computer world

Results 1 - 25 of 25Sort Results By: Published Date | Title | Company Name
Published By: Silver Peak     Published Date: Sep 26, 2016
In this eGuide, Network World and Computerworld explore the trends in software-defined networks and offer in-depth advice on addressing the key limitations of today’s VPNs. See how software-defined WANs could help your company maximize its investments in the cloud and address today’s hyper-connected, cloud-based environments demanding greater agility and efficiency.
Tags : 
sd-wan, networking, it management, network architecture, silver peak
    
Silver Peak
Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
Published By: Intel     Published Date: Dec 13, 2018
Advanced image analysis and computer vision are key components of today’s AI revolution and is becoming critical for a wide range of industry applications, including healthcare, where this technology is being used to detect anomalies and improve patient care. Due to a lack of integrated tools and experience with these cutting-edge technologies, however, deploying complete systems is difficult. Applications that utilize deep learning approaches often require large amounts of highly parallel compute power, storage, and networking capabilities, along with performance optimizations for faster data analysis. The Intel and QNAP/IEI solution combines all these elements in one complete system for scalable data management for hospitals and clinics of all sizes. Read more on Intel’s and QNAP/IEI’s real-world use case on macular degeneration analysis through high-performance computing, vision capabilities, storage, and networking in a single solution.
Tags : 
    
Intel
Published By: BlueArc Corporation     Published Date: Apr 24, 2008
The crisis of mass power consumption in the corporate data center has come to a head. Power required to run data centers in the U.S. is estimated to be as much as that produced by five power plants in a year. Energy expenditures and requirements have doubled in the last five years, and computer disposal is the fastest growing type of waste in the world, according to top Stanford researchers and Greenpeace.
Tags : 
bluearc, green, green computing, energy, energy efficient
    
BlueArc Corporation
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Cray Inc.     Published Date: Jul 22, 2014
The Cray® CS300-LC™ liquid-cooled cluster supercomputer combines system performance and power savings, allowing users to reduce capital expense and operating costs. The Trend Toward Liquid Cooling Recent IDC surveys of the worldwide high performance computing (HPC) market consistently show that cooling today's larger, denser HPC systems has become a top challenge for datacenter managers. The surveys reveal a notable trend toward liquid cooling systems, and warm water cooling has emerged as an effective alternative to chilled liquid cooling.
Tags : 
computing clusters, gpu computing, gpu cluster, x86 cluster, phi clusters, xeon phi clusters, hpc clusters, business technology
    
Cray Inc.
Published By: Juniper Networks     Published Date: Feb 05, 2018
Innovative data-driven strategies are enabling organizations to connect with customers and increase operational efficiency as never before. These new initiatives are built on a multitude of applications, such as big-data analytics, supply chain, and factory automation. On average, organizations are now 53% digital as they create new ways of operating and growing their businesses, according to the Computerworld 2017 Forecast Study. As part of this transformation, enterprises rely increasingly on multivendor, multicloud environments that mix on-premise, private, and public cloud services and workloads. This shift is causing enterprises to increase network capacity; 55% of enterprises in the Computerworld study expect to add network bandwidth in the next 12 months.
Tags : 
security, automation, savings, technology, cloud
    
Juniper Networks
Published By: Google Cloud     Published Date: Aug 17, 2017
Breakthroughs in artificial intelligence (AI) have captured the imaginations of business and technical leaders alike: computers besting human world-champions in board games with more positions than there are atoms in the universe, mastering popular video games, and helping diagnose skin cancer. The AI techniques underlying these breakthroughs are finding diverse application across every industry. Early adopters are seeing results; particularly encouraging is that AI is starting to transform processes in established industries, from retail to financial services to manufacturing.
Tags : 
    
Google Cloud
Published By: Brocade     Published Date: Sep 07, 2010
There is a significant problem with cloud offerings, namely that they present new challenges to IT managers, both in general security within their own enterprises and in assessing the risk profiles inherent in each cloud offering they might source.
Tags : 
brocade, cloud computing, security, computerworld uk
    
Brocade
Published By: Brocade     Published Date: Sep 07, 2010
The emerging IP-centric Session Initiation Protocol (SIP) will be essential, allowing the creation of more sophisticated web-enabled communication and collaboration tools which benefit office, mobile and home workers.
Tags : 
brocade, ip networking, computerworld uk, ip-centric session initiation protocol, sip
    
Brocade
Published By: Dell     Published Date: Oct 21, 2008
It’s not so much a matter of "if" but "when" for most organizations regarding migration to Windows Vista. Laying the groundwork now for this migration can yield higher ROI than waiting until later. This Computerworld Technology Briefing explains it all.
Tags : 
dell, windows vista, windows, security
    
Dell
Published By: Infoblox     Published Date: Nov 11, 2008
In August 2008, Computerworld invited IT and business leaders to participate in a core network services survey, that included specific questions about their DNS infrastructures and the costs of IP address management. The survey was fielded via targeted broadcasts to Computerworld customers, as well as through an invitation on Computerworld.com. The survey was commissioned by Infoblox, but the data was gathered and tabulated independently by Computerworld Research. The following report represents top-line results of that survey.
Tags : 
network services survey, ip address management, infoblox, dns infrastructures, computerworld research
    
Infoblox
Published By: NetApp     Published Date: Dec 18, 2008
What are your peers doing in terms of virtualizing Exchange? This 2008 Computerworld Research study explores initiatives surrounding virtualizing Microsoft Exchange. It analyzes Exchange 2007 migration and upgrade plans, the many drivers behind virtualizing Exchange, the challenges faced when virtualizing Exchange, the current status of virtualized server environments, and more.
Tags : 
netapp, virtualizing microsoft exchange, virtualization, microsoft exchange, computerworld
    
NetApp
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Jul 11, 2018
Traditional tools of the engineering trade don’t accommodate today’s need for cross-team collaboration. From using different mechanical computer-aided design (MCAD) applications to working on projects with stakeholders located all over the world, engineers have to overcome various obstacles to get the job done. Learn how technology can help streamline communications and collaboration, ultimately setting up your team for success.
Tags : 
leverage, technology, design, collaboration, computer
    
Dassault Systemes SolidWorks Corp.
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
Hewlett-Packard's ProLiant DL360p and DL380p Gen8 rack-optimized servers are the flagship products carrying new tech-nologies and capabilities to market.
Tags : 
intel, tech dossier, proliant, dl360p, dl380p, gen8, severs
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
When Hewlett-Packard set out to develop the next generation of its popular ProLiant server family, a key objective was to dramatically reduce the burden of manag-ing the servers-both individually and in aggregate across the data center.
Tags : 
intel, proliant, gen8, mgmt, efficiency, business technology
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
As IT platforms have grown more sophis-ticated and complex, and as ITenviron-ments have become more converged and virtualized, enterprises' service and support requirements have changed dramatically.
Tags : 
intel, gen8, servers, hp insight online, xeon, tech dossier, proliant, hp proliant, business technology
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
Redefine Expectations in the Data Center
Tags : 
intel, gen8, computer world, servers, data centers, video, free video, business technology
    
Sponsored by HP and Intel® Xeon® processors
Published By: SEPATON     Published Date: Mar 11, 2008
Computerworld research unveils how enterprises are responding to growing data protection challenges. This report benchmarks how an organization’s data protection decisions impact business efficiency – based on a survey of enterprise IT decision-makers. Sponsored by SEPATON.
Tags : 
data protection, computerworld, backup, recovery, sepaton
    
SEPATON
Published By: BlackBerry     Published Date: Jul 17, 2008
Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand. An exclusive Computerworld online survey offers insight into how companies can develop cost-effective strategies for implementing or improving mobile applications and foster an efficient workplace.
Tags : 
blackberry, unified communications, rim, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: SAS     Published Date: Aug 27, 2010
Forget spreadsheets. Organizations that are winning in this down economy are using automated analytical tools to take a more scientific approach to decision making through observation, experimentation and measurement to improve their business processes.
Tags : 
sas, analytics software, business intelligence, data mining, automated analytical tools, computerworld
    
SAS
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile, email, text, sms messaging, mobile messaging, mobilestorm, mobilestorm
    
PKWARE
Published By: Clarus Systems     Published Date: Mar 18, 2008
The recent momentum of Unified Communications (UC) and the disruptive enabling technology of IP Telephony have created a convergence between Voice Engineering and IT departments that is unprecedented - even since the advent of computer telephony integration. However, despite rapid and significant advances within these technologies, many enterprises, even the early adopters, have not fully embraced the alignment of these two worlds.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.