configuration

Results 126 - 150 of 536Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Oct 22, 2018
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
cmdb, servicenow, discovery, infrastructure, data, visibility
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 13, 2019
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 13, 2019
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 24, 2019
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
servicenow, cmdb, stages, foundation, infrastructure
    
ServiceNow
Published By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : 
data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics
    
Attunity
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and from Hewlett Packard Enterprise (HPE). The goal was to assemble the products of each vendor strictly according to their reccomended designs, and using their respectice software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Nov 30, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle Dyn
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Juniper Networks     Published Date: Feb 01, 2016
Read this report from IDG to see how Juniper Networks can help in several ways: • Simplify at the data center, campus, and branch levels • Protect the edge via the cloud • Centralize functions like configuration, provision, management, and more
Tags : 
    
Juniper Networks
Published By: Rackspace     Published Date: Jan 09, 2012
This whitepaper discusses the IT challenges enterprises face and how the Cloud can help overcome those challenges. It then defines different Cloud configurations and provides guidance on enterprise decision-making regarding Cloud applications and platforms.
Tags : 
rackspace, technology, cloud computing, enterprise applications, data center
    
Rackspace
Published By: Absolute Software     Published Date: Nov 21, 2011
Like most IT teams, LIAI technicians are committed to optimizing staff productivity. With the organization steadily growing and IT demands increasing, maintaining this commitment proved challenging. They needed began to minimize the burden of administrative duties and maximize IT efficiency.
Tags : 
la jolla, absolute, immunology, productivity, it demands, efficiency, liai, resources
    
Absolute Software
Published By: PC World     Published Date: Jul 02, 2012
Choosing a proven architecture designed by Dell to meet your needs allows you to confidently deploy an optimal solution without the time requirement and hassle of compiling your hardware
Tags : 
dell, pc world, reference configurations, business technology
    
PC World
Published By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : 
mobile, global, applications, cloud, configuration, technology, knowledge management, storage
    
NetApp
Published By: Okta     Published Date: Jul 19, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Oracle CPQ BB     Published Date: Feb 05, 2016
Configure, Price, Quote. It sounds simple, but what happens when you have thousands of products, complex pricing calculations, a lengthy approval process, and sales reps that just don't have the time to worry about it all? Depending on who drags their feet, getting a quote to an interested customer can take weeks. Even when the proposal is complete, what makes sure that the product configuration is valid, or that the pricing calculations are correct? That's where Oracle Configure, Price, and Quote (CPQ) Cloud comes in, the proven CPQ leader. Enterprise and midsize businesses around the world have eliminated human error and quote turn-around time by automating their configuration and quoting processes with Oracle CPQ Cloud.
Tags : 
    
Oracle CPQ BB
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Today’s software and systems engineers are being challenged to balance speed of delivery with improving quality, reducing cost and minimizing risk. Managing changes to code and configurations through development, staging, user acceptance and production environments can be challenging. Having more “production-like” environments that can be controlled and serviced by the development team can add value, eliminate waste and speed delivery. Creating such environments can eliminate risk because more errors can be found well ahead of production deployment when they are less costly to fix. IBM can help you adopt agile methods improve your execution and deliver high-quality software for better business results
Tags : 
    
Group M_IBM Q3'19
Published By: Oracle     Published Date: Feb 14, 2017
In this brief, we describe integrated CPQ applications and their potential benefits.
Tags : 
b2b sales, sales management, sales performance management, integrated applications, configuration, pricing, quoting
    
Oracle
Published By: Concur ENT     Published Date: Nov 07, 2017
Concur’s Audit services provide a thorough, objective, third-party review without office politics or a strain on internal resources. Businesses have saved time and money by redirecting those resources into other valuable activities, while turning audits around efficiently and accurately. Visit concur.co.uk/expense-audit or call Features outlined in this report may differ between Standard 01628 645100 to learn more.
Tags : 
auditing, configuration, reporting, data, email reminders, communication, concur
    
Concur ENT
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.