Skip to main content
 

data configuration

Results 1 - 25 of 88Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud, server, technology, configuration, cloudformation
    
Amazon Web Services, Inc
Published By: AMD     Published Date: Jul 20, 2012
Business agility can be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.
Tags : 
amd, dell, microsoft, it administrators, virtualization, agile business execution, virtual server performance, data migration, data management, data center, scalability, system management, provisioning, configuration, monitoring, alerting, poweredge, hyper v, amd opteron
    
AMD
Published By: AMD     Published Date: Jul 23, 2012
How Microsoft Hyper-V and AMD Opteron Processors Enable True Business Agility.
Tags : 
virtualization, cloud computing, data mirgation, virtualized machines, virtual server performance, scalability, power management, system management, provisioning, configuration, busines agility, it management, amd opteron, microsoft, sql
    
AMD
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
    
Attunity
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhere’s flagship product is Automation Anywhere Enterprise – a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhere’s product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
    
Automation Anywhere
Published By: BMC Software     Published Date: Aug 26, 2014
Is your IT Automation strategy saving you money or just becoming more complex and costly? With the right unified strategy, IT Automation can pay for itself and deliver far more business value. Watch this on-demand webinar, “New Strategies to Manage IT Automation Complexity” and learn how to: • Reduce costs by integrating automatio n for servers, middleware, networks and databases • Eliminate manual and tedious IT Operations tasks with both new and existing technology • Save time and money by consolidating configuration management processes across your IT infrastructure • Transform compliance, audit that and remediation from a stressful event to a standard practice Become part of the Automation revival is serving as a catalyst for IT Operations. Watch this on-demand webinar and learn how to integrate your IT automation strategy.
Tags : 
it automation, strategy, operations, it infrastructure, automation
    
BMC Software
Published By: Brocade Communications Systems     Published Date: Sep 05, 2014
The arrival of virtualization, cloud computing, and mobility has strained data center networks—and IT staff—like never before. This Market Spotlight explains how data center network fabrics provide a foundation for automated provisioning, configuration, and management of network-based services in a new era of IT agility.
Tags : 
network automation, virtualization, cloud computing, agility, network-based, services
    
Brocade Communications Systems
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration
    
CA WA 2
Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite
Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Cisco     Published Date: Jan 05, 2015
Private cloud technologies have proven themselves in large data centers and hosting organizations. The ability to quickly deploy new virtual machines, make configuration changes to virtual machines, live migrate virtual machines to different hosts before performing maintenance on physical components, and other benefits like this have cut operational expenses.
Tags : 
solution guide, integrate, infrastructure, solutions, applications
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2016
In the time it took you to download and open this eBook, you could have spun up and configured hundreds of virtual machines in a public or private cloud, deployed your application, database, middleware, messaging, load balancers, storage, and other components to those configured servers, linked them all together, and had your app live in production - all with a single click. This isn’t the future we’re describing, it’s right now, and thousands of development teams around the world are doing it. At a high level, we’re describing automation that cloud and APIs enable, and at a low level, we’re describing the outcome of adopting a DevOps mentality and the associated tools. This eBook will look at the basics of DevOps automation, and configuration management to get you started down the right path.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
In the time it took to download and open this eBook, you could have spun up and configured hundreds of virtual machines in a public or private cloud, deployed your application, database, middleware, messaging, load balancers, storage, and other components to those configured servers, linked them all together, and had your app live in production - all with a single click. This isn't the future we're describing, it's right now, and thousands of development teams around the world are doing it. At a high level, we;re describing automation that cloud and API's enable, and at a low level, we're describing the outcome of adopting a DevOps mentality and the associated tooks. This eBook will look at the basics of DevOps, automation and configuration management to get you started down the right path.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing, business optimization
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
The Cisco Nexus® 9000 Series Switches product family makes the next generation of data center switching accessible to customers of any size. This white paper is intended for commercial customers new to Cisco Nexus 9000 Series Switches who are curious how the switches might be feasibly deployed in their data centers. This white paper highlights the benefits of Cisco Nexus 9000 Series Switches, outlines several designs suitable for small-to-midsize customer deployments, discusses integration with existing networks, and walks through a topology validated by Cisco for Cisco Nexus 9000 Series Switches, complete with configuration examples.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Cisco UCS Integrated Infrastructure provides a pre-validated, ready-to-deploy infrastructure, which reduces the time and complexity involved in configuring and validating a traditional data center deployment. Cisco UCS Platforms is flexible, reliable and cost effective to facilitate various deployment options of the applications while being easily scalable and manageable. The reference architecture detailed in this document highlights the resiliency, cost benefit, and ease of deployment of a SAP HANA solution. This document describing the infrastructure installation and configuration to run SAP HANA on a dedicated or shared infrastructure.
Tags : 
    
Cisco
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Darktrace     Published Date: Apr 02, 2019
As organizations increasingly rely on cloud services and SaaS applications to streamline business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migrations continue apace, the unique security challenges presented by the cloud will not only require a more agile mindset, but also self-learning technologies that can move at the speed of cloud deployments and spot subtle deviations indicative of a threat, while providing complete, real-time visibility across the digital business. Darktrace’s world leadership in the field of artificial intelligence for cyber security makes it the most effective and proven solution to detect unprecedented threats and anomalous cyber-incidents in the cloud. Whether faced with an insider threat, an attacker targeting sensitive data in test containers, or a significant misconfiguration that could be exploited in the fut
Tags : 
    
Darktrace
Published By: DataFlux     Published Date: Jan 07, 2011
This white paper introduces and examines a breakthrough platform solution designed to drive parallel-process data integration - without intensive pre-configuration - and support full-lifecycle data management from discovery to retirement.
Tags : 
dataflux, enterprise data, data integration, configuration, lifecycle data management, data warehouses
    
DataFlux
Published By: Dell     Published Date: Sep 21, 2012
Choosing the right combination of hardware and software for your data center can be a daunting task. This guide provides scalability within these configurations to fit your hardware needs as your business grows
Tags : 
dell, microsoft, virtualization, hardware, infrastructure, virtualized infrastructure, high availability, it infrastructure, clustering
    
Dell
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.