Whitepaper Library
 

infastructure

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
Published By: Redhat     Published Date: Sep 15, 2015
This paper explains how RedHat JBoss Middleware helps organisations evolve their middleware infrastructure by providing the tools needed to rapidly build connected systems that bring people, processes, and information together.
Tags : 
redhat, redhat jboss middleware, middleware infastructure, enterprises, infrastructure
    
Redhat
Published By: Redhat     Published Date: Sep 15, 2015
This paper explains how RedHat JBoss Middleware helps organisations evolve their middleware infrastructure by providing the tools needed to rapidly build connected systems that bring people, processes, and information together.
Tags : 
redhat, redhat jboss middleware, middleware infastructure, enterprises, infrastructure
    
Redhat
Published By: AppNeta     Published Date: Oct 28, 2013
Performance for end users is the metric by which most businesses judge their web applications’ performance: is the responsiveness of the application an asset or a liability to the business? Studies show that users are growing more and more demanding, while average page-loads are getting bigger and bigger. Combine that with frequent releases and cross-business updates, and pretty soon the optimization job is never quite done.
Tags : 
appneta, application performance, rum, real user monitoring, synthetic monitoring, optimization, application performance management, apm, application operations, synthetic transaction monitoring, javascript, css, ajax, infastructure monitoring, transaction tracing, customer satisfaction
    
AppNeta
Published By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : 
vmware, disaster recovery, smb, it system, it infastructure, virtualization, storage replication, ups, power outage, uninterruptible power supplies, circuit failure, human error, business continuity, time critical, mission critical, bcdr maturation, backup, data backup, data recovery, hgih availability
    
VMware
Published By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : 
qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system, patching vulnerabilities, remediation, cloud platform, patching, patch report, it infastructure, infrastructure, network security, cloud computing
    
Qualys
Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Today’s businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in “patterns of expertise” to address complex business and operational tasks for smarter computing.
Tags : 
ibm, information technology, systems, integrated systems, expert integrated systems, ibm puresystems, platform system, infastructure system, infrastructure
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : 
ibm, ibm pureflex system, sap, cloud, sap enterprise environments, cloud computing, storage, networking, database management, infastructure, it solutions, data center
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Using data from real customer deployments, Solitaire examines differentiators for network infrastructure deployments on either PowerLinux or Windows. PowerLinux clearly emerges as a preferred platform.
Tags : 
solitare group, powerlinux, infastructure, network infastructure deployments, reliability, throughput, resiliency
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
This technical white paper presents benchmark results showing greater VM consolidation ratios than demonstrated in previous benchmarks and demonstrating the extent of the performance lead that PowerVM virtualization technologies deliver over x86-based add-on virtualization products. The tests, running two workload benchmarks of different consolidation ratios on POWER7 processor-based and comparable Intel-based systems, demonstrate the exceptional performance and scalability of PowerVM virtualization technologies compared to VMware vSphere1 on an x86-based platform.
Tags : 
ibm, ibm power7 systems, ibm powervm, virtualization, virtualization technology, consolidation, infastructure
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
Continual and timely upgrades of UNIX systems can enable growth and lower costs. But for some Sun/Oracle and HP customers, expected upgrade plans have hit major hurdles. Read this Clipper Group white paper to see how only IBM continues to provide a plan, and a predictable drumbeat, for the future. Read it now.
Tags : 
ibm, ibm power7, ibm power7 systems, data center, it infastructure, data center, enterprise applications, consolidation, virtualization, smart computing, platforms
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The ubiquity of mobile devices is transforming the ways that business gets done in today’s world. IBM has the services that can help go beyond supporting devices to achieve a flexible, powerful mobile enterprise.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. This white paper discusses how IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure.
Tags : 
reengineering, it discovery, analytics, visualization, interdependencies, it environment, logic, logical relationships, virtual, cloud, logical dependency, logical dependency mapping, aldm, it infastructure
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: Citrix Systems     Published Date: Sep 08, 2011
Free guide to show you how to reduce infrastructure costs and total cost of ownership (TCO) while increasing security, user productivity and business agility.
Tags : 
citrix, netscaler, it goals, infastructure, tco, total cost of ownership, virtualization, cloud computing, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller, infrastructure
    
Citrix Systems
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.