> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 1506Sort Results By: Published Date | Title | Company Name
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014
Recipe for Dramatically Improving Application Performance, Storage Capacity and Total Cost of Ownership
Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership
     Sirius Computer Solutions, Inc.
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014
To capitalize on sales opportunities through deeper insights into customer demand, CCBCC needed to crunch more data without increasing time-to-insight, while meeting existing service-level agreements.
Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership
     Sirius Computer Solutions, Inc.
By: Sirius Computer Solutions, Inc.     Published Date: Jul 17, 2014
Download to read how organizations like Coca-Cola Bottling Company Consolidated are now up to speed with IBM FlashSystem.
Tags : sirius computer solutions, ibm, application performance, storage capacity, cost of ownership
     Sirius Computer Solutions, Inc.
By: AlienVault     Published Date: Jul 16, 2014
“AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : alienvault, alienvault usm, security operations center, smb, javvad malik
     AlienVault
By: Riverbed     Published Date: Jul 15, 2014
Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.
Tags : big data, integrated, end-user, experience, it infrastructure
     Riverbed
By: Riverbed     Published Date: Jul 15, 2014
Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.
Tags : big data analysis, it analytics, manage, complex, automation
     Riverbed
By: OutSystems     Published Date: Jul 15, 2014
It is certainly possible to disrupt without innovating. In this post I will reveal how new cloud-based solutions that incorporate platform-as-a-service (PaaS) offerings can enable innovation without disruption. DevOps—the latest socio-technical adaptation in IT that everyone is buzzing about—is a classic example and they have been benefiting from this new paradigm in spades. Let’s take a closer look.
Tags : outsystems, paas, devops, innovation, cloud based solutions
     OutSystems
By: OutSystems     Published Date: Jul 15, 2014
5 major obstacles threaten to derail achievement of strategic business goals and revenue growth.
Tags : outsystems, applications, strategic business, innovation, app development
     OutSystems
By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : outsystems, applications, strategic business, innovation, app development
     OutSystems
By: OutSystems     Published Date: Jul 15, 2014
This Gigaom Research report defines PaaS, investigates the available options, and then supplies concrete recommendations for what to use where and when.
Tags : outsystems, paas, devops, innovation, cloud based solutions
     OutSystems
By: Nginx     Published Date: Jul 15, 2014
Users demand fast application delivery and it is essential for the survival of your business. Meeting the expectations of your users is challenging. NGINX Plus offers a broad array of solutions to solve these challenges, allowing you to delight your users.
Tags : nginx, application delivery, web servers, application infrastructure, apache http server
     Nginx
By: Neustar     Published Date: Jul 14, 2014
More and more criminals are using DDoS attacks as a distraction or “smokescreen” for other cybercrimes like theft of data or even funds. Watch this video for a behind-the-scenes tour of what this “underground economy” of the Internet really looks like – a place where criminals sell stolen credit cards and credentials by the thousands, offer botnets, malware, and DDoS for hire, and much more
Tags : neustar, ddos, cybercrimes, malware, botnets
     Neustar
By: Neustar     Published Date: Jul 14, 2014
For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
Tags : neustar, blackbeard, pirate, siteprotect, cloud computing
     Neustar
By: Neustar     Published Date: Jul 14, 2014
It’s no secret that DDoS attacks are worsening by the day. From the largest financial institutions to smaller Internet companies, everyone’s a target. Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size. Most of these conversations boil down to three key questions and form the conversation you should be having, too—whether you use Neustar, another provider or your in-house team to manage your external DNS.
Tags : neustar, ddos, ecommerce, protection, security
     Neustar
By: Neustar     Published Date: Jul 14, 2014
Historically, communication service providers (CSPs) have viewed network transformation through the narrow lens of technology, as though it were a simple matter of upgrading equipment. But in reality, the solution is much more complex. To ensure a smooth transition to an all-IP network, it’s essential for each area of the business (IT, marketing and operations) to work together and consistently communicate throughout the journey.
Tags : neustar, network transformation, csps, communication service providers, ip networks
     Neustar
By: Neustar     Published Date: Jul 14, 2014
DDoS attacks against high-tech firms have started to take a dangerous turn. It’s called DDoS smokescreening — attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property. This is just one insight in Neustar’s 2014 Annual DDoS Attacks and Impact Survey. The resulting report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
Tags : neustar, ddos, online gaming, ecommerce, protection
     Neustar
By: AlienVault     Published Date: Jul 14, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security
     AlienVault
By: AlienVault     Published Date: Jul 14, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security
     AlienVault
By: AlienVault     Published Date: Jul 14, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : alienvault, limited resources, it time management, it prioritization, it management
     AlienVault
By: AlienVault     Published Date: Jul 14, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
     AlienVault
By: IBM     Published Date: Jul 14, 2014
In this Frost & Sullivan Executive Brief, you will learn valuable tips for choosing a cloud services provider.
Tags : ibm, cloud, cloud services, cloud service provider, cloud portfolio
     IBM
By: IBM     Published Date: Jul 14, 2014
This practical guide offers steps for moving your company into the cloud, at whatever pace you prefer, with a focus on the IBM Cloud portfolio offered by IBM and its partners.
Tags : ibm, cloud, cloud services, cloud portfolio, ibm cloud portfolio
     IBM
By: IBM     Published Date: Jul 14, 2014
This paper discusses the importance of workloads when planning for your migration to the cloud. It also describes how a structured approach to cloud workload analysis can help you identify cloud initiatives that offer faster time to value, reduced migration risk and higher potential return.
Tags : ibm, cloud, cloud services, cloud portfolio, workloads
     IBM
By: TeamQuest     Published Date: Jul 11, 2014
It is very common for an IT organization to manage system performance in a reactionary fashion, analyzing and correcting performance problems as users report them. When problems occur, hopefully system administrators have tools necessary to quickly analyze and remedy the situation. In a perfect world, administrators prepare in advance in order to avoid performance bottlenecks altogether, using capacity planning tools to predict in advance how servers should be configured to adequately handle future workloads.
Tags : teamquest, capacity planning, system performance, administrators, workloads
     TeamQuest
By: TeamQuest     Published Date: Jul 11, 2014
In this whitepaper you will learn about the following: • Analytics and today’s optimization challenges • What REALLY matters • Desired state and results • Methodology and ideation examples – Business and service aligned – Automated and predictive IT analytics • Recommendations Download to learn more!
Tags : mobile app, optimizing it, automated and predictive it analytics, it management, knowledge management
     TeamQuest
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search