storage

Results 1 - 25 of 1923Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: May 18, 2017
Welcome to IT as a Service For Dummies, IBM Limited Edition. IT as a Service is the emerging technique that gives technology leaders the flexibility of providing the right set of services to the business. The world of IT is changing dramatically. Businesses are increasingly discovering that IT services are becoming the foundation for the customer experience. IT as a Service isnt simply a new delivery model for applications. Instead, IT as a Service is a new approach to providing an array of modular services that are targeted to solve changing business problems. While services can be as straightforward as compute or storage in the cloud, they can also be used to complex solutions. Other services may include microservices or integration services that enable a business to quickly create new solutions to help service customers in a more creative and efficient manner.
Tags : 
service, dummies, ibm, cloud, mobile
    
IBM APAC
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: NetApp     Published Date: Jun 01, 2017
Are misperceptions preventing your company from taking advantage of the cloud? Discover why common objections to cloud backup are based on myths rather than reality.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, cloud storage
    
NetApp
Published By: NetApp     Published Date: Jun 01, 2017
This easy to read eBook examines the benefits of cloud backup solutions and features examples of companies that are using cloud storage to reduce costs and increase operational efficiency.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Jun 01, 2017
This eBook provides an overview of cloud-integrated backup solutions. It shows how you can improve your backup performance and reduce IT costs without sacrificing security.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Jun 01, 2017
Learn how to meet the challenges of managing data across a hybrid cloud. Download this eBook today.
Tags : 
netapp, hybrid cloud storage
    
NetApp
Published By: NetApp     Published Date: Jun 01, 2017
This Forrester report examines the current state of cloud platform standards and provides guidancefor IT professionals who makecloudstrategy decisions.
Tags : 
netapp, forrester report, cloud storage, it data
    
NetApp
Published By: NetApp     Published Date: Jun 01, 2017
This report from 451 Research examines the data management challenges faced by companies in a hybrid cloud environment and provides recommendations for IT professionals responsible for cloud deployments.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, 451 research
    
NetApp
Published By: NetApp     Published Date: Jun 01, 2017
Learn how a Data Fabric can help you combine the performance of all-flash storage with the agility of public and private cloud storage.
Tags : 
netapp, cloud cloud storage, all flash storage
    
NetApp
Published By: OnBase by Hyland     Published Date: May 17, 2017
IT sprawl can be a serious roadblock to your organization's future success, as disconnected information systems and multiple applications get in the way of overall performance. Instead, put sprawl in its place by thinking like an urban planner. In the complimentary e-book, learn how to manage growth with a master plan that uses a single enterprise information platform.
Tags : 
sprawl, application, content, information, management, system, cio, hyland
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: May 17, 2017
Sprawl isnt just a problem for cities. IT sprawl can hurt organizations, too. If left unchecked, multiple systems and platforms can cause inefficiency to rise and customer satisfaction to fall. Instead, think like an urban planner and manage growth with a master plan. In this white paper, see how you can put IT sprawl in its place with a single, scalable information management platform.
Tags : 
sprawl, applications, content, information, management, systems, cio, hyland
    
OnBase by Hyland
Published By: Pure Storage     Published Date: Apr 24, 2017
This Technology Spotlight examines the evolving primary flash array market with a particular emphasis on what next-generation flash-driven enterprise storage architectures will look like. It also looks at the role Pure Storage, with its FlashArray//X, plays in this strategically important market.
Tags : 
flash, flash technology, storage, storage management, flash adoption, migration, business transformation
    
Pure Storage
Published By: Pure Storage     Published Date: Jan 01, 2017
In July 2016, Pure Storage commissioned an independent study, conducted by 451 Research, that surveyed 253 enterprise IT decision-makers responsible for storage technology decisions in order to quantify the business impact that Tier 1 storage had on organizations.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Mar 17, 2017
I&O leaders can no longer rely on the assumption that it is safer to buy from established storage vendors when compared to new suppliers. This research describes what I&O leaders must do to benefit from structural changes in the storage industry.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Apr 24, 2017
This Technology Spotlight examines the evolving primary flash array market with a particular emphasis on what next-generation flash-driven enterprise storage architectures will look like. It also looks at the role Pure Storage, with its FlashArray//x, plays in this strategically important market.
Tags : 
flash, flash technology, storage, storage management, flash adoption, migration, business transformation
    
Pure Storage
Published By: IBM     Published Date: May 22, 2017
Only a handful of industries have been transformed by the digital age the way banking has. Internet and mobile banking, digital wallets, and a raft of new and innovative products have redefined the bank from a local, brick-and-mortar branch to an anytime-anywhere process. The new banking environment has opened opportunities for national, regional, and community banks alike, which are no longer constrained to serve only customers located in the areas where they maintain a physical branch presence. But it has also brought challenges associated with collecting, processing, analyzing, storing, and protecting vast amounts of new data, from multiple locations and sources.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
IBM
Published By: IBM     Published Date: May 22, 2017
An investment firm is only as good as its data and its ability to leverage that data to make smart trades. A firms ability to differentiate itself in meeting market needs and bringing new products to market all hinge on its ability to squeeze maximum value out of all available data. But when it comes to implementing the right technology and processes to support a data-reliant business, those three factors present tremendous challenge
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
IBM
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system, storage management, sap
    
Bell Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system, network performance management, storage management
    
Bell Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture, storage area networks, storage management, storage virtualization
    
Bell Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv, network architecture, server hardware
    
Bell Micro
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Securely store and share your firm's and your clients' tax information data. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Protect your data and reputation while meeting clients cybersecurity expectations Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorised person has accessed your files. Have clients PDF files cracked by hackers in minutes.
Tags : 
password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration
    
Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.