configuration

Results 101 - 125 of 494Sort Results By: Published Date | Title | Company Name
Published By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management, knowledge management
    
Lenovo
Published By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
    
Okta
Published By: Oracle ODA     Published Date: Aug 15, 2016
DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business.
Tags : 
    
Oracle ODA
Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite
Published By: Workday     Published Date: Jul 19, 2017
The shift to SaaS is gaining momentum and there are clear business benefits that can be derived. To optimise success, transformation strategies need to encompass all elements of people, processes, technology and organisational design. Adopting SaaS technologies drives significant change to the way organisations operate – from business processes to support model design and company culture. The implications of cloud adoption and technical challenges such as integrations, data migration and configuration must be fully understood and addressed from the outset.
Tags : 
finance technology, communication processes, protocols, interaction management, relations, technology, cloud
    
Workday
Published By: ServiceNow     Published Date: Oct 22, 2018
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
cmdb, deployment, management, servicenow
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 22, 2018
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
cmdb, servicenow, discovery, infrastructure, data, visibility
    
ServiceNow
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and from Hewlett Packard Enterprise (HPE). The goal was to assemble the products of each vendor strictly according to their reccomended designs, and using their respectice software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Nov 30, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle Dyn
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: Juniper Networks     Published Date: Feb 01, 2016
Read this report from IDG to see how Juniper Networks can help in several ways: • Simplify at the data center, campus, and branch levels • Protect the edge via the cloud • Centralize functions like configuration, provision, management, and more
Tags : 
    
Juniper Networks
Published By: Rackspace     Published Date: Jan 09, 2012
This whitepaper discusses the IT challenges enterprises face and how the Cloud can help overcome those challenges. It then defines different Cloud configurations and provides guidance on enterprise decision-making regarding Cloud applications and platforms.
Tags : 
rackspace, technology, cloud computing, enterprise applications, data center
    
Rackspace
Published By: Absolute Software     Published Date: Nov 21, 2011
Like most IT teams, LIAI technicians are committed to optimizing staff productivity. With the organization steadily growing and IT demands increasing, maintaining this commitment proved challenging. They needed began to minimize the burden of administrative duties and maximize IT efficiency.
Tags : 
la jolla, absolute, immunology, productivity, it demands, efficiency, liai, resources, resource allocation, configuration, software, hardware, requirements
    
Absolute Software
Published By: PC World     Published Date: Jul 02, 2012
Choosing a proven architecture designed by Dell to meet your needs allows you to confidently deploy an optimal solution without the time requirement and hassle of compiling your hardware
Tags : 
dell, pc world, reference configurations, business technology
    
PC World
Published By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : 
mobile, global, applications, cloud, configuration, technology, knowledge management, storage, data center
    
NetApp
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Oracle CPQ BB     Published Date: Feb 05, 2016
Configure, Price, Quote. It sounds simple, but what happens when you have thousands of products, complex pricing calculations, a lengthy approval process, and sales reps that just don't have the time to worry about it all? Depending on who drags their feet, getting a quote to an interested customer can take weeks. Even when the proposal is complete, what makes sure that the product configuration is valid, or that the pricing calculations are correct? That's where Oracle Configure, Price, and Quote (CPQ) Cloud comes in, the proven CPQ leader. Enterprise and midsize businesses around the world have eliminated human error and quote turn-around time by automating their configuration and quoting processes with Oracle CPQ Cloud.
Tags : 
    
Oracle CPQ BB
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Oracle     Published Date: Feb 14, 2017
In this brief, we describe integrated CPQ applications and their potential benefits.
Tags : 
b2b sales, sales management, sales performance management, integrated applications, configuration, pricing, quoting
    
Oracle
Published By: Concur ENT     Published Date: Nov 07, 2017
Concur’s Audit services provide a thorough, objective, third-party review without office politics or a strain on internal resources. Businesses have saved time and money by redirecting those resources into other valuable activities, while turning audits around efficiently and accurately. Visit concur.co.uk/expense-audit or call Features outlined in this report may differ between Standard 01628 645100 to learn more.
Tags : 
auditing, configuration, reporting, data, email reminders, communication, concur
    
Concur ENT
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.