Skip to main content
 

centralized

Results 126 - 150 of 206Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: May 14, 2014
To respond to rapid business environmental changes, enterprises are now adopting a more agile and services-oriented model for centralized IT, often characterized as “private cloud.” Public cloud service providers have become adept at adding new customers, new applications, and more compute-intensive workloads with minimal delay. While traditional enterprise IT may not be able to fully emulate this model, they can use virtualization – both at the levels of servers and storage – to come as close to the cloud as possible. Read this Evaluator Group paper to learn how HP 3PAR StoreServ Storage platforms can be foundational to developing IT agility.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: HP     Published Date: May 14, 2014
As business purposes have changed over the years, IT approaches and infrastructures have had to change in lock-step to serve them optimally. IT professionals are now combining the best of the centralized approach – via virtualization, federation, and clouds of all sorts – with the best of the decentralized model – via mobile and localized consumption and production. In this paper, Enterprise Strategy Group examines approaches to IT operational challenges and business requirements. Learn how HP Converged Storage’s comprehensive approach represents a logical evolution development in storage, delivering ease, flexibility and cost-efficiency all in one.
Tags : 
3par storeserv, converged storate, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: Citrix Systems     Published Date: Apr 14, 2014
The conversation about VDI has moved from “whether” to “when” and “how.” In today’s fast-moving markets, a centralized approach to desktop and app delivery has become essential to help businesses become more mobile, flexible, agile and productive. Download this white paper to learn more!
Tags : 
vdi, desktop apps, mobile apps, app delivery, tablets, productivity, flexibility
    
Citrix Systems
Published By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : 
file sharing, wan optimization, high bandwidth, low overhead, file replication, autodesk, revit, wafs
    
Globalscape
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: VMware, Inc     Published Date: Dec 05, 2013
For this white paper, IDC performed an in-depth analysis of the business value of VMware View, defined as the expected ROI associated with the use of the solution as a platform for the targeted deployment of a virtual desktop infrastructure.
Tags : 
vmware, vmware view, idc, virtual desktop infrastructure, vdi, targeted deployment, roi, virtual desktop architecture
    
VMware, Inc
Published By: IBM     Published Date: Oct 24, 2013
The Dow Chemical Company is a $60 billion enterprise composed of a worldwide network of 13 business units. Although such a decentralized business structure has competitive advantages, it can also create challenges to setting and achieving enterprise-wide goals.
Tags : 
lease accounting, accounting, real estate, asset manager, ibm tririga, new accounting standard, fasb, iasb
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
This case study examines a European manufacturer that successfully moved from an ad-hoc workplace organization to a strategic organization over a period of five years, saving $19 million in 2009 in addition to a 400 percent return on investment over five years (from 2004 - 2009). The organization moved from a decentralized siloed group of regional facilities and real estate organizations to a fully-centralized and matrixed organization, enabling close coordination and alignment with the regional business units.
Tags : 
lifecycle management, real estate systems integration, new lease accounting standard, fasb, iasb, workplace management system, iwms, facility management
    
IBM
Published By: Skillsoft     Published Date: Sep 30, 2013
This ExecBlueprint describes an integrated approach for managing performance, risk, and compliance through centralized governance processes. It is called “GRC” (governance, risk management, and compliance), and it provides a framework for sharing policies, processes, and documents at the enterprise level to improve communication, create organizational efficiencies, and reduce unnecessary risk.
Tags : 
    
Skillsoft
Published By: Arkadin     Published Date: Sep 11, 2013
Cost effective, simple to deploy, next generation HD video conferencing solutions are no longer limited to C-level boardrooms, today enabling face-to-face meetings at the knowledge worker level delivering high levels of engagement and increased productivity.
Tags : 
: video conferencing, video collaboration, cloud-based video conferencing, hd-video conferencing, mobile video conferencing, mobile video communications, enterprise video conferencing, saas video conferencing
    
Arkadin
Published By: Oracle     Published Date: Apr 02, 2013
Centralized pricing and billing systems are quickly becoming the standard for competitive Financial Services (FS)
Tags : 
oracle, financial services, increase profitability
    
Oracle
Published By: VMware     Published Date: Dec 18, 2012
An analysis of organizations adopting a centralized virtual desktop (CVD) computing environment with the use of VMware View shows that investment in the technology can result in significant business value with very high return on investment.
Tags : 
virtual desktop, virtualization, cloud, roi, analysis, cost savings
    
VMware
Published By: IBM     Published Date: Dec 11, 2012
Enterprise Ready Intelligent Capture (ERIC) — a coordinated approach to document input and processing that combines distributed and centralized scanning with fax and electronic conversion across numerous departments. Read on to learn more.
Tags : 
government agencies, critical improvements, paper bound functions, ibm, enterprise ready intelligent capture, efficiency
    
IBM
Published By: Quest Software     Published Date: Oct 02, 2012
Is your business reactively implementing compliance? If so, you're wasting time and money and destroying productivity.
Tags : 
compliance, quest, centralized monitoring, reporting, productivity
    
Quest Software
Published By: Dell Software     Published Date: Jul 18, 2012
Manage Permissions Across Servers
Tags : 
windows permissions, registries, scheduled tasks, sharepoint, sql, sql server, exchange server, sid
    
Dell Software
Published By: Eaton     Published Date: Jun 01, 2012
Though power protection solutions vary in numerous ways, all but the largest data centers use basic approaches when deploying uninterruptible power systems (UPSs): Either they distribute many smaller UPSs among their server racks or they install one or two large UPSs centrally within or near their server room. This white paper outlines each architecure's pros and cons.
Tags : 
uninterruptible power system, ups, power back up strategy, distributed power back up scheme, centralized back up scheme, white space, hybrid back up strategy
    
Eaton
Published By: Riverbed     Published Date: May 18, 2012
In this short video, Bob Gilbert, Riverbed's tech evangelist, explains why a centralized computing model is now preferred by distributed organizations, and the challenges of consolidation. Watch now to learn about the powerful technologies that can optimize your WAN so that applications can run up to 50 times or more faster, giving your users superlative performance. as they do with thick clients.
Tags : 
cloud computing, riverbed, wan, wan optimization
    
Riverbed
Published By: Quest Software     Published Date: Apr 27, 2012
Is your business reactively implementing compliance? You're wasting time and money - get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration
    
Quest Software
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.