Skip to main content
 

hardware

Results 1 - 25 of 716Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: May 04, 2018
To successfully navigate workforce transformation, you need to consider both IT and end-user needs. Upgrading your hardware, and “right-sizing” it to fit your workforce only solves half the issue. Download this executive summary to learn ways to best upgrade PCs efficiently with effective solutions to meet the needs of the emerging workforce. Organizations who find this balance can turn their workforce into a strategic asset and gain a competitive advantage while freeing up IT resources to invest in other aspects of digital transformation. Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. Powerful Productivity Outside. The following trademark line should be used on the landing pages for this asset: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell     Published Date: May 22, 2018
To successfully navigate workforce transformation, you need to consider both IT and end-user needs. Upgrading your hardware, and “right-sizing” it to fit your workforce only solves half the issue. On this video meetup we discuss the logistics, both operational and security that you’ll need to consider when managing your organization’s PC lifecycle, as well as how Dell can help get you there. This panel includes, Ian Haynes, Product Marketing Manager for Dell EMC and Jason Christensen, Dell EMC Product Development Manager. Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: DellEMC and Toshiba SSDs     Published Date: Jul 04, 2018
Dell EMC provides VMware vSAN Ready Nodes that combine a wide range of Dell hardware and VMware vSAN software into a ready-to-order package. These include the new single-socket Dell EMC PowerEdge R7415 servers powered by the AMD EPYC 7000-series processors. These Dell EMC vSAN Ready Nodes are validated and configured to meet hyper-converged workload needs while taking advantage of lower single-socket licensing costs from VMware. Dell commissioned Demartek to evaluate the performance of the new Dell EMC PowerEdge R7415 servers that use the AMD EPYC 7000-series of processors. Mixed enterprise workloads were run in this VMware vSAN cluster using one model of the AMD EPYC processor in each of three identical nodes. Then the tests were repeated using different models of AMD EPYC processors in the vSAN cluster nodes.
Tags : 
    
DellEMC and Toshiba SSDs
Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv
    
Bell Micro
Published By: Trend Micro     Published Date: May 03, 2018
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v4.0 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation. While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.
Tags : 
    
Trend Micro
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: ASG Software Solutions     Published Date: Aug 10, 2008
Over the past ten years, IT personnel costs have risen faster than hardware and software investments. IT services have not improved process-wise and still require as much manpower, if not more, to operate now as they did in the past. As firms spend 76% of their IT budget on maintenance and support, they will naturally invest in BSM solutions that will reduce costs, enable ITIL, and provide an optimal ROI.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: Epson     Published Date: Jun 22, 2018
AP automation doesn’t have to be complicated or expensive. By supporting your efforts with streamlined technology and hardware, a small amount of training, and open communication, automating AP operations can actually be very simple. This report was developed to provide you with real, simple steps you can take to digitize and streamline your invoice processing. As you do so you’ll recognize significant benefits, including happier employees and a healthier bottom line.
Tags : 
    
Epson
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: Alcatel-Lucent     Published Date: Dec 02, 2009
Faster, more powerful and dense computing hardware generates significant heat and imposes considerable data center cooling requirements.
Tags : 
data center design and management, distributed computing, internetworking hardware, power and cooling
    
Alcatel-Lucent
Published By: Information Builders     Published Date: Sep 24, 2008
Business Intelligence helps retailers, warehouse staff, customer services agents, and your value chain realize new innovations, improve margins, and propel profits to new heights. Learn how Ace Hardware, Food Lion, and others leverage our software.
Tags : 
information builders, infobuilders, business intelligence, soa, roi, crm, marketing value
    
Information Builders
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Das IT-Marktforschungsunternehmen IDC hat eine globale Studie unter mehr als 3 500 IT-Führungskräften auf der ganzen Welt durchgeführt und fand heraus, dass Unternehmen jeder Größenordnung PC Life Style as a Service-Modelle zur Reduzierung der Kosten, Verkürzung von Aktualisierungszyklen und zur Beschaffung besserer Technologie für ihre Mitarbeiter in Erwägung ziehen. Dell PC as a Service (PCaaS) vereint Hardware, Software, Lebenszyklusservices und Finanzierung in einer umfassenden Lösung, die einen einzelnen, vorhersehbaren Preis pro Arbeitsplatz pro Monat bietet und von Dell Financial Services bereitgestellt wird. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®
Tags : 
idc, studie, dell, intel
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Die Auseinandersetzung mit den Kosten und der Komplexität der PC-Verwaltung lässt der IT-Abteilung wenig Zeit für Innovationen. Sich rasant entwickelnde Technologien und Geschäftsanforderungen bedeuten weniger Möglichkeiten, um neue Trends zu nutzen, die die Art und Weise verändern, in der Technologie bereitgestellt und genutzt wird. Darüber hinaus lässt sich Hardwaretechnologie nicht endlos nutzen. Sie hat einen Lebenszyklus mit einem bestimmten Anfang und einem bestimmten Ende hinsichtlich Produktivität und Nutzen. Die IT-Abteilung ist mit der Optimierung des PC-Lebenszyklus beschäftigt, während sie strategische Innovationen für ihr Unternehmen vorantreibt.
Tags : 
optimieren, lebenszyklus, dell, intel
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
productivity, migration, security, support, hardware, software, devices, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
Das herkömmliche PC-Lebenszyklusmanagement ist ein ineffizienter und teurer Prozess, der Ihrem Unternehmen sowohl Zeit als auch Geld kostet. Mit Dell EMC PC as a Service (PCaaS) können Sie den Ansatz Ihres Unternehmens rund um die IT-Infrastruktur transformieren. Mit PCaaS erhalten Sie Zugang zu unserem mit Awards ausgezeichneten Portfolio an Kundengeräten. Wir haben jedem unserer Mitarbeiterprofile Hardware zugeordnet, die für die jeweiligen speziellen Anforderungen entwickelt wurde. Erfahren Sie mehr über Dell-Lösungen von Intel®.
Tags : 
sparen, geld, dell, intel
    
Dell PC Lifecycle
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : 
hyperflex, systems, data platform, storage efficiency, business, cisco
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer.
Tags : 
cisco, power, radio, wi-fi, network, architecture
    
Cisco EMEA Tier 3 ABM
Published By: Intel Corp.     Published Date: May 15, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.