Whitepaper Library
 

group

Results 1 - 25 of 1035Sort Results By: Published Date | Title | Company Name
Published By: Server Technology     Published Date: Mar 09, 2015
There is no shortage of predictions regarding the future of data center power densities, but their track-record over the last decade has been poor. At the same time, there is also a general inconsistency in the way different groups define and discuss the topic of the high-density data center
Tags : 
infrastructure, design and facilities, power and cooling, green computing
    
Server Technology
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"The Enterprise Strategy Group put HPE SimpliVity hyperconverged infrastructure through its paces in a series of hands-on performance and stress tests simulating real-world configurations and load conditions. Read this report to learn how an HPE SimpliVity infrastructure: Ran nine workloads simultaneously, with an average response time across all applications of 3.9ms Showed little to no performance impact as a virtual controller, drive, and node were systematically failed on a two-node cluster."
Tags : 
hyperconverged, infrastructure, simplivity
    
Hewlett Packard Enterprise
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
Published By: Epson     Published Date: Jun 22, 2018
Digital display devices of every kind have radically changed the way we interact and work in individual and group settings. Those organizations that consider users’ interactions with technology are more successful in improving productivity and increasing tech usefulness in meeting spaces. The single most common and important component in many meeting rooms today is a display technology.
Tags : 
    
Epson
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: JTE Group     Published Date: Mar 05, 2013
unlimited bulk email in delhi/ncr
Tags : 
    
JTE Group
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Une enquête menée par le groupe mondial d'études sur les marchés des technologies de l'information IDC auprès de 3 500 grands noms de l'informatique à travers le monde montre l'unanimité des entreprises au sujet de PC Lifecycle as a Service qui s'avère économique, rapide et mieux adapté aux employés. Dell PC as a Service (PCaaS) intègre le matériel, les logiciels, les services pour le cycle de vie et le financement dans une solution globale qui propose un prix unique et prévisible par mois et par siège, fourni par le Service financier de Dell. En savoir plus sur les solutions Dell en collaboration avec Intel®
Tags : 
revele, adoption, exponentielle, service, dell, intel
    
Dell PC Lifecycle
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Case study briefs for Transguard, BiLFINGER, Aldermore PLC, PinkRoccade, Okinawa Cross Head, Siemens, Sogeti, Norrbottens, Dansk Supermarked Group, ITS Nordic.
Tags : 
    
Hewlett Packard Enterprise
Published By: HPE     Published Date: Jan 04, 2016
A New Class of Storage for the All-flash Data Center: HP 3PAR StoreServ 20000 Enterprise Flash.
Tags : 
    
HPE
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Within the next 12 months, solid-state arrays will improve in performance by a factor of 10, and double in density and cost-effectiveness, therefore changing the dynamics of the storage market. This Magic Quadrant will help IT leaders better understand SSA vendors' positioning in the market.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Sep 12, 2017
In the face of changing consumer demands and expectations, publishers are seeking new ways to reach and engage their audiences. With this in mind, Akamai and Telegraph Media Group combined efforts to test a hypothesis: would the optimization of image display improve page load times enough to boost session lengths and ad impressions?
Tags : 
akamai, telegraph media group, image optimization
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Sep 26, 2017
3rd party overview of 3PAR StoreServ technology updates.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Feb 12, 2016
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gardner magic quadrant, cisco, contact center, omnichannel routing, best practices, cloud computing, data center
    
Cisco
Published By: Cisco     Published Date: Feb 12, 2016
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
ebooks, cisco, productivity, digigal, collaboration tools
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Feb 08, 2017
Learn how you can meet all of your IT infrastructure needs by taking a hybrid IT approach that gives you the performance of on-premise with the flexibility of the cloud in this Aberdeen Group report.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Dec 04, 2015
Group video systems primarily serve the need for high-quality video interaction across a range of meeting room sizes.
Tags : 
video, system, high quality interaction, sip, network management, network performance, network security, wide area networks
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement, integrated actionable intelligence, networking
    
Cisco
Published By: Epicor     Published Date: Sep 20, 2017
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it often simply delays the inevitable—even making it worse. The cost of doing nothing is expensive in the long term. This report—from the independent researchers at Aberdeen Group—outlines the reasons distributors choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Download this report to learn how a new or improved ERP system can help get you the information you need to make informed decisions and act more efficiently, improving overall company performance.
Tags : 
erp software, enterprise resource planning software
    
Epicor
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.