virtual

Results 1 - 25 of 3020Sort Results By: Published Date | Title | Company Name
Published By: Spectrum Enterprise     Published Date: Aug 22, 2019
Hello, greetings, and welcome to Conversational Unified Communications. I’m Brien Posey. For those of you who don’t know me, I am a long time Conversational Geek author, and 17-time Microsoft MVP. My professional background is in both IT and in commercial astronautics. It’s an odd combination for sure. I sometimes find myself setting up virtual machines on one day, and being strapped into a space capsule the next day (seriously). Thankfully, Peter, Nick, and the rest of the folks at Conversational Geek have embraced my unorthodox (dare I say eccentric) career choices and have allowed me to author books on subjects ranging from the cloud computing to real life rocket science. I would like to personally invite you to go to ConversationalGeek.com and check out some of these other books. In this book, I want to talk about unified communications. Those of you who follow my work may recall that back in 2009 I wrote another book about unified communications called Brien Posey’s Guide to Pract
Tags : 
    
Spectrum Enterprise
Published By: KPMG     Published Date: Sep 04, 2019
Key considerations when developing a strong and customer-friendly approach to intelligent authentication. Bank fraud is on the rise. In fact, according to a recent survey of 43 major banks around the world, it’s not just the number of fraud cases that is going up; so, too, is the value of fraud overall. In large part, this increase in fraud is the result of identity theft scams. Rather than attempting some sort of high-stakes virtual bank heist for all the gold in the vault, most online thieves seem content simply stealing money from every-day customer’s accounts when they aren’t looking.
Tags : 
    
KPMG
Published By: Intel     Published Date: Aug 26, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE® Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries – 36% overall and 59% in the government sector.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: TIBCO Software     Published Date: Feb 13, 2019
Analyst firms Gartner, Inc. and Forrester are projecting accelerated data virtualization adoption for both first-time and expanded deployments. What are the uses cases for this technology? At its Data and Analytics Summit in London in March 2018, Gartner answered this question by identifying 13 data virtualization use cases. This paper explores each of these use cases by: Identifying key requirements Showing how you can apply TIBCO® Data Virtualization to address these needs Listing the benefits you can expect when implementing TIBCO Data Virtualization for the use case
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
Today, you can improve product quality and gain better control of the entire manufacturing chain with data virtualization, machine learning, and advanced data analytics. With all relevant data aggregated, analyzed, and acted on, sensors, devices, people, and processes become part of a connected Smart Factory ecosystem providing: •? Increased uptime, reduced downtime •? Minimized surplus and defects •? Better yields •? Reduced cost due to better quality •? Fewer deviations and less non-conformance
Tags : 
    
TIBCO Software
Published By: Infinidat EMEA     Published Date: May 14, 2019
Virtualization is the standard in enterprise IT environments for consolidating servers, enhancing businstrators that reduces their Total Cost of Ownership (TCO) and helps speed the application development process. However, as improvements have been made with server technology, storage technoless continuity, and improving business agility. VMware provides an architecture for server adminiogy has become the bottleneck. Legacy storage solutions can’t keep pace with thousands of virtual machines demanding maximum IOPS along with high bandwidth at the lowest latency. Infinidat’s InfiniBox removes the storage bottleneck for VMware environments. The InfiniBox enterprise storage array delivers faster-than-all-flash performance, high availability, and capacity density at petabyte scale. This Infinidat white paper is written for VMware and storage administrators to introduce them to the integration capabilities of the InfiniBox for VMware.
Tags : 
    
Infinidat EMEA
Published By: TIBCO Software     Published Date: Aug 20, 2019
TIBCO Data Virtualization is a proven approach used by four of the top five integrated energy companies to deliver more analytic data sooner from across upstream and downstream operations. Specific use cases described include: •? Offshore Platform Data Analytics •? Well Maintenance and Repair •? Cross Refinery Web Data Services •? SAP Master Data Quality If you are an energy company facing similar data and analytic challenges, consider TIBCO Data Virtualization.
Tags : 
data virtualization, analytic data, oil&gas, improved roi, improved efficiency
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
TIBCO Data Virtualization é uma solução comprovada que é usada por quatro das cinco principais companhias de energia integradas para fornecer mais rapidamente um maior volume de dados analíticos nas operações de exploração e produção. Os casos de uso específicos descritos incluem: • Análise de dados em plataformas offshore • Manutenção e reparação de poços • Serviços de dados web em refinarias • SAP Master Data Quality Se uma empresa de energia está enfrentando desafios relacionados com dados e suas análises, deve considerar o TIBCO Data Virtualization.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 16, 2019
TIBCO Data Virtualization es una solución probada que es utilizada por cuatro de las cinco principales compañías de energía integradas para obtener más rápidamente una mayor cantidad de datos analíticos las operaciones de exploración y producción. Los casos de uso específicos que se describen incluyen: • Analítica de Datos de Plataformas Marítimas • Mantenimiento y Reparación de Pozos • Servicios de Datos Web en Refinerías • SAP Master Data Quality Si una compañía de energía está enfrentando desafíos relacionados con los datos y la analítica similares, debe considerar TIBCO Data Virtualization.
Tags : 
    
TIBCO Software
Published By: Shape Security     Published Date: Sep 12, 2019
A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes, including: Upgrade theft Two-factor authentication bypass Virtual calling When account takeovers became so common that the telecom provider received negative press about the situation, the company knew it needed to find a solution immediately. Download this case study to learn how the company was able to stop credential stuffing with Shape Enterprise Defense.
Tags : 
    
Shape Security
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture
    
Bell Micro
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas
    
NEC
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 02, 2008
Business Service Management (BSM) is of growing importance in the IT world. By managing IT systems according to the business services they support - like order entry, online sales, shipping, or customer service - IT is able to deliver on real business goals like providing competitive advantage, improving customer satisfaction, driving revenue growth, and increasing shareholder value.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, configuration management
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.