monitors

Results 1 - 25 of 25Sort Results By: Published Date | Title | Company Name
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
AppAssure Software
Published By: Cisco     Published Date: Dec 04, 2015
What happens when you swap employees’ monitors and phones with new Cisco DX80 collaboration tools? What happens when you take them away? Watch their reactions
Tags : 
cisco, dx80, mobile, employee phone, networking, wireless
    
Cisco
Published By: Dell     Published Date: Aug 24, 2015
Dell UltraSharp 34 Curved Monitor performance is ahead of the curve. Discover one of the world’s first 34 inch 21:9 curved monitors with a panoramic view, cinematic WQHD resolution and superb sound.
Tags : 
dell monitor, monitor, curved monitor, panoramic, cinematic, hqhd resolution, it management, electronics
    
Dell
Published By: Dell     Published Date: Aug 24, 2015
Maximize the performance and user experience of Dell Ultra HD monitors. This instructional video explains how to choose the right monitor connector with details on the capabilities of Dell Display Port vs. HDMI
Tags : 
user experience, dell monitors, monitors, dell display port, hdmi, hardware, it management, electronics
    
Dell
Published By: Dell     Published Date: Aug 24, 2015
See the impact the Dell 55” HD monitor can have at your next meeting. With an expansive 55” HD anti-glare screen, better font optimization than TVs, consistent viewing from any angle, and a 3-year warranty, it’s the ideal solution for small conference rooms.
Tags : 
monitors, hardware, dell monitors, hd monitor, anti-glare, font optimization, warranty, conference room monitor
    
Dell
Published By: Dell     Published Date: Aug 21, 2015
A dual monitor solution can benefit all types of employees, whether they are managing graphic or video content, processing massive amounts of data, or performing regular office tasks. Adding a dual-monitor solution to a desktop computer is a relatively inexpensive way to realize significant productivity gains and improve the knowledge worker experience.
Tags : 
dual monitors, productivity, dell monitors, monitors, graphics, video content, hardware, software development
    
Dell
Published By: Dell     Published Date: Aug 21, 2015
Read this interactive eGuide to learn more about Dell Ultrasharp monitors and how they enhance use of Adobe programs.
Tags : 
dell monitors, monitors, hardware, adobe, adobe creative cloud, dell precision workstations, it management, electronics
    
Dell
Published By: Prophix     Published Date: May 31, 2016
Prophix gives you a clear picture of all your operational costs and connects them with key factors that are driving your revenues. That increased line-of-sight is made possible because Prophix tracks and monitors all day-to-day operational planning activities. Improving operational outcomes for the short-term and providing insights into your future operations
Tags : 
prophix, best practices, database management, productivity, business analysis
    
Prophix
Published By: Aternity     Published Date: May 18, 2015
This whitepaper provides an overview of Aternity Virtual Desktop Monitoring and how it monitors end user experience in a VDI environment. Aternity goes well beyond traditional Virtual Desktop Infrastructure assessment tools that are primarily focused on planning and testing virtual deployments. Aternity provides in-depth monitoring of end user experience in a production environment spanning tens of thousands of business users.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
Application health monitors are now a tried and true technology of the Application Delivery Controller, yet traditional monitors require interaction with the application. Inband passive monitors change that requirement and monitor applications transparently.Inband passive monitors finally fuse together intelligence and performance; it's no longer an "or" decision, now it becomes an "and," enabling both application intelligence and performance to co-exist.
Tags : 
application, health monitors, health, technology, application delivery controller, monitor, monitors, performance
    
F5 Networks Inc
Published By: Forcepoint     Published Date: Apr 19, 2016
The right cybersecurity solutions can improve your bottom line. According to a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, SureView®Insider Threat (SVIT) monitors and investigates internal threats across all endpoints and channel communications. It “lowers risk and increases productivity” and can mean significant ROI to your enterprise.
Tags : 
    
Forcepoint
Published By: ThousandEyes     Published Date: Aug 04, 2017
ThousandEyes monitors and solves application delivery problems throughout the Internet due to data center outages, ISP performance, CDN caching and DNS availability.
Tags : 
data center, application delivery, isp performance, cdn caching, dns availability
    
ThousandEyes
Published By: IBM     Published Date: May 12, 2008
Managing compliance is a huge challenge for companies, straining IT resources needed to meet service level agreements. To overcome these challenges, IT must support the objectives of your business. This white paper describes how IBM Service Management does just that. It defines and monitors IT governance and compliance management in a repeatable manner across businesses of any size.
Tags : 
service, service management, sla, service level, ibm, ibm g&rm, ibm grm, compliance
    
IBM
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors and solves application delivery problems throughout the Internet due to data center outages, ISP performance, CDN caching and DNS availability.
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: SAS     Published Date: Jun 05, 2017
"How do you make your brick-and-mortar stores as smart as your website – so when customers walk in the door, you recognize them and cater to their individual tastes? What’s the key to making in-store shopping as frictionless for your customer as online shopping? Read this research summary from the International Institute for Analytics to get started. You’ll learn how to use analytics to gain advanced insight from the Internet of Things: tracking chips, in-store infrared traffic monitors, interactive kiosks and customer mobile devices, to name a few. With analytics, you’ll identify who’s walking in your store, understand their behavior and preferences, and create engaging experiences for your connected customers at every turn. "
Tags : 
    
SAS
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Vision Solutions     Published Date: Dec 31, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: HP     Published Date: May 11, 2011
Learn how HP Systems Insight Manager monitors and controls the server environment to enhance staff efficiency, improve uptime, and reduce the cost and complexity of managing the data center.
Tags : 
hp insight control management, business value, roi, tim grieser, randy perry, server life-cycle management, it management, infrastructure management
    
HP
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Marsha Lee     Published Date: Aug 23, 2010
A Key Technology for Switched Sharing of Modern Monitors
Tags : 
kvm switch
    
Marsha Lee
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. It simplifies and automates backup and restore processes across Windows and Linux environments, and remotely monitors and manages geographically distributed servers and workstations.
Tags : 
acronis, backup and recovery, 10 advanced server, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com