physical

Results 351 - 375 of 482Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 21, 2016
Collaborate with your customers to architect next generation customer experiences across physical and digital worlds
Tags : 
ibm, customer experience, collaboration, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
With a wealth of information readily available online, consumers are now better able to compare products, services and prices—even as they shop in physical stores. When consumers interact with retailers publicly through social media, they have greater power to influence other customers or damage a brand. These and other changes in the retail industry are creating important opportunities for retailers. But to capitalize on those opportunities, retailers need ways to collect, manage and analyze a tremendous volume, variety and velocity of data. If retailers succeed in addressing the challenges of “big data,” they can use this data to generate valuable insights for personalizing marketing and improving the effectiveness of marketing campaigns, optimizing assortment and merchandising decisions, and removing inefficiencies in distribution and operations.
Tags : 
ibm, retail, data, big data, power, stores, interact, social media
    
IBM
Published By: Dell     Published Date: Aug 16, 2013
"VM performance is ultimately determined by the underlying physical hardware and the hypervisor that serves as the foundation for your virtual infrastructure. This foundation has become simpler over the years, but there are still several areas that need to be fine-tuned to maximize the VM performance for your environment. Read the White Paper "
Tags : 
virtual machine performance, performance, virtual machine, virtualization, infrastructure
    
Dell
Published By: Symantec     Published Date: Jul 11, 2017
Symantec CloudSOC Cloud Data Protection allows enterprises to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle. Stay agile, competitive and compliant with the freedom to move sensitive or regulated information to the cloud while retaining physical ownership of encryption keys /token vaults.
Tags : 
cloud data protection, data protection, security, encryption, security infrastructure
    
Symantec
Published By: IBM     Published Date: Dec 02, 2014
In a recent Aberdeen Group Analyst Insight report,1 Asset Management: The Changing Landscape of Predictive Maintenance, a survey of executives states that the number one risk to operations was failure of their critical physical assets —ensuring that they are available, reliable and performing as originally intended. Though, such a risk can become an opportunity. Top-performing companies rely on analytics related to maintenance, safety and replacement equipment to plan for capital expenditures, manage their assets on a daily basis and maximize asset performance.
Tags : 
asset productivity, operational performance, predictive maintenance, operational costs, it management, knowledge management, enterprise applications, business intelligence
    
IBM
Published By: IBM     Published Date: Jan 13, 2016
With deep integration of matching and linking capabilities, application development tools and workflow components, IBM InfoSphere Master Data Management can help deliver a seamless transition from a virtual architectural style to a physical architectural style.
Tags : 
ibm, mdm, linking, data, infosphere, data management, business technology
    
IBM
Published By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development, business technology
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : 
ibm, data, security, virtualization, data management
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running.
Tags : 
    
Group M_IBM Q418
Published By: Cisco     Published Date: Jul 11, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Seagate Technology     Published Date: Apr 14, 2015
Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.
Tags : 
cloud, security, network attached storage system, customization, affordability
    
Seagate Technology
Published By: SWsoft     Published Date: Dec 12, 2006
Using templates, administrators can consolidate OS and application management so that only a single instance of a software package is required and managed on a physical machine regardless of the number of virtual environments that use the software.
Tags : 
virtualization, servers, networking, server virtualization, swsoft, virtualization managment, application management, platforms
    
SWsoft
Published By: HP Virtualization     Published Date: Mar 22, 2010
Simplify operations and maximize efficiency with the HP StorageWorks SVSP. This white paper describes the powerful combination of HP StorageWorks SVSP storage virtualization solution with server virtualization products to produce a more dynamic IT infrastructure that improves efficiencies and simplifies operations. The rapid proliferation of server virtualization technologies (especially VMware) is due to the value of easily consolidating many servers and applications, into a single physical device, allowing many instances to run on a common hardware platform. In this manner, it is possible to take tens-or even hundreds-of underutilized physical servers and consolidate them into a few easy-to-manage servers while maintaining the logical separation between each application.
Tags : 
it economics, storage, server virtualization
    
HP Virtualization
Published By: IBM     Published Date: Apr 04, 2013
Virtualization has moved to the forefront of many organizations’ IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
powervm, x86 based virtualization, performance, independent servers, association costs, it costs
    
IBM
Published By: IBM     Published Date: Apr 26, 2013
Virtualization continues to lead a sea change for enterprise-scale data centers and cloud environments, delivering well-established benefits such as cost savings, reduced physical space and power requirements, simpler and more flexible testing environments, faster server provisioning, and improved return on investment. Yet for many organizations, one of virtualization’s greatest benefits is only now being realized in the form of highly portable and flexible virtual images. Natural extensions of virtualization technology, virtual images help organizations achieve even greater efficiencies and cost savings.
Tags : 
control, virtual, lifecylce, enterprise, data centers, cloud environments, virtualization
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. This white paper discusses how IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure.
Tags : 
reengineering, it discovery, analytics, visualization, interdependencies, it environment, logic, logical relationships, virtual, cloud, logical dependency, logical dependency mapping, aldm, it infastructure
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
In this Research Report, Clabby Analytics takes a closer look at IBM’s Flex System converged architecture. The new Flex System’s advanced blade offering shines compared to its closest rival: traditional blade architecture. Flex System offers superior manageability, faster communications, more storage capacity (using up to eight internal solid state drives [SSDs] per compute node) and better storage management — as well as broader/better physical/virtual system management — than all of today’s leading blade competitors.
Tags : 
clabby analytics, ibm, flex system, architecture, blade architecture, puresystems, pureflex, virtualization
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco
Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention, malware, cyberattack
    
Kaspersky
Published By: Phunware     Published Date: Aug 11, 2014
Mobile devices are streaming millions of location data points in real-time. These data points are extremely valuable in their own right because the very apps that help generate data can also be used to act on insights and deliver relevant messages. Download these insights and examples to turn mobile data into actions.
Tags : 
phunware, mobile, physical marketing analytics, location analytics, business intelligence, space management, customer service, crm, loyalty, analytics for mobile, analytics on mobile, app analytics, app tracking analytics, mobile analytics tool, mobile app analytics, mobile app usage analytics, mobile data analytics, mobile device analytics, mobile location analytics, knowledge management
    
Phunware
Published By: Schneider Electric     Published Date: Oct 04, 2012
A growing number of consolidation efforts have found success consolidating into an existing data center using the effective approach described in this paper.
Tags : 
schneider electric, data center, racks, power, power and cooling, energy savings, data center consolidation, network infrastructure, servers
    
Schneider Electric
Published By: RF Code     Published Date: Sep 03, 2014
In the coming months, RF Code will launch the first of its planned new software tools, which the company says will enable users to add data relating to the physical datacenter to any number of other applications. Click here to get a preview.
Tags : 
rf code, sensor technology, rfid, radio frequency, data center power, power and cooling, energy savings
    
RF Code
Published By: Telx     Published Date: Dec 09, 2014
CIOs are on a constant quest to understand what infrastructure will provide the best fit, at the lowest risk and cost. In today’s evolving data center, defining the proper use of data center assets, and how cloud-based platforms may or may not fit into the mix is critical to business success. With the abundance of cloud offerings in the market place, physical infrastructure is no longer an enterprise IT requirement. Cloud has established itself as an excellent option for infrastructure outsourcing.
Tags : 
telx, data center, network architecture, infrastructure, storage, data center costs, power and cooling, energy
    
Telx
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept