> Technology > IT Management
 

IT Management

IT Management includes a variety of functions for managing computers in a networked environment, including software distribution, version control, backup & recovery, job scheduling, virus protection and performance and capacity planning.
Results 1 - 25 of 2307Sort Results By: Published Date | Title | Company Name
By: Altiscale     Published Date: May 28, 2015
Big Data technologies are maturing and quickly moving into the next phase - one that expands in data use-cases as Hadoop moves into more influential roles throughout IT infrastructures. In this just-released report, Gartner is recognizing four Big Data vendors as "cool." Gartner says these vendors can meaningfully and synergistically combine multiple types of functionality.
Tags : big data, vendors, functionality, cool vendors, consistent performance
     Altiscale
By: Altiscale     Published Date: May 28, 2015
Altiscale’s Hadoop-as-a-Service can reduce costs and improve data scientist productivity, resulting in products, services, and insights realized sooner.
Tags : hadoop-as-a-service, data improvement, data productivity, economic benefits, economic impact
     Altiscale
By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : mimecast, migration, microsoft office 365, storage, cloud backup
     Mimecast
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices
     ThreatTrack Security
By: Aternity     Published Date: May 22, 2015
“End User Experience Monitoring” or EUEM is used pervasively by vendors in the APM market. But comprehensive EUEM requires a deeper look. This 30-minute webinar that will help you navigate these EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
     Aternity
By: ThreatTrack Security     Published Date: May 21, 2015
This white paper focuses on the security problems organizations of all sizes face in regard to email and other threat vectors, and it offers recommendations about to improving security.
Tags : phishing, next-generation malware, security, email, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : cyberthreat, security, malware, defense, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this eBook to learn how ThreatSecure can detect active advanced attacks and help increase the effectiveness of security and incident response teams.
Tags : advanced protection, cyberthreat, security, incident response team, threatsecure
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Download this white paper to learn how to add value through malware analysis.
Tags : malware, security threat, cyberattack, cyberthreat, malware analysis
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : security challenges, mid-market security, cyber-extortion, cyberthreat, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar to learn how to win the battle against Advanced Persistent Threats.
Tags : persistent threats, cyberattacks, security, data breach, it management
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity
     ThreatTrack Security
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : advanced threats, advanced targeted attacks, security, cybersecurity, it management
     ThreatTrack Security
By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure
     Xangati
By: Arcserve     Published Date: May 20, 2015
Review this analysis to get a better understanding of how you can eliminate application downtime.
Tags : arcserve, application downtime, critical systems, data loss, it management
     Arcserve
By: Infomatica     Published Date: May 19, 2015
In this eBook, best-selling author Brian Underdahl explores the fundamentals of data integration and how the latest tools can simplify today’s (and tomorrow’s) data landscape. “Data Integration for Dummies” provides valuable reference if you need to explain data integration to the business, are looking for an alternative to hand-coding data mappings, or simply interested in expanding your knowledge.
Tags : data integration, it infrastructure, data sources, data landscape, data mappings
     Infomatica
By: Pluralsight     Published Date: May 18, 2015
There are five key areas for which you must apply a certain level of attention if you plan on retaining your tech staff: 1. The work environment 2. Education 3. Hardware/software programs 4. Perks of hard work 5. Recognition
Tags : work environment, education, motivation, technology, production
     Pluralsight
By: Pluralsight     Published Date: May 18, 2015
Finding technical talent can be a daunting and challenging task. It used to be that you could find it in obvious places, but the growing demand for these candidates at almost any skill level has made it feel like there is a shortage. And if you do manage to find qualified people, they’re often already engaged and happy where they are.
Tags : talent, technology, consultants, motivation, pluralsight
     Pluralsight
By: SolarWinds     Published Date: May 18, 2015
It’s the newest trend in virtualization, simplifying hardware deployment with its “everything-in-a-box” approach, but what does it mean from a management perspective?
Tags : hyper-convergence effect, virtualization trends, hardware deployment, management perspective, it management
     SolarWinds
By: SolarWinds     Published Date: May 18, 2015
Step-by-step tips on how to fight high latency
Tags : eliminate latency, virtual environment, quick tips, step-by-step, it management
     SolarWinds
By: SolarWinds     Published Date: May 18, 2015
vExpert Eric Siebert provides key insights into capacity planning and why it’s important.
Tags : capacity planning, virtual environments, system admins, it management
     SolarWinds
By: SolarWinds     Published Date: May 18, 2015
Monitor website availability and performance across Web pages and infrastructure elements. Learn how to proactively monitor five key areas of website performance issues caused by front-end components. With monitoring, you can proactively detect bottlenecks to find out whether the increase in server-side processing is due to the Web server or due to a front-end.
Tags : website availability and performance, infrastructure elements, five key areas, detect bottlenecks, server-side processing
     SolarWinds
By: SolarWinds     Published Date: May 18, 2015
Learn how to prevent application downtime and optimize performance with this EMA Whitepaper “It’s All About the App: Application-Centric Systems Management” that provides the methodology an IT admin needs to utilize an application-focused approach.
Tags : application downtime, performance optimization, it admin, it infrastructure, application performace
     SolarWinds
By: SolarWinds     Published Date: May 18, 2015
Learn about ten priorities Enterprise Management Associates (EMA) identified as integral for every company’s monitoring strategy. Read about the challenges companies face in fully visualizing their IT infrastructure to monitor essential technology implementations, configurations, and statuses.
Tags : it infrastructure, technology implementations, system administrators, choosing servers, app monitoring software
     SolarWinds
By: Adecco     Published Date: May 14, 2015
In this white paper, we examine how smarter and more connected personal devices are spreading connectivity outward, eventually marrying personal data and services with information from the wider world.
Tags : personal devices, connectivity, personal data, information, internet of things
     Adecco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search