cio

Results 1 - 25 of 1286Sort Results By: Published Date | Title | Company Name
Published By: IO     Published Date: Dec 31, 2015
These are all marketing terms being used to describe data center colocation offerings. (IO is no exception.) But what do these terms really mean to an organization? What does “next-generation” or “2.0” or “future proof” or “hybrid” do for those people who are responsible for data center operations? Why should a CIO or data center manager care if his data center is “next-generation”? Why look for a provider with an “enterprise hybrid solution”? In this Solution Guide, we cut through the marketing hype and answer those questions.
Tags : 
    
IO
Published By: Compass Datacenters     Published Date: Mar 02, 2016
The demand for more efficient and cost effective computing has driven organizations large and small to reevaluate their strategies. This examination can incorporate many aspects, encompassing system architecture and software platforms, as well as the IT hardware, and of course the data center facility. Moreover, there are many strategic options for the enterprise CIO and CTO to consider, such as the possibility of direct or indirect ownership and operation of their own data center facility, as well as colocation, cloud, or hybrid combinations thereof. Nonetheless, the IT hardware must ultimately reside in a physical data center that will provide conditioned power and safe environmental conditions for the IT equipment.
Tags : 
    
Compass Datacenters
Published By: Verne Gloabal     Published Date: Mar 30, 2016
Today’s CIO faces a host of challenges and new trends. Budgets are tight and in many cases decreasing. At the same time, IT is becoming more strategic as the amount of data created is exploding and the value of accessing that data in real time is continuously increasing. Much of this data must be mined and acted upon instantaneously while it is still of value, requiring the application of bigger and more powerful data centers.
Tags : 
    
Verne Gloabal
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
    
Workday APAC
Published By: Citrix     Published Date: Jun 21, 2019
Guiar, automatizar y optimizar el trabajo con un espacio de trabajo inteligente
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 21, 2019
Co?mo Citrix Workspace reduce la complejidad de la nube para que pueda impulsar el negocio y la agilidad de TI
Tags : 
    
Citrix
Published By: Schneider Electric     Published Date: Jun 07, 2019
Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : 
refrigeración, construcción de centro de datos, colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Descubra cómo sacar el máximo provecho a su futuro. Este informe puede ayudarle a afrontar los desafíos del futuro, superar las expectativas de sus clientes y encontrar maneras de coexistir con las soluciones competitivas de centros de datos. 451 Research reúne información de los compradores y de quienes toman decisiones sobre el tema de los espacios de colocación, y resume lo que debe hacerse en las empresas de centros de datos de colocación.
Tags : 
colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Volverse más eficiente y más confinable.Para llevar ventaja sobre la evolución de los centros de datos, las empresas necesitan considerar el monitoreo remoto digital. Este informe explica cómo el monitoreo remoto digital afectará estas áreas: • Mejoras en el costo y el rendimiento de sistemas integrados • Ciberseguridad • Computación en la nube • Análisis de macrodatos • Computación móvil • Aprendizaje automático • Automatización para rendimiento laboral.
Tags : 
ciberseguridad, computación móvil, colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
El montaje del marco de pod proporciona ganancias más rápido. Acumule ahorros de CapEx. Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : 
colocación, de centro de datos
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Consideraciones sobre los sistemas de enfriamiento. A medida que los costos de energía y los problemas ambientales ejercen cada vez más presión en los centros de datos, los sistemas de enfriamiento se vuelven el foco para encontrar eficiencias. Se pueden mitigar muchos problemas con un diseño bien planeado. Este informe técnico explica cómo optimizar el enfriamiento de los centros de datos con sistemas de control eficaces. Descargue su copia para aprender más.
Tags : 
colocación, enfriamiento, de centro de datos
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Mantenimiento eficaz de las instalaciones de centros de datos. Descubra las metodologías esenciales junto con sugerencias prácticas y consejos que puede usar para desarrollar una estrategia eficaz de operación y mantenimiento. Todo empieza con una mentalidad de importancia crítica que se expone claramente para usted.
Tags : 
colocación
    
Schneider Electric
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Infinidat EMEA     Published Date: May 15, 2019
Las soluciones de almacenamiento empresarial de INFINIDAT® se basan en la arquitectura de almacenamiento única y patentada de INFINIDAT: un conjunto totalmente abstracto de funciones de almacenamiento de?nido por software (SDS) integradas con lo mejor del hardware de consumo disponible para la venta. Al unir su software a una plataforma de referencia de hardware altamente probada, INFINIDAT presenta la primera solución real de almacenamiento de?nido por software de clase empresarial.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
2017 no fue un año fácil para los CIO/CISO, y 2018 tampoco da muestras de serlo. Con tantas brechas en los datos acaecidas tan solo en 2017 y capaces de acabar con la carrera de cualquiera, (Equifax, Uber, Yahoo son algunos ejemplos), y los requisitos normativos reforzados a nivel mundial, los CIO/ CISO tienen la responsabilidad corporativa de replantearse su enfoque sobre la seguridad de los datos.
Tags : 
    
Infinidat EMEA
Published By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
Published By: Workday APAC     Published Date: May 08, 2019
"Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now."
Tags : 
    
Workday APAC
Published By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesn’t align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to “do more with less,” while improving performance and availability at the same time.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Zscaler     Published Date: Jun 20, 2019
Las reglas han evolucionado: las aplicaciones migran ahora hacia el cloud, y los usuarios acceden a ellas desde cualquier lugar, sin conectarse más a la red corporativa. Parece entonces esencial reconsiderar el aspecto seguridad de su arquitectura. Descubren con ese libro blanco como proteger sus activos estratégicos con las funcionalidades Zscaler Data Protection y Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Descubren gracias a este guía como redirigir de manera óptima el tráfico de sus subsidiarias, para permitir un acceso directo a Internet y a sus aplicaciones cloud. Disminuyan sus costes, obtengan una visión completa sobre sus flujos y mejoren la experiencia de sus usuarios tras securizar sus oficinas remotas.
Tags : 
    
Zscaler
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com