atas

Results 201 - 225 of 268Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corp.     Published Date: Jan 16, 2013
In its third decade of reliable performance across tens of thousands of deployments, Oracle Tuxedo is one of the world’s most respected high-end computing platforms.
Tags : 
oracle, 12c datasheet, application infrastructure, exalogic
    
Oracle Corp.
Published By: Backupify     Published Date: Jul 15, 2013
The data that resides within Salesforce.com is arguably some of an organization’s most valuable data for all current and future revenue – including contacts, purchase history, lead information, reports on prospects, sales quotes, signed contracts, and customer invoices. Salesforce has a robust data center and the infrastructure to protect your data from hardware failure, even on a catastrophic scale. However, it does not protect you from user error or data being overwritten.
Tags : 
roi, salesforce, backup, calculate, data center
    
Backupify
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail
    
Aventail
Published By: DataSynapse     Published Date: Feb 26, 2007
Today's business drives application use, but it is how these applications are deployed and managed that can deliver differentiation value to the business. Whether your challenge is one of scale, optimization, heterogeneity or complexity – learn how flexibility can be built in at the application layer.  Download this analyst bulletin today!
Tags : 
application integration, desktop management, analytical applications, enterprise applications, application performance management, datasynapse, data synapse, application layer
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
Business continuity and disaster recovery are made more difficult by the pace of business change.  Adapting to market changes requires proactive IT. For the first time, you can consolidate business continuity and disaster recovery (DR) planning in a heterogeneous IT environment with a single, central automated solution. 
Tags : 
disaster recovery, backup and recovery, business continuity, business process automation, server virtualization, server automation, datasynapse, data synapse, enterprise applications, application integration
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
High availability (HA) configurations seek to bring downtime to zero - but can increase complexity across the IT organization, often in the form of excess technology, financial, and human capital investments.  Learn how application virtualization can reduce planned and unplanned downtime, and deliver greater flexibility.
Tags : 
high availability, it management, productivity, total cost of ownership, return on investment, configuration management, flexibility, data synapse, datasynapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This brief examines how application virtualization can compress the development and test cycle, accelerating time-to-market, while reducing risk and complexity.  This brief highlights the impact of centralized command and control of application deployment and execution.
Tags : 
software development, quality assurance, software testing, return on investment, project management, data synapse, datasynapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse, datasynapse
    
DataSynapse
Published By: IBM     Published Date: Dec 03, 2008
Affordable System x Express servers from IBM include features designed to keep your data safe and rapidly accessible. This e-kit includes white papers, datasheets and product guides for individual products, as well as overviews that help you compare systems and storage solutions so you can choose what works best for your business.
Tags : 
ibm express seller, data protection, security, ibm, data security, storage solutions
    
IBM
Published By: Magonaga     Published Date: Jan 17, 2007
This white paper examines how the failure to structure equitable relationships, establish ethical foundations for action and correct blinding group think led to the catastrophic death of a specific corporate organism.
Tags : 
corporate culture, team dynamics, project management, team management, people management, magonaga
    
Magonaga
Published By: PdMA Corporation     Published Date: Jun 23, 2008
In this paper we present three case studies using online and offline motor analysis to prevent catastrophic motor failures. The online and offline analysis in our case studies use a battery of standard electrical tests including Current Signature Analysis (CSA) and Demodulated Current Spectrum Analysis (DCSA).
Tags : 
scm, battery, production, pdma
    
PdMA Corporation
Published By: Recom     Published Date: Feb 06, 2009
“Medical grade DC/DC converters” is an often used, but more often abused, description of a class of converters that are increasingly in demand. What are actually the particular requirements that medical applications place on DC/DC converters?
Tags : 
recom, dc/dc converters, medical applications, dc/dc transformer, recom datasheets, isolation
    
Recom
Published By: VMware     Published Date: Feb 20, 2009
Hopefully your business will never have to experience a major disaster. But having an effective disaster recovery plan with sufficient documentation, adequate testing, and well trained staff will increase your chances of survival when faced with a minor or major catastrophe.
Tags : 
vmware, disaster recovery plan, threats, viruses, worms, trojans, smb
    
VMware
Published By: MedAssurant, Inc.     Published Date: Aug 31, 2010
Case Study: Beyond "Clinically Enriched Administrative Data": Using Patient- Specific Datasets to Drive Rapid Clinical & Financial Improvements
Tags : 
medassurant, medical informatics, health care, healthcare, dataset, medical claims data, patient management, administrative datasets
    
MedAssurant, Inc.
Published By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : 
data mining, missing values, techniques, diagnosis, tips, missing data, technology
    
Discovery Corps, Inc
Published By: Dell Storage     Published Date: Apr 21, 2011
The Dell Compellent vSphere Plug-In currently under development will enable data center administrators to manage many aspects of Dell Compellent Fluid Data storage directly through the VMware vSphere client. This demo video shows how to leverage the integration to provision and map storage volumes for VMFS datastores, create storage profiles for automated tiering and continuous snapshots, and recover datastores to virtually any point in time - all through a single interface. (4 min)
Tags : 
dell compellent, server, storage, vmware vsphere, integration, compellent vsphere plug-in, fluid data storage
    
Dell Storage
Published By: Dell Storage     Published Date: Apr 21, 2011
Enterprise Manager provides a single storage resource management (SRM) interface for one or more Compellent SANs. The software also integrates with VMware vCenter to enhance server and storage visibility and manageability. This demo video shows how to use Enterprise Manager to collect VM host and guest storage statistics from vCenter, create, map and rescan storage volumes, and then format the volumes with VMFS to create datastores or assign the volumes as RDMs to a virtual machine. (3 min)
Tags : 
dell compellent, vcenter integration, compellent enterprise manager, storage resource management, srm, vmware vcenter, server, storage, virtual machine
    
Dell Storage
Published By: Citrix Systems     Published Date: Sep 08, 2011
Citrix NetScaler goes beyond traditional ADCs, taking performance, scalability, reliability and security of critical web applications to the next level. Free white paper explains how!
Tags : 
citrix, netscaler, application performance, service delivery, infrastructure, web applications, tcp, ssl, datastream technology, delivery optimization, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
    
Citrix Systems
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Salesforce.com     Published Date: Jun 17, 2013
The Sales Cloud gives you everything you need to connect with customers—from complete, up-to-date account information to social insights, all in once place. Learn how.
Tags : 
customer relationship management, crm, technology, value matrix, support sales, marketing, customer service, crm solutions, social insight, business environment
    
Salesforce.com
Published By: eDataSource     Published Date: Apr 13, 2015
Looking to improve your email campaigns? Now you can with 3 remarkable email tools. Competitive Tracker - email data & creative on what your direct competitors are doing. Design Tracker, powered by Litmus - pre test the campaign before you hit send button. Inbox-tracker - know in real-time your inbox delivery. Learn more by downloading our quick overview white paper.
Tags : 
edatasource, email tools, email data, competitive tracker, design tracker, inbox-tracker
    
eDataSource
Published By: eDataSource     Published Date: May 05, 2015
Looking to improve your email performance? Over 100 emailers achieved a 40 open rate for Mothers Day alone - Learn more...
Tags : 
edatasource, email tools, email performance, email subject line, real-time data, email competitive intelligence
    
eDataSource
Published By: eDataSource     Published Date: Jun 15, 2015
eDataSource compares certain quarterly email engagement metrics across five somewhat similar retailers, based on our visibility into the email activity of 50,000 brands, and how their customers are engaging with those emails.
Tags : 
    
eDataSource
Published By: eDataSource     Published Date: Jun 15, 2015
Among the many useful elements of eDataSource’s visibility into the email activity of 50,000 brands is what we can see of how each subscriber in an email marketer’s audience is being mailed by specific other brands. This view provides a picture of which other brands are competing against yours for attention in your audience’s inboxes.
Tags : 
    
eDataSource
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.