shared resources

Results 1 - 13 of 13Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Dec 05, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions in a Software as a Service (SaaS) model to more than 2,800 customers with employees in 150 countries. “Storage has always been Ultimate’s biggest technology challenge" according to Senior Director of Cloud Operations, Steven May. The company’s storage goals revolve around managing growth while combining the economics of leveraging shared resources on demand with the performance and predictability of dedicated infrastructure. Seeking high IOPS performance, fault tolerance, and scalability, along with a high availability solution that supports both VMware and OpenStack, Ultimate's search led them to SolidFire.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Sep 29, 2014
California is the world’s eighth-largest economy, and its IT challenges exceed those of many national governments. That was particularly true during the budget crisis that began in 2008. In the face of severe budget cutbacks, state agencies needed to radically change the way they operated to keep meeting their missions to serve citizens. The State of California sets a new standard for IT with Shared Services. Learn how the California Natural Resources Agency harnessed the power of cloud computing to reduce IT capital costs by 42% and speed up service delivery by 70%.
Tags : 
it challenges, it standard, it capital costs, speed up service deliver, shared services, it management
    
NetApp
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
Buying a server is a logical step for many companies that want to better organize their data and improve access to shared resources.
Tags : 
server, data, organize, shared resources, small business, security, software development
    
Dell & Microsoft
Published By: Alert Logic     Published Date: May 23, 2019
Securing web applications in the AWS cloud environment relies on the cloud service provider and the customer working together in a shared responsibility model. Effective security for web applications on AWS requires full visibility into the environment in which the apps live, while also proactively monitoring for attacks without causing delays in application development and delivery. For some customers this may be a challenge due to limited personnel resources or expertise. This is where Alert Logic can help. We will automatically show you why, where, and how to respond to vulnerability findings and provide you with short- and long-term recommendations to stop active attacks. To help guide the way, following are key considerations for providing sound web application security running on the AWS cloud.
Tags : 
    
Alert Logic
Published By: MobileIron     Published Date: Feb 14, 2019
User works in an area that does not have Internet connectivity but still connects to a private network with shared resources that can contain threats
Tags : 
    
MobileIron
Published By: EMC Corporation     Published Date: Dec 01, 2014
The following paper opens with the evolution of the Software-Defined Data Center and the challenges of heterogeneous storage silos in making the SDDC a reality. It continues by introducing EMC ViPR Software-Defined Storage and details how it enables enterprise IT departments and service providers to transform physical storage arrays into pools of virtual shared storage resources enable the delivery of innovative data services across arrays.
Tags : 
data center, software-defined storage, enterprise it departments, virtual shared storage
    
EMC Corporation
Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable
    
HP
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: Arkadin     Published Date: Sep 11, 2013
Unified Communications (UC) transforms the workplace, making it more productive, efficient and effective. Hosted UC service providers remotely deliver and manage various communications services using shared resources enabling customers to consolidate and outsource much, or possibly all, of their communications and collaborations needs for a fixed monthly cost. This whitepaper details the top reasons to consider a hosted unified communication solution for your enterprise.
Tags : 
unified communication, unified collaboration, enterprise unified communication, hosted unified communication, hosted uc, hosted ucaas, uc total cost of ownership, uc tco
    
Arkadin
Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace
Published By: Rackspace     Published Date: Jan 19, 2016
Many companies want to take advantage of public cloud features, but aren’t willing to compromise on the performance, security and control that they require for their business applications and data. Public clouds have the potential to introduce performance issues caused by “noisy neighbors,” security concerns associated with placing sensitive data in a shared infrastructure environment, and a lack of control driven by the inability to customize and fine-tune cloud resources to meet the needs of a given application.
Tags : 
rackspace, private cloud, enterprise, application, data, software development, data management
    
Rackspace
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization introduces new challenges for managing your data center. Applications now compete for shared resources such as storage, CPU cycles and memory, often causing performance bottlenecks and unhappy customers. This paper details 20 metrics that indicate when capacity issues are occurring and recommends a corresponding tool that will analyze the data and resolve your VM performance issues. Read the White Paper "
Tags : 
vmware, metrics, virtualization, bandwidth management, backup and recovery, infrastructure
    
Dell
Published By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
    
Vision Solutions
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.