white paper

Results 1 - 25 of 5544Sort Results By: Published Date | Title | Company Name
Published By: Chatsworth     Published Date: May 10, 2016
The modern data center has changed. There are new demands around cloud computing, big data and infrastructure efficiency. This change in the data center is being driven by more users, more data and a lot more reliance on the data center itself. With private cloud technologies and the rapid growth in data leading the way within many technological categories (the Internet of Things), working with the right data center optimization technologies has never been more important. In this white paper, we explore new concepts around data center demand, where energy efficiency and cooling optimization fit in and modern best practices around your data center.
Tags : 
chatsworth, data center optimization
    
Chatsworth
Published By: FORTRUST     Published Date: Aug 14, 2015
Companies rely on their data center to provide the foundation for much of their business. Because of that, a thorough evaluation of the key geographical factors related to risk mitigation and data center site selection is critical. This white paper examines several of the major criteria to use in geographic data center site selection, and provides an overview of the FORTRUST facility as it relates to those criteria.
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Aug 14, 2015
When companies evaluate potential data centers and colocation service providers, they normally compare them using some kind of criteria or checklist. However, many such efforts fail to sufficiently evaluate the breadth and depth of detail necessary to make a well informed decision. This white paper examines several key criteria as they relate to service delivery from a data center or colocation provider. Specifically, this paper examines the importance of factors such as risk mitigation, operational processes and service assurance, combined with maintenance and lifecycle strategies that directly contribute to “high-availability service delivery.”
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA). It is important to consider while differences emerge among specific compliance mandates, many of the common mistakes and challenges associated with each will apply to all compliance efforts.
Tags : 
    
FORTRUST
Published By: RagingWire Data Centers     Published Date: Oct 09, 2015
Data Center Migration, three words that can cause sleepless nights to even the most experienced professionals involved in enterprise IT and facilities departments. While it can be a daunting challenge, it also offers a great opportunity to improve and rethink your IT architecture and examine how well it meshes with your organization’s long term business strategies. This whitepaper examines some of the major strategic issues that should be an integral part of your evaluation when forming a data center migration strategy.
Tags : 
    
RagingWire Data Centers
Published By: RagingWire Data Centers     Published Date: Nov 03, 2015
This whitepaper examines some of the short- and long-term issues and challenges that should be part of your due diligence when facing growing demands of your organization’s evolving computing architecture and making major strategic and economic decisions. It also provides guidelines for evaluating the alternative choices, such as co-location and hosted service providers, as well as cloud services, which can all be utilized together for enhanced flexibility.
Tags : 
    
RagingWire Data Centers
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously. They also need to co-locate multiple systems while sharing power and energy. This is true for large as well as small environments. The trend in modern IT is to consolidate as much as possible to minimize cost and maximize efficiency of data centers and branch offices. HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently. HPE 3PAR OS and converged controllers incorporate multiprotocol support into the heart of the system architecture
Tags : 
    
Hewlett Packard Enterprise
Published By: Key Private Bank     Published Date: Apr 05, 2018
From budgeting daily expenses to deciding a career path, attending college brings plenty of opportunities for teenagers to make the right—and wrong—financial decisions. That’s why parents of college-bound children should utilize opportunities to instill money and wealth preservation lessons in their children. But knowing where to start can be daunting. The experts at Key Private Bank have narrowed down the best ways to help you discuss important money lessons with your teens, so that you can set your children up for a lifetime of financial success. Read about the four wealth lessons you can start introducing to your children now when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
financial responsibility, college money management, managing your money in college, college money tips, college spending tips, how can students spend money wisely, save money in college, budgeting in college, budgeting college students, personal finances for college students, credit cards and college, student loans, college loans, managing student loans, monthly budget for college students, savings accounts for students, spending habits of college students, better spending habits in college, money management for students, college cash management
    
Key Private Bank
Published By: Key Private Bank     Published Date: Apr 05, 2018
When it comes to building portfolios for wealth creation, Key Private Bank experts believe our clients are best served by a disciplined approach that incorporates both active and passive strategies. We understand the debate over which methodology generates better outcomes has been going on for decades, but with the right team by your side you’ll reap the benefits of a method that’s time-tested. Learn the whys and hows of both passive and active investing, and what to do to maximize their benefits, your portfolio and wealth when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : 
investment, investing, investment portfolio, passive investing, active investing, passive or active investing, active vs passive investing, investment strategies, market opportunities, passive indexing, index funds, investment performance, investment styles, actively managed funds, index mutual funds, why passive investing, benefits of passive investing, what is active investing
    
Key Private Bank
Published By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
It is possible that a significant number of people reading this piece may find themselves confused, or at least intrigued, by its title: “The Importance of Flash Storage in a Hybrid IT World.” Might it be that two separate white papers have been inadvertently muddled and integrated? After all, "hybrid IT" is about a sweeping strategic trend for the industry, whereas "flash storage" seems prosaically tactical. Download to read more!
Tags : 
optimization, optimum, delivery, storage, flash, hpe
    
Hewlett Packard Enterprise
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.
Tags : 
content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, website performance, website acceleration, digital rights management, drm
    
Limelight
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: Workday Nordics     Published Date: Mar 06, 2018
This White paper looks at how system complexity is increasing, though enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks. Cloud computing helps IT executives meet these conflicting objectives. These solutions are designed on a modern architecture, one much more fluid than premises-based systems. In addition, cloud is better able to handle threats than legacy systems. To be successful, CIOs need to overcome their traditional security (on premises is best) mindset, and hand management of their most important applications over to a cloud provider.
Tags : 
    
Workday Nordics
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 22, 2018
In the increasingly competitive OTT market, competition for viewers is high. Providers must find ways to not just deliver compelling content, but to deliver compelling viewing experiences. In this whitepaper, you’ll learn about the critical challenges facing OTT providers today and how they can be overcome to provide the broadcast quality experiences viewers expect, regardless of the device in use or the viewers location in the world. Are you ready to keep your subscribers happy and away from your competition? Download this free white paper OTT 3.0: How to Build a Better Mousetrap and learn: Why personalized content discovery is so important to viewers – and to the success of your business How to avoid internet congestion by leveraging technologies like a CDN The importance of global network scale to meet spikes in consumer traffic The impact of advertising on viewer abandonment
Tags : 
    
Limelight Networks
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
IDC has put the business value of the Oracle Exadata to the test by interviewing eight customers. They reported better business outcomes and efficiencies as a result of improved database performance, scalability, and reliability. The resulting whitepaper also reveals business value highlights, such as 429 percent five-year ROI, US$222,000 additional revenue per 100 users, and 94 percent less unplanned downtime.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
Published By: APC by Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
APC by Schneider Electric
Published By: Workday     Published Date: Mar 01, 2018
: Read this whitepaper to understand ASC 606 and IFRS 15, identify how to prepare for the transition, and find out how other companies are handling the change
Tags : 
asc 606, ifrs 15, transition
    
Workday
Published By: Jamf     Published Date: Mar 29, 2018
With Mac labs being a major presence on university campuses, many IT admins rely on imaging to ensure computers do not fall prey to viruses and costly data breaches, and to provide students with the education resources they need to be successful. The problem is imaging machines is a tedious and manual process, requiring lots of IT time. In this white paper, we examine a better way to manage a Mac lab and explain how to: • Leverage Apple’s Device Enrollment Program (DEP) to automatically configure and enroll Mac devices into management • Make apps and resources readily available for students to use, regardless which computer they choose • Ensure students only have access to the resources relevant to them by binding machines to your school’s directory services system
Tags : 
    
Jamf
Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
Published By: NetApp     Published Date: Mar 06, 2018
This ESG report commissioned by NetApp provides insight to understand converged and hyperconverged platforms.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Genesys     Published Date: Feb 22, 2018
Is Your IT Team Ready to Enable Digital Transformation? Customers want fast access to information and immediate problem resolution on any device, from any location, at any time. It’s up to IT to build the foundation for this digital transformation—and increasingly, it’s cloud-based. Make sure your IT team is on track to deliver. An omnichannel contact center platform gives you a single, integrated view of the entire customer journey. And as a cloud-based solution, IT has the flexibility to deploy advanced features fast and cost-efficiently. Read this white paper from Frost & Sullivan for a pragmatic approach to: • Identify process changes and goals with lines of business • Benchmark your current infrastructure and technology gaps • Consider cloud omnichannel solutions for easier deployments and simple scalability
Tags : 
frost & sullivan, customer engagement, contact center, omnichannel
    
Genesys
Published By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
    
CrowdStrike
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com