deployment

Results 76 - 100 of 1571Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jun 21, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The Cisco UCS solution provides all management and configuration services at the centrally located Fabric Interconnects, so you can manage large-scale deployments from a single location. This method lets you consolidate hardware and streamline management. The IBM Flex System solution uses a distributed management model with chassis-level control. This method adds to the complexity to the hardware configuration, which can increase management needs.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Learn how to simplify and accelerate your journey to hybrid cloud deployment.
Tags : 
    
Cisco
Published By: Windstream     Published Date: Oct 22, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Epicor     Published Date: Sep 20, 2017
More than ever, businesses are considering a cloud solution for their enterprise resource planning (ERP) deployment over an on-premises system. Cloud technology appeals to these companies because updates and fixes occur automatically with little or no effort from internal IT staff, and because cloud-based solutions provide access to real-time data from anywhere. Employees want tools that make it easier for them to complete everyday tasks and make informed decisions that help the business grow. Aberdeen’s research report, “Top Performers Know It’s Time to Migrate to Cloud ERP: Here’s Why and How,” uncovers the reasons successful companies are choosing cloud over on-premises ERP models. Download this SmartBite for a quick look at the report’s highlights.
Tags : 
    
Epicor
Published By: NetApp     Published Date: Sep 04, 2018
Learn why Gartner believes that more than 70% of new DBMS deployments will leverage the cloud for at least one use case by 2018. Find out how to assess modern data management capabilities and determine which DBMS best meets your business requirements.
Tags : 
    
NetApp
Published By: HPE Service Virtualization     Published Date: Aug 18, 2016
When companies invest in a performance center of excellence, it can take up to three years before it starts paying dividends back. As a result, customers are happier, outages are a seemingly rare occurrence, and performance becomes prioritized as a standard policy for application development and deployment.
Tags : 
    
HPE Service Virtualization
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
How can you accelerate SAP HANA with Lenovo? In this article from insiderPROFILES, you’ll learn why major IT companies choose Lenovo’s SAP HANA Appliance to accelerate and scale their SAP HANA® deployments. Natalie Miller interviews the leadership team to understand why they chose Lenovo, and how their X6 server infrastructure provides unique value for their team. Get the article now.
Tags : 
lenovo, freudenberg it, sap hana, insiderprofiles, lenovo sap hana, x6 server infrastructure, hosting needs, sap hana appliance
    
Lenovo and Intel®
Published By: SAP     Published Date: Nov 16, 2017
SAP S/4HANA is the next generation of SAP ERP. Taking full advantage of the SAP HANA in-memory platform, SAP S/4HANA promises to bring big innovations and benefits to enterprises. But when it comes to deployment, what are the strategies available?
Tags : 
    
SAP
Published By: Oracle CX     Published Date: Oct 19, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements many companies are turning to cloud computing. To remain competitive companies need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. A complete cloud strategy will likely include both private and public clouds because some applications and data might not be able to move to a public cloud. Moving to the cloud should not create information silos but should improve data sharing. Any cloud strategy should make sure that it is possible to integrate on-premises, private cloud and public cloud data and applications. Furthermore, any on-premises cloud deployments must be able to easily migrate to public cloud in the future.
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Oracle is making significant engineering investments to ensure that Oracle systems coupled with Oracle software deliver the best possible business results. Integrated hardware, accelerated virtualization, and encryption ensure that cloud deployments benefit from the utmost agility and security without suffering performance losses.
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness are making the Security Delivery Platform a foundational building block to deploying security solutions. Read now!
Tags : 
    
Gigamon
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented.
Tags : 
    
Dell and Nutanix
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dome9     Published Date: Apr 25, 2018
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.