container

Results 1 - 25 of 158Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Tagman     Published Date: Mar 21, 2011
This white paper examines the true costs associated with the Tagging of websites to implement and track the performance of online marketing technologies such as web analytics, display ad serving and search marketing. This research was conducted by TagMan, a smart container tag with real-time attribution and web-page acceleration.
Tags : 
web analytics, tagging, real time attribution, web page acceleration, tagman
    
Tagman
Published By: HPE APAC     Published Date: Jun 20, 2017
This white paper shows IT architects, administrators, and DevOps developers how to deploy Docker hosts and execute containerized applications on bare-metal infrastructure.
Tags : 
infrastructure, bare--metal infrastructure, it transformation, business opportunities, operations
    
HPE APAC
Published By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillarsdistributed integration, containers, and APIsto deliver flexibility, scalability, and reusability.
Tags : 
    
Red Hat
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE thanks to a unique shared memory and vertical scale architecture make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the identity-aware perimeter. The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on where you are than who you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: CA Technologies     Published Date: Nov 07, 2014
Dcouvrez dans ce livre blanc une technologie unique de gestion des caractristiques de scurit, de performances, de conformit et de support de tout type de priphrique, dapplication, de contenu ou de courriel, qui prserve la qualit de lexprience utilisateur mobile.
Tags : 
mobile user experience, security features, security in the cloud, the mobile user experience, optimising the user experience, mobile computing, mobile data systems, mobile workers, wireless phones, cloud computing
    
CA Technologies
Published By: VMWare - vFabric     Published Date: May 10, 2012
Learn why your peers are replacing JEE containers with lightweight application servers - and what you can gain from the move.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, networking, data management, virtualization, cloud computing, infrastructure, design and facilities
    
VMWare - vFabric
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: Oracle APAC     Published Date: May 24, 2018
Container technologies have substantial benefits especially given the need to isolate applications to increase service levels. Linux Containers (LXC) and Docker containers can be your best choice, depending on your use case.
Tags : 
    
Oracle APAC
Published By: Oracle     Published Date: Mar 06, 2017
Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production monitoring, or Node.js running on enterprise-grade cloud infrastructure.
Tags : 
    
Oracle
Published By: Juniper Networks     Published Date: Oct 25, 2017
The primary purpose of containerized applications is to improve the effectiveness of software teams, making it easier for people to work together while lowering the communications overhead. In large enterprises, applications such as ERP or CRM software suites often begin as simple projects, but as time passes, they quickly become clunky and inefficient, with a monolithic code base that slows progress for development teams.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you cant escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: Adopt and scale containers faster. Move existing services to containers. Eliminate the friction between development, QA, and production environments.
Tags : 
    
Puppet
Published By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast theres so much more than servers and endpoints. Now, youre responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If youre responsible for guarding your organizations fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, its fair to say the perimeter has left the premises. Whether its discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, todays attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function especially IT security. Whether its discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for Panel Webinar: Reducing Cyber Exposure from Cloud to Containers. Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, well walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, well walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, well walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, well walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, well walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Loodse     Published Date: Feb 06, 2019
Customers began to approach hosting provider SysEleven about running containers and using container orchestration. To offer their customers the highest quality services for which they are known, they sought an easy to use container orchestra- tion solution. SysEleven chose to partner with Loodse to create MetaKube, a white label of Loodses Kubermatic Container Engine, giving their customers Kubernetes clusters in one click. Simon Pearce, MetaKube Team Lead and Systems Architect at SysEleven, explains why they chose Kubermatic to run Kubernetes in their data centers.
Tags : 
    
Loodse
Published By: New Relic     Published Date: Oct 16, 2015
Shed light into your Docker containers
Tags : 
    
New Relic
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.