server data

Results 501 - 525 of 680Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
    
VMware
Published By: Acronis Inc.     Published Date: Jul 14, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Tags : 
acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, trial download, software trial, free trial, security, backup and recovery, microsoft exchange, windows, windows server
    
Acronis Inc.
Published By: Acronis Inc.     Published Date: Jul 14, 2009
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. Register below to receive access for a free trial version.
Tags : 
acronis, backup, recovery, server, windows, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, windows server, free trial, demo software, bare metal, virtual backup, data deduplication, security, backup and recovery
    
Acronis Inc.
Published By: Idera     Published Date: Jul 30, 2013
At a very high and overly simplified level, SQL Server performance can typically be distilled down to a question of how well SQL Server is able to utilize Physical Memory (or RAM). For example, a server with a single, 20GB, OLTP database running on a SQL Server with 32GB of RAM will typically perform well – because it’s typically able to keep the entire database in memory
Tags : 
idera, sql, sql tools, server dbas, server management, ram, software development
    
Idera
Published By: Idera     Published Date: Sep 03, 2013
Corruption and other data integrity issues can be scary to deal with, but if you follow the advice and tips provided in this whitepaper, you will limit your exposure to corruption and always be able to take the quickest route to resolution with minimal or no data loss and minimal downtime. Just remember to stay calm and walk through the steps
Tags : 
idera, sql, sql server, data validation processes, data integrity, corruption
    
Idera
Published By: Eaton     Published Date: Jun 01, 2012
Server virtualization empowers businesses to lower hardware spending, simplify administration and boost availability. For IT and facilities managers, however, it introduces challenges and opportunities.
Tags : 
power management, server virtualization, business continuity, data center, virtual machines, server utilization, infrastructure, internetworking hardware, servers, storage virtualization, power and cooling, data center design and management
    
Eaton
Published By: Symantec     Published Date: May 02, 2014
Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, security management, best practices, service management
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
How are savvy CIO's conquering these types of challenges? Find out how in this white paper by vExpert, David Davis
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data, best practices, business intelligence, service management, content management
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, data protection, loss data, virtual environment, virtualization, business intelligence, business management
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data, best practices, business intelligence, business management, content management
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data, security, best practices, business intelligence
    
Symantec
Published By: Citrix     Published Date: Oct 14, 2010
This planning guide provides best practices for virtualizing Citrix XenApp. Even though these best practices are based on the Hosted Shared Desktop model, they are still relevant in a non-desktop model where users only connect to published applications without the desktop interface.
Tags : 
citrix, xenapp, desktop virtualization, hosted shared desktop, windows servers, data centers, servers, storage virtualization, windows server, desktop management, virtualization
    
Citrix
Published By: Symantec     Published Date: Jul 15, 2014
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on the scene, bringing both significant benefits and new challenges. Find out more about this transition to get the most out of your virtual environment.
Tags : 
secure back up, servers, data, network infrastructure, cloud computing, virtualization
    
Symantec
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, wireless, knowledge management, enterprise applications, access control, phishing, software compliance, cloud computing
    
Bitium
Published By: Cisco     Published Date: Aug 18, 2014
Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade, equipment, performance testing, productivity
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified Cisco UCS M1/M2 and HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade, equipment, data center design and management
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : 
ucs, scope, cisco, security, compliance, servers, data, innovative, data center, architecture, performance, processors, blade, equipment
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
The Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, is easier to deploy and more cost-effective than the competition. Results show that with Cisco UCS, you can: Deploy and manage with less hardware Eliminate the need for additional software licensing Reduce your capital expenditure by as much as 22.1%
Tags : 
comparison, flex system, cost-effective, servers, data, innovative, data center, architecture, performance, processors, blade, equipment
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Dive into the key factors that enable Cisco Unified Computing System, powered by the Intel Xeon® processor, to change the way IT organizations work. Download the brief to learn how Cisco UCS can help IT become an integrated, strategic part of your organization.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade, equipment, network performance
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Start planning your deployment of the Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, with this useful, step-by-step design guide. The Cisco UCS Technology Design Guide simplifies the steps to a successful deployment. Four modules guide you through a Cisco engineer-tested framework that addresses typical data center and server issues.
Tags : 
design guide, deployment, computing, servers, data, innovative, data center, architecture, performance, processors, blade, equipment, utility computing, cloud computing
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to a virtual data center. This has been the primary driver in enabling customers to transition to the cloud and ultimately IT as a service. The shift to a virtual data center will be the single biggest transition in the history of computing. It will reshape all the major data center tiers: applications, storage, servers and the network.
Tags : 
data center, consolidation, server virtualization, new applications, it management, data management
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
While this dramatic growth occurs, projections call for the cloud to account for nearly two-thirds of data center traffic and for cloud-based workloads to quadruple over traditional servers. That adds another element to the picture: changing traffic patterns. Under a cloud model, a university, for example, can build its network to handle average traffic volumes but then offload data on heavier trafficked days to a public cloud service when demand dictates, such as when it’s time to register for the next semester of classes.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.