configuration

Results 76 - 100 of 494Sort Results By: Published Date | Title | Company Name
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden. Intel Inside®. Nya möjligheter på utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside, intel core, intel inside, intel inside logotyp, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden. Intel Inside®. Intel otwiera nowe mo?liwo?ci. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Lors de la dernière décennie, les solutions d’infrastructure convergée (CI) ont été utilisées pour mettre en oeuvre l’infrastructure virtualisée sur une configuration trois niveaux emballée, vendue et soutenue en tant qu’entité unique. Au lieu de trois fournisseurs séparés fournissant et prenant en charge les trois niveaux, avec CI, les clients bénéficient d’une commande plus rapide, de déploiements moins sujets aux problèmes et de moins de tâches pour les administrateurs.
Tags : 
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and VMWare
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Lors de la dernière décennie, les solutions d’infrastructure convergée (CI) ont été utilisées pour mettre en oeuvre l’infrastructure virtualisée sur une configuration trois niveaux emballée, vendue et soutenue en tant qu’entité unique. Au lieu de trois fournisseurs séparés fournissant et prenant en charge les trois niveaux, avec CI, les clients bénéficient d’une commande plus rapide, de déploiements moins sujets aux problèmes et de moins de tâches pour les administrateurs.
Tags : 
    
Dell and Nutanix
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Your company is collecting more data than ever before; your customers’ pain points, habits, and desires all flow in and out of your business each second. To mine the most value from that data, and to get the answers you need at a competitive speed, you need to employ server solutions powerful enough to handle complex analytics software. In the Principled Technologies datacenter, we compared a legacy Dell EMC™ PowerEdge™ R720xd powered by Intel® Xeon® Platinum processor’ to the new PowerEdge R740xd (powered by Intel® Xeon® Scalable processors) in three storage configurations: with basic hard drives, with SATA SSDs, and with NVMe SSDs. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Your company is collecting more data than ever before; your customers’ pain points, habits, and desires all flow in and out of your business each second. To mine the most value from that data, and to get the answers you need at a competitive speed, you need to employ server solutions powerful enough to handle complex analytics software. In the Principled Technologies datacenter, we compared a legacy Dell EMC™ PowerEdge™ R720xd powered by Intel® Xeon® Platinum processor’ to the new PowerEdge R740xd (powered by Intel® Xeon® Scalable processors) in three storage configurations: with basic hard drives, with SATA SSDs, and with NVMe SSDs. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Nokia     Published Date: Dec 22, 2015
While business application turn-up on virtual compute platforms takes only minutes, the network configurations to connect your employees at the branch to these applications can take weeks or even months to rollout!
Tags : 
alcatel-lucent, information system, wide area networking, wan, platform, network configuration, networking
    
Nokia
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Microsoft     Published Date: Jul 07, 2016
Every organization and every industry is being transformed by the trend towards cloud and mobility. There is no shortage of narrow point solutions that can provide bits and pieces of the overarching solution you need – but modern IT departments face enough day-to-day challenges without having to constantly fine tune and integrate a bunch of different products. We’ve assembled a step-by-step guide to help you address the challenges you face as you work to go mobile, stay mobile, and protect your data with an end-to-end solution. Download this free e-book to learn: • How application policy relates to providing secure e-mail • How to set up policy for MAM without enrollment apps via application managed policy • How to create device configuration policies for both corporate-owned and personally owned devices • How to authenticate and authorize access to your company resources • How to get end-to-end protection for mobile e-mail up and running in your own environment.
Tags : 
technology, best practices, data, enterprise
    
Microsoft
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Application release automation (ARA) tools enable best practices in deploying and promoting applicationrelated artifacts, properties, configurations and even data across an application lifecycle in a safe, predictable and repeatable manner. Gartner reports that using an ARA tool is key to enabling DevOps and achieving continuous delivery. Wikipedia also defines five dimensions of scalability that can apply to ARA tools: • Administrative scalability • Functional scalability • Geographic scalability • Load scalability • Generational scalability This white paper will explain how each of these criteria is relevant when choosing an ARA product that is capable of scaling along with the growth of your enterprise.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Some SAP systems can take up to 10 days to complete a SAP system copy. That’s 10 days of unproductive time. Why? SAP does not provide the necessary tools out-of-the-box to automate and handle the process efficiently. This means you must use highly skilled SAP BASIS staff to manage the process. Manual steps, along with hundreds of configuration settings, can take days to complete—and like many organizations, you have also experienced too many delays, causing non-production systems to be unavailable, which stalls development, testing and training activities. Opportunity So you’ve concluded your SAP system copy process is hindering innovation and productivity. You’re considering automating the process to ensure system copies are available for all environments on time, every time. Benefits What are the key capabilities you actually need to address SAP system copy inefficiency once and for all?
Tags : 
    
CA Technologies_Business_Automation
Published By: IBM     Published Date: Oct 13, 2016
Compare IBM DB2 pureScale with any other offering being considered for implementing a clustered, scalable database configuration see how they deliver continuous availability and why they are important. Download now!
Tags : 
data. queries, database operations, transactional databases, clustering, it management, storage, business technology
    
IBM
Published By: Qualys     Published Date: Feb 22, 2010
This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
    
Qualys
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : 
network management, network
    
HP - Enterprise
Published By: EMC     Published Date: Apr 15, 2011
This white paper discusses Unisphere for VNXe. It describes the Unisphere for VNXe interface, and explains how an IT generalist can easily complete storage-related tasks using this intuitive, easy-to-use interface.
Tags : 
emc unisphere, vnxe, storage management, connection utility, configuration wizard, cifs, iscsi, nfs
    
EMC
Published By: Dell     Published Date: Feb 02, 2018
VxRail appliances, now leveraging industry leading Dell PowerEdge servers, support business critical applications and workloads in many configurations providing required reliability, availability, flexibility and performance. Every organization has its own set of business critical applications. For instance: - Database applications such as Microsoft SQL server and Oracle - Customer Relationship Management (CRM) applications such as SAP - E-mail applications such as Microsoft Exchange -Collaboration applications, such as Microsoft SharePoint Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, xclarity, server value, system management, automated discovery, configuration management, software development, it management, knowledge management
    
Lenovo
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.