power system

Results 201 - 225 of 350Sort Results By: Published Date | Title | Company Name
Published By: IBM Corporation     Published Date: May 22, 2012
This paper describes the benefits of consolidating from HP servers to an IBM PureFlex System in a SAP application environment with six industry examples. Learn about the cost reductions through the use of IBM PureFlex System.
Tags : 
sap, cloud computing, pureflex systems, sap lvm, virtualization, distinctive power systems, lpars, ibm pureflex system, workload partitions, vios, business technology
    
IBM Corporation
Published By: IBM     Published Date: Jul 05, 2012
Organizations adopting the IBM SPSS Collaboration and Deployment Services 4.2 can be affected by many variables. Read the white paper which explores the best practices and characteristics of running the software on a POWER7 platform, and learn how this can influence performance optimization and scalability.
Tags : 
ibm, technology, sap, sofrware, technology, migration factory, storage, best practices, spss, analytical applications, business intelligence, business technology
    
IBM
Published By: IBM     Published Date: Jul 05, 2012
IBM Cognos BI offers complete perspectives on business intelligence and analytics through a single, unified workspace. Read the white paper and see how Power Systems runs Cognos BI applications-on distributed or consolidated servers-for greater business value as well as improved availability, virtualization, performance and energy efficiency.
Tags : 
ibm, technology, sap, sofrware, technology, migration factory, storage, business technology, virtualization, infrastructure
    
IBM
Published By: IBM     Published Date: Oct 01, 2012
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher
Tags : 
disaster recovery, backup and recovery, ibm power systems, automated virtualization management, virtualization, downtime, mission-critical applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 01, 2012
ITIC asserts that IBM's latest Linux-only Power Systems offer current and prospective Big Blue customers high performance and reliability for physical and virtualized environments at an extremely aggressive price point.
Tags : 
server virtualization, linux, ibm, virtualized environments, business technology
    
IBM
Published By: CDW     Published Date: Apr 04, 2016
Self-service is an advanced element of private cloud environments that improves management efficiency and business agility, as well as lowering operating expenses. A self-service environment streamlines the interaction between users and the IT department. It empowers internal consumers of IT services to request and receive appropriately configured resources on demand with minimal IT intervention. NetApp® OnCommand® Workflow Automation, the NetApp Management SDK with open APIs, and key ecosystem partnerships enable enterprises to easily integrate their orchestration solutions and custom management tools with the NetApp storage service catalog for automated storage provisioning and protection. Customers can thereby create a self-service, web-based portal that efficiently delivers IT as a service to virtualization administrators, application administrators, and users, while enabling IT staff to focus on higher value activities.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, business intelligence, data center
    
CDW
Published By: Plantronics     Published Date: Oct 18, 2013
Emerging technologies empower, but they can also confuse. Workers in the new mobile landscape struggle to manage communications with mobile phones, landlines, VoIP calls and different voicemail boxes, email, IM, text messages and social networking applications. Unified Communications is the answer. It’s the bridge between all these communication systems helping manage communications with one interface.
Tags : 
plantronics, office environment, unified communications, emerging technologies empower, manage communications, audio quality, communication channels, acoustic technology, working offsite, b2b communication, telecommuting, plantronics audio devices, plantronics technology, ergonomic innovations, acoustic intelligence, networking, wireless, knowledge management, electronics
    
Plantronics
Published By: CDW - NetApp     Published Date: Apr 07, 2016
Self-service is an advanced element of private cloud environments that improves management efficiency and business agility, as well as lowering operating expenses. A self-service environment streamlines the interaction between users and the IT department. It empowers internal consumers of IT services to request and receive appropriately configured resources on demand with minimal IT intervention. NetApp® OnCommand® Workflow Automation, the NetApp Management SDK with open APIs, and key ecosystem partnerships enable enterprises to easily integrate their orchestration solutions and custom management tools with the NetApp storage service catalog for automated storage provisioning and protection. Customers can thereby create a self-service, web-based portal that efficiently delivers IT as a service to virtualization administrators, application administrators, and users, while enabling IT staff to focus on higher value activities.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, it management, knowledge management, enterprise applications, data management, business technology
    
CDW - NetApp
Published By: Zebra Technologies     Published Date: Jul 19, 2017
Whether you’re in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : 
device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services, consumer devices, security support, android security support, one touch access, scanning, right devices, data capture, durability, touch computer, mobile computers, powerful computing performance, mobile device management
    
Zebra Technologies
Published By: CradlePoint     Published Date: May 17, 2016
Always-on Connections for Store Networks and Powering Intelligent Systems In the fast-paced world of retail, network reliability is everything—but so are security, agility, and cost-effectiveness. Retailers want it all, and they depend on their IT administrators to balance these needs. Whether it’s ensuring an always-on connection for store networks, powering intelligent systems aimed at swaying buyer behavior, or transmitting real-time analytics to inform marketing and inventory decisions, the bedrock of successful retailing is a network that can support the growing list of mission-critical applications dependent on secure Internet connectivity. In the past, finding a solution to balance these demands has been difficult at best. Less expensive wired options like DSL mean hours of downtime each month. Alternatives like T1 connections deliver more uptime but carry a price tag that usually puts large-scale distributed deployments out of reach.
Tags : 
    
CradlePoint
Published By: Cornerstone OnDemand     Published Date: Sep 13, 2016
Why It’s Time to Retire Your Traditional L&D Strategy (and Your Social One, Too) You’ve heard it a hundred times. Continuous learning is critical to your talent management strategy—and your organization’s bottom line. To that end, you’ve invested in a powerful learning management system (LMS) and social tools, not to mention great content.
Tags : 
    
Cornerstone OnDemand
Published By: Concentric     Published Date: Mar 27, 2009
Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.
Tags : 
concentric, email options, critical utility, killer app, small and mid-sized businesses, smbs, on-premise email solution, on-premise email costs, hardware costs, software costs, labor costs, resiliency, failover capability, concentric hosted exchange, microsoft® exchange 2007, outlook web access, owa, blackberry, activesync, pop3
    
Concentric
Published By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net, windows 7, web services, visual user interface, datawindow, j2e, win32, .net frameworks, business application, wpf, corporate governance
    
Sybase PowerBuilder
Published By: IBM     Published Date: Oct 10, 2012
A Comparison of PowerVM and VMware vSphere (4.1 & 5.0) Virtualization Performance.
Tags : 
it infrastructure, data, virtualization, servers, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 10, 2012
It is clear that we live in a land of the survival of the fittest. This same scenario is certainly not news to the CIO of any enterprise data center, especially in the data center with a mission-critical infrastructure.
Tags : 
it infrastructure, data, servers, unix, ibm, business technology, data center
    
IBM
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications
    
Salesforce.com
Published By: Riverbed     Published Date: Jul 11, 2017
Modern businesses are powered by an increasingly complex and distributed assortment of apps, networks, systems, and services. As a result, IT organizations need performance management expertise to maximize business performance and enable successful cloud-first and digital transformation strategies.
Tags : 
performance management, expert, riverbed, digital transformation
    
Riverbed
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: OKTA     Published Date: Mar 30, 2018
"As a modern organization, you embrace powerful new cloud apps to fuel your organization's growth. You know adopting, using and even building the best technologies will be a big driver for your future success. But did you realize that identity is the lynchpin for the modern cloud ecosystem? It's the new security standard in a world where there is no perimeter anymore. We've talked with technology and security leaders from small to large enterprises and organizations across every industry. You'll want to know the five key elements of an identity solution they said you need to have."
Tags : 
    
OKTA
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: Schneider Electric     Published Date: May 09, 2016
IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure (DCPI). Higher power densities that often result can challenge the cooling capabilities of an existing system. Reduced overall energy consumption that typically results from physical server consolidation may actually worsen the data center’s power usage effectiveness (PUE). Dynamic loads that vary in time and location may heighten the risk of downtime if rack-level power and cooling health are not understood and considered. Finally, the fault-tolerant nature of a highly virtualized environment could raise questions about the level of redundancy required in the physical infrastructure. These particular effects of virtualization are discussed and possible solutions or methods for dealing with them are offered.
Tags : 
schneider electric, edge computing, data center, energy efficiency, data center energy, optimized power, virtualization
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept