• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr infrastructure

Results 126 - 150 of 260Sort Results By: Published Date | Title | Company Name
By: FORTRUST     Published Date: Jul 07, 2015
Now that the technology sector as a whole is becoming increasingly user friendly, transparent and hands on, it makes sense for colocation data centers to offer a higher level of insight and transparency into their clients’ individual environments.
Tags : 
fortrust, colocation, dcim, data center infrastructure, data center operations, infrastructure, internetworking hardware, network architecture, storage virtualization, server virtualization, data deduplication, colocation and web hosting
    
FORTRUST
By: IBM     Published Date: Jul 07, 2015
Through the IBM Network Innovation Centers, IBM brings together networking services and technology capabilities together to demonstrate infrastructure agility.
Tags : 
demonstrations, network innovation, networking solutions, interoperability, manageability, scalability, performance, networking, data management, business intelligence, business management
    
IBM
By: Altiscale     Published Date: May 28, 2015
Big Data technologies are maturing and quickly moving into the next phase - one that expands in data use-cases as Hadoop moves into more influential roles throughout IT infrastructures. In this just-released report, Gartner is recognizing four Big Data vendors as "cool." Gartner says these vendors can meaningfully and synergistically combine multiple types of functionality.
Tags : 
big data, vendors, functionality, cool vendors, consistent performance, it management, data management; add - gartner, hadoop, data management
    
Altiscale
By: Cisco     Published Date: May 14, 2015
This document guides you through the planning, design, and deployment of data center infrastructure based on the Cisco Nexus 9500 platform, helping you migrate your data center to this new platform.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, load balancing, network performance, network performance management, servers, data center design and management
    
Cisco
By: Aerohive     Published Date: May 14, 2015
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
mobile computing, mobile data systems, mobile workers, wireless infrastructure, wireless phones
    
Aerohive
By: VMware SD-WAN by VeloCloud     Published Date: May 13, 2015
Almost every IT and business leader today is focused on creating a more agile business. The ability to adapt immediately to business climate changes is now the basis for competitive advantage, and it will determine which companies will thrive and leapfrog their competitors and which ones will face becoming irrelevant. However, business agility cannot be achieved without having an agile IT infrastructure to enable it. This is one of the reasons why businesses have spent billions of dollars on technology to make IT more agile.
Tags : 
wan, software, zk research, cloud, apps, it management
    
VMware SD-WAN by VeloCloud
By: Red Hat     Published Date: May 05, 2015
It's time to manage all your VMware machines through 1 tool. Red Hat® CloudForms gives you visibility and control throughout your whole infrastructure—from individual VMware machines to your entire cloud and virtualization infrastructure. Download the technology brief to learn more.
Tags : 
redhat, cloud management, vmware environments, virtualization infrastructure, visibility, it management, knowledge management, data management
    
Red Hat
By: Dell     Published Date: May 04, 2015
Read this white paper and learn how: • Cloud technology bridges the gap between IT and the business, but on-premises cloud deployments often offer a lower TCO than the public cloud. • Dell enables organizations to create and manage cloud solutions customized to unique needs. • Organizations have several options for building a cloud infrastructure based on Dell solutions. • In the realm of cloud computing, Dell differentiates itself through servers, storage, networking, and integration with infrastructure and management tools. • Implementing a cloud environment requires stakeholder identification, as well as resources and capabilities.
Tags : 
    
Dell
By: Equinix     Published Date: Mar 26, 2015
The businesses that thrive amid fluctuating technology demands are not only keeping a finger on the pulse of current trends, they have the infrastructure in place to handle whatever changes might come. And they’re doing so by treating their data centers as a strategic asset—a hub from which providers and performance can all stem. Are you ready for what’s next? According to analyst forecasts and IT executives, the five key trends affecting our state of technology are mobility, consumer technology, cloud services, hyperdigitization and globalization. In the following pages, you’ll learn how these trends are affecting current networks, and why a strategic data center is key to not only surviving, but thriving, today and in the future.
Tags : 
technology demands, infrastructure, mobility, consumer technology, cloud services, hyperdigitization, globalization, it management
    
Equinix
By: VMTurbo     Published Date: Mar 25, 2015
Managing the Economics of Your Virtualized Data Center The average datacenter is 50% more costly than Amazon Web Services. As cloud economics threaten the long-term viability of on premise data centers, the survival of IT organizations rests solely in the ability to maximize the operational and financial returns of their existing infrastructure. You will survive, and this brand new whitepaper will help you to follow these 4 best practices: - Maximize the efficiency of your virtual data center. - Optimize workload placement within your clusters. - Reclaim unused server capacity. - And show your boss that this saves money.
Tags : 
datacenter costs, virtualized data center, amazon web services, cloud economics, server capacity, it management, knowledge management, enterprise applications
    
VMTurbo
By: ServiceNow     Published Date: Mar 24, 2015
It’s the backbone of the modern enterprise, not just another function within it. For businesses to continue to succeed in an increasingly technology-dependent world, CIOs must assume a strategic leadership role and drive change throughout the enterprise. Driving business strategy is not an entirely new role, but it is an added responsibility to the traditional CIO job function. While many CIOs possess the skills and ambition to impact business strategy, existing IT operational models and an aging infrastructure are holding them back. CIOs who have been successful in bridging the divide between IT and the business did it by ?rst accelerating IT transformation.
Tags : 
modern enterprise, technology dependent, business strategy, it transformation, it management, enterprise applications
    
ServiceNow
By: Polycom     Published Date: Mar 13, 2015
United Bank for Africa (UBA) Group is one of Africa’s leading financial institutions offering banking services to more than seven million customers via 750 branches in 18 African countries. With further offices in New York, London and Paris, UBA is connecting people and businesses across the world through retail and corporate banking, innovative cross-border payments, trade finance and investment banking. Over the past three years, UBA had undergone a period of rapid expansion that had seen affiliate banks in 16 African countries come on board. This expansion has naturally put the group’s communication infrastructure under pressure.
Tags : 
investment, security, financial transmission, profits, innovative technology, unified communication, data management
    
Polycom
By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
By: Nexsan by Imation     Published Date: Feb 26, 2015
Ballooning data growth and ever-shrinking IT budgets have combined to push higher-density disk arrays to the forefront for almost any organization contemplating investment in new backup solutions. That’s not surprising; after all, the promise of more backup capacity and performance in less data center real estate sounds irresistible to anyone seeking greater efficiency and cost-effectiveness from their existing IT infrastructure.
Tags : 
imation, nexsan, storage, backup, backup and recovery, backup costs, network performance, storage management, email security, it spending, return on investment, total cost of ownership
    
Nexsan by Imation
By: HP     Published Date: Feb 20, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection, database security
    
F5 Networks Inc
By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box
By: Jive     Published Date: Feb 12, 2015
Relive this webinar with leading industry analyst Brian Vellmure. Flanked by seasoned CIOs (and Jive customers) Tony McGivern of FICO and Patrick O’Hare of Spectrum Health, Brian explores how CIOs are taking the lead in guiding their organizations through a rapidly evolving technology landscape. Topics covered include: • Navigating internal politics to overcome technological inertia • Choosing infrastructure and platforms that allow rapid technology adoption at scale • Shifting focus to exploit a fundamentally different technological landscape • Balancing and evolving the role of CIOs from cutting costs to driving business strategy
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
By: HPE     Published Date: Feb 11, 2015
This assessment is composed of a core set of comparative questions, and the option to be assessed in any of three key areas: computing economics, service delivery and business performance. After a half-decade of cost cutting and shrinking IT budgets, the compute infrastructure that powers the enterprise now is typically inefficient, slow and not optimized for business outcomes. It is better suited to the economic realities of 2010 rather than the rigors of the application workloads, delivery models & business expectations of today driven by cloud, mobility, security and big data megatrends. As a result, there is a significant gap between what businesses expect from technology and what IT can deliver.
Tags : 
    
HPE
By: HP     Published Date: Feb 02, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
By: HP     Published Date: Feb 02, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
By: Exablox     Published Date: Jan 27, 2015
Object-based storage (referred to as OBS throughout this document) platforms continue to perpetuate cloud and enterprise IT infrastructure. As businesses move toward petabyte-scale data storage, OBS solutions are turning out to be the right choice for balancing scale, complexity, and costs. By way of their core design principles, OBS platforms deliver unprecedented scale at reduced complexity and reduced costs over the long term. Early OBS platforms suffered from "necessity crisis," were too cumbersome to deploy and, in some cases, caused a platform lock-in because of their proprietary access mechanisms. In spite of their from-the-ground-up design, a departure from how traditional SAN and NAS arrays are deployed and, more importantly, a lack of standard interfaces made it difficult for IT organizations to deploy OBS solutions in the infrastructure. Thanks to Amazon S3 and OpenStack Swift becoming de facto access interfaces, this situation has changed.
Tags : 
network attached storage, nas arrays, storage efficiency, idc storage marketscape, storage data resiliency, storage platform scalability, exablox, oneblox, it management
    
Exablox
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter