Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > High Availability

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

High Availability

High Availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period.
Results 76 - 100 of 184Sort Results By: Published Date | Title | Company Name
White Paper Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
Read this whitepaper to see how your organization can simplify, optimize, and save in your VMware environment with HP Storage solutions.
Tags : 
hp storage solutions, vmware, virtualization, roi, infrastructure
    
HP and Intel® Xeon® processors
White Paper Published By: HP Data Center     Published Date: Feb 18, 2009
Today's IT executives are not only expected to create and maintain high-availability IT environments, but they are also expected to implement green initiatives to satisfy customers, analysts, and government agencies that are worried about the impact of modern, energy-thirsty data centers on the environment. Is such a dual mandate reasonable? Can companies be expected to maintain service levels and reduce their carbon footprints at the same time? The White Paper offers a description of the different types of services available to improved energy efficiency data center design and a prescription for successful implementation.
Tags : 
hp data center, energy efficiency, data center, high-availability it environments, green initiatives
    
HP Data Center
White Paper Published By: IBM     Published Date: Aug 21, 2008
Establishing an ESB is essential in delivering a Service-Oriented Architecture. But for an SOA to be effective, you’ll also need your ESB to recover quickly from unexpected hardware and software failures. Clustering can help by enabling your systems to operate in parallel, so that if one should fail, those remaining can seamlessly step in.
Tags : 
ibm mi, ibm, ibm grm, high availability, cluster
    
IBM
Webinar Published By: IBM     Published Date: Aug 21, 2008
Assessments are the key tools for uncovering vulnerabilities in your security that may be well hidden. This webinar explains how your organization can gain value and insight from the various types of security assessments that safeguard the confidentiality, integrity and availability of your critical business data.
Tags : 
ibm, ibm mi, ibm grm, security, high availability
    
IBM
White Paper Published By: IBM     Published Date: Apr 22, 2008
This IDC white paper discusses how the current need for server virtualization, infrastructure consolidation and energy efficient technology requires significant changes to IT systems. It describes the steps to take to achieve high availability and reduce operational costs, while still adhering to the requirements of “green IT.”
Tags : 
ibm, ibm opt it, green, environmental, environment
    
IBM
White Paper Published By: IBM     Published Date: Mar 17, 2008
The all-in-one configuration of the IBM BladeCenter S makes it a perfect fit in a small office. It integrates servers, storage, networking and I/O into a single chassis, which uses a standard electrical outlet. Plus, it's easy to use and manage, with tools that help manage energy use to lower total operating costs. Read all about this flexible, blade-based chassis and see how it streamlines and simplifies small office IT.
Tags : 
ibm, move up, blade, blade center, bladeserver
    
IBM
White Paper Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy
    
IBM
White Paper Published By: IBM     Published Date: Feb 25, 2008
IBM HACMP supports a wide variety of configurations, and provides the cluster administrator with a great deal of flexibility. With this flexibility comes the responsibility to make wise choices. This paper discusses the choices that the cluster designer can make, and about the alternatives that make for the highest level of availability.
Tags : 
high availability, backup, recovery, utility computing, network management
    
IBM
White Paper Published By: IBM     Published Date: Dec 12, 2006
This white paper outlines the components of the Banking Data Warehouse (BDW) and how they assist financial institutions in addressing the data modeling and data consolidation issues relating to the SOX regulations.
Tags : 
data warehousing, database warehousing, data consolidation, sarbanes oxley compliance, sox
    
IBM
White Paper Published By: IBM Corp     Published Date: May 31, 2011
Unique Express implemented a comprehensive Omnix Transport Solution running on an IBM® System x® server. The end result was a dramatically better management of driver and vehicle resources, saving tens of thousands of dollars per year.
Tags : 
unique express, computer-based transport solution, ibm system x server, omnix software, high availability
    
IBM Corp
White Paper Published By: Infoblox     Published Date: Feb 03, 2009
IP address management (IPAM) provides the ability to effectively manage, control, monitor, and assign the IP address space within a company. An IPAM solution reduces operations costs and improves network uptime by minimizing administrative effort and network downtime.
Tags : 
infoblox, integrated ip management solution, ipam, data migration, dhcp
    
Infoblox
White Paper Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management
    
Jumpnode Systems
White Paper Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation
    
KACE
White Paper Published By: Kaseya     Published Date: Apr 04, 2013
A complete and holistic solution can help organizations create system snapshots that can be restored quickly and efficiently, getting users back up and productive immediately.
Tags : 
disaster recovery, backup, business continuity, virtualization, security
    
Kaseya
White Paper Published By: Kaseya     Published Date: Apr 04, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
it security, anti-virus, vulnerability management, intrusion prevention, access control
    
Kaseya
Case Study Published By: KEMP Technologies     Published Date: Aug 04, 2008
SkyVantage, a provider of hosted airline reservation services, provides an industry-leading airline reservation and management system for specialized small-to-medium and start-up airlines, as well as airline charter organizations. In an industry with high operating costs and tight competition, SkyVantage was founded based on the need to deploy a web-based, lower-cost software management solution to the airline industry, without sacrificing features.
Tags : 
software management, skyvantage, load balancer, load balancing, application delivery
    
KEMP Technologies
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor
    
LogRhythm
White Paper Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security
    
McAfee
White Paper Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit
    
McAfee
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator
    
McAfee Inc
White Paper Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search