM as needed. And all applications look at this software construct exactly as if it were a real, physical server — even the VM thinks it’s a real server! Virtualization makes good financial sense. It enables a single server to offer multiple capabilities that otherwise would require separate servers. It includes native high availability features, so you don’t have to use any more complex clustering tools. This ab
Tags : 
    
Quantum Corporation

Digital Twin – Manufacturing Excellence through Virtual Factory Replication

Published By: Dassault Systčmes     Published Date: Jun 19, 2018
The concept of a virtual, digital equivalent to a physical product or the Digital Twin was introduced in 2003 at a University of Michigan Executive Course on Product Lifecycle Management (PLM) taught by Dr. Michael Grieves. In light of these advances, it is timely to explore how the Digital Twin can move from an interesting and potentially useful concept that aids in understanding the relationship between a physical product and its underlying information to a critical component of an enterprise-wide closed-loop product lifecycle. Understand how focusing on the connection between physical product and virtual product will improve productivity, uniformity of production, and ensure the highest quality products.
Tags : 
    
Dassault Systčmes

Security Considerations and Best Practices for Securing Containers

Published By: Tenable     Published Date: Feb 05, 2018
12 Steps for Addressing Container Security Containers are an integral tool for most DevOps. While containers themselves do not have inherent security issues, they are often deployed unsecurely, causing security issues around vulnerabilities, visibility, compromise and compliance. How can the DevOps team looking for increased agility work with more closely with the security team looking for reduced risk? Download this Gartner report to: - Understand the unique security challenges posed by containers - Learn how security and risk management leaders concerned with cloud and emerging technologies can engage with and enable secure DevOps - Take 12 steps that will help you adopt containers with a level of acceptable, manageable risk that approaches the use of virtual or physical machines
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable

Edge To Endpoint

Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn

Edge To Endpoint

Published By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle

The Why, the What and the How of the Software-Defined Data Center

Published By: McAfee EMEA     Published Date: Nov 15, 2017
The Software-Defined Data Center (SDDC) is an overarching philosophy for implementing better data centers. The most basic way to think about an SDDC is as a combination of virtualized computing resources, plus software-defined storage and networking. In addition, SDDC often includes overarching security aspects: in other words, SDDC abstracts and automates all the compute, storage and networking aspects that are traditionally physical, and it can put that automation and abstraction to use in enhancing security.
Tags : 
data center, software, defined, sddc, implementation, automation, security
    
McAfee EMEA

Wikibon Research Report: Halving Downtime Costs for Mission Critical Apps

Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle

8 Essential Practices for Hypervisor Backup

Published By: Druva     Published Date: Sep 27, 2017
Virtualization tools are providing storage pros with the ability to overcome the limitations of physical servers and gain more flexibility. While hypervisors are allowing them to leap over these boundaries, they’re simultaneously crumbling traditional data protection walls. It’s time to rethink how we handle backup. Inside, discover 8 essential real-world practices to put in place for hypervisor backup, archiving, and disaster recovery.
Tags : 
vmware, virtualization, hypervisors, data protection, archiving, disaster recovery
    
Druva

vSRX Services Gateway: Protecting the Hybrid Data Center

Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks

Thinking Windows 10? Think Simple, Scalable, and Secure Deployments with Desktop Virtualization

Published By: VMware AirWatch     Published Date: Jul 20, 2017
Over 350M Windows 10 devices have been deployed in less than a year, and the recent Windows 10 anniversary update has accelerated the planning of Windows 10 rollouts for the vast majority of enterprises.  This is the perfect time to evaluate your desktop deployment strategy.  In this session, we will discuss the how VMware Horizon can enable your journey to Windows 10, and the benefits of centrally deploying Windows 10 through virtual desktops. We will also discuss how VMware provides a comprehensive solution by managing your physical endpoints through AirWatch as well.
Tags : 
    
VMware AirWatch

Connecting Physical and Virtual Networks with VMware NSX and Juniper Platforms

Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Comprehensive Data Protection for Physical, Virtual and Cloud Infrastructures

Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM

Comprehensive Data Protection For Physical, Virtual And Cloud Infrastructures

Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM

Dell EMC Hyperconverged VxRack System 1000

Published By: Dell EMC     Published Date: Feb 23, 2017
Enterprises of all sizes are undergoing massive data center modernization initiatives. They are looking to use technology to cut costs and drive competitive advantage. At the core of many of these transformations is an effort to reengineer IT delivery models to enable cloudlike flexibility of resources, and reduce both capital expenditures and operational overhead. That is giving rise to the private cloud movement. Indeed, private cloud adoption is accelerating and maturing. IT organizations are looking to the private cloud for the elasticity it can provide to add or remove resources as required. In fact, ESG research reveals that more than three-quarters of organizations would classify their private cloud deployment as either an advanced internal cloud or a basic internal cloud. Those organizations that have virtualized at least half of their production applications are more than twice as likely as their more physical infrastructure-dependent counterparts to categorize their environme
Tags : 
    
Dell EMC

Bridging to the Cloud: The Right Database Makes The Difference

Published By: IBM     Published Date: Jan 27, 2017
For more and more organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. In fact, hybrid cloud is the new norm for IT. IDC says more than 80% of enterprise IT organizations will commit to hybrid cloud by 20171, and 70% of IT decision-makers say they will always have a mix of traditional IT and cloud architectures.2 With important applications and workloads architected across both on-premises and hybrid, public and private cloud environments, business and IT stakeholders must be able to access data with equal efficiency, reliability and speed—regardless of physical location, infrastructure type or time frame.
Tags : 
    
IBM

Measuring the Business Value of Horizon Air

Published By: VMware AirWatch     Published Date: Dec 09, 2016
Breaking the link between access devices and virtual desktops (VDI) in a data center provides numerous benefits including cost efficiency and access transparency regardless of a user’s physical location. However, as more organizations move away from a physical desktop to VDI, they must decide whether they should build it themselves or purchase an all-in-one cloud service. This white paper highlights the benefits of using a managed desktop cloud service that provides infrastructural support while reducing infrastructure and operational costs. Access now to discover how other organizations are saving money by utilizing a managed cloud service.
Tags : 
    
VMware AirWatch

Build Strong Security Starting from the Device-Level

Published By: Lenovo and Intel     Published Date: Oct 17, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo and Intel

Build Strong Security Starting from the Device-Level

Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat, internet security, network security appliance, vulnerability management
    
Lenovo and Intel®
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.