memory

Results 151 - 175 of 204Sort Results By: Published Date | Title | Company Name
Published By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : 
silver peak, network memory, application caching, wan, caching, networking
    
Silver Peak
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Published By: SnowFlake     Published Date: Jul 08, 2016
In the era of big data, enterprise data warehouse (EDW) technology continues to evolve as vendors focus on innovation and advanced features around in-memory, compression, security, and tighter integration with Hadoop, NoSQL, and cloud. Forrester identified the 10 most significant EDW software and services providers — Actian, Amazon Web Services (AWS), Hewlett Packard Enterprise (HPE), IBM, Microsoft, Oracle, Pivotal Software, SAP, Snowflake Computing, and Teradata — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architect professionals select the right solution to support their data warehouse platform.
Tags : 
forrester, enterprise, data, technology, best practices, innovation, security, business integration, business intelligence, business technology
    
SnowFlake
Published By: Gigaom     Published Date: Jan 15, 2019
This recorded one-hour webinar will show you the benefits of end-to-end solutions and storage consolidation.
Tags : 
nutanix, storage, storage infrastructure, storage consolidation, hybrid cloud, memory storage, infrastructure, network performance, storage management, application performance management, cloud computing
    
Gigaom
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software
    
BlackBerry
Published By: Ramtron     Published Date: Nov 11, 2009
Today's technological innovation demands high performance coupled with low environmental impact. These dual requirements are driving components of the semiconductor industry which informs many global businesses and consumer lives.
Tags : 
f-ram, bbsram, random access memory, ram, novram, ecopack, electronics, semiconductor, memory, ramtron, system on a chip, electronic test and measurement, embedded design, boards & modules, embedded systems and networking, integrated circuits and semiconductors
    
Ramtron
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics, security
    
Webroot Inc
Published By: HP     Published Date: Jul 22, 2014
Organizations no longer have to wait months or years to deploy an all-flash storage array into their environment to host their applications. The technologies in this most recent iteration of the HP 3PAR StoreServ 7450 ensure that organizations get the performance they need, the cost at which they need it and the platform stability to offer it up to as many applications as they see fit. By taking advantage of the HP 3PAR StoreServ 7450 platform, organizations may confidently begin their journey into the all-flash world of tomorrow today with the knowledge that it will meet their various manageability, performance and scalability requirements along the way.
Tags : 
dcig, flash, flash memory, storage, array, technology, data management, business technology
    
HP
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : 
best practices, cpu, memory, storage, vsphere, virtual, storage management, database security, virtualization, infrastructure
    
Dell
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization introduces new challenges for managing your data center. Applications now compete for shared resources such as storage, CPU cycles and memory, often causing performance bottlenecks and unhappy customers. This paper details 20 metrics that indicate when capacity issues are occurring and recommends a corresponding tool that will analyze the data and resolve your VM performance issues. Read the White Paper "
Tags : 
vmware, metrics, virtualization, bandwidth management, backup and recovery, infrastructure
    
Dell
Published By: Dell     Published Date: Aug 16, 2013
"The number of vCPUs should be one of your most important considerations when sizing virtual machines. But getting the right balance — neither over-allocating nor under-allocating — is a challenge. You’ll need to select the number of vCPUs, the size of the virtual disk, the number of vNICs and the amount of memory. With all those variables, a little guidance is in order. Read the White Paper "
Tags : 
vcpu, sizing, vnics, virtual disk, memory, storage virtualization, application integration, windows, windows server, data warehousing, business technology, virtualization
    
Dell
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
Every data center IT manager must constantly deal with certain practical constraints such as time, complexity, reliability, maintainability, space, compatibility, and money. The challenge is that business application demands on computing technology often don’t cooperate with these constraints. A day is lost due to a software incompatibility introduced during an upgrade, hours are lost tracing cables to see where they go, money is spent replacing an unexpected hardware failure, and so on. Day in and day out, these sorts of interruptions burden data center productivity. Sometimes, it’s possible to temporarily improve the situation by upgrading to newer technology. Faster network bandwidth and storage media can reduce the time it takes to make backups. Faster processors — with multiple cores and larger memory address space — make it possible to practically manage virtual machines.
Tags : 
bladesystem, blade, infrastructure, blade infrastructure, blade servers, storage virtualization, best practices, productivity
    
Hewlett-Packard
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
security, it management, business technology
    
CarbonBlack
Published By: Dell Software     Published Date: Aug 15, 2013
Virtualization has changed data centers from static to flowing, and this fluidity has brought challenges to resource allocation. Find out how your organization can stay ahead of the curve. Read the White Paper >>
Tags : 
dell, cpu, memory, storage, vsphere, data center, technology, dynamic, data management, business technology
    
Dell Software
Published By: Dell Software     Published Date: Aug 15, 2013
Virtualization means applications now compete for resources such as storage, CPU cycles and memory, often leading to bottlenecks and unhappy customers. Find out how you can improve your VM performance. Read the White Paper >>
Tags : 
dell, virtualization, applications, storage, cpu, memory, data center, metrics, data management, business technology
    
Dell Software
Published By: Dell Software     Published Date: Aug 15, 2013
Getting the right balance of vCPUs is a challenge, as well as the right virtual disk size, the number of vNICs and the amount of memory. With all those variables, a little guidance is in order. Read the White Paper >>
Tags : 
dell, vcup, virtual disk, memory, machines, technology, it management, storage, business technology
    
Dell Software
Published By: IBM     Published Date: Oct 01, 2013
The new IBM System x3650 servers provide the power midmarket customers need to improve the performance of mission-critical applications, such as Microsoft Exchange, while offering dramatic cost savings and environmental customer benefits.
Tags : 
ibm, ibm system x, ibm system x m4, ibm system x m4 servers, servers, midmarket, applications, storage, processor, memory, enterprise applications, platforms, business technology
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
SAP Transaction Banking (TRBK) benchmark
Tags : 
ibm, ibm servers, servers, operating systems, transaction banking, application servers, server memory, database servers, it management, business technology
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.