it architecture

Results 201 - 225 of 893Sort Results By: Published Date | Title | Company Name
Published By: Brocade     Published Date: Jun 07, 2016
Gilt Groupe needed to move to a cloud environment to boost scalability and cope with peaks in demand. This case study explores how Brocade technology simplified this process, enabling a multitiered, service-oriented architecture that would satisfy PCI DSS compliance.
Tags : 
brocade, gilt groupe, cloud environment, scalability, demand, multi-tiered architecture, service-oriented architecture, pci dss compliance
    
Brocade
Published By: Silver Peak     Published Date: Feb 11, 2016
This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organisations can use to evolve their WAN.
Tags : 
wan, wide area network, wide area networking, wan architecture, silver peak, network architecture, network management, virtualization, cloud computing, infrastructure, design and facilities
    
Silver Peak
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes todays, and tomorrows, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services, enterprise applications, network architecture, network performance, network performance management, network provisioning, network security, best practices, business intelligence, business management
    
Akamai Technologies
Published By: AWS     Published Date: Jun 15, 2016
If cloud architectures were human beings, their development stage would fall squarely in the middle of adolescence. Enterprises are at an inflection point with their cloud deployments as they migrate from ad hoc projects to full-fledged, mature, integrated cloud architectures. The discussion around cloud reflects the trepidation and uncertainty that come with adolescence: Cloud advocates express excitement, whereas others voice concern about these developments.
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Published By: Veritas & PureStorage     Published Date: Jun 23, 2017
As flash costs continue to drop and new, flash-driven designs help to magnify the compelling economic advantages AFAs offer relative to HDD-based designs, mainstream adoption of AFAs first for primary storage workloads and then ultimately for secondary storage workloads will accelerate. Well-designed AFAs that still leverage legacy interfaces like SAS will be able to meet many performance requirements over the next year or two. Those IT organisations that aim to best position themselves to handle future growth will want to look at next-generation AFA offerings, as the future is no longer flash-optimised architectures (implying that HDD design tenets had to be optimised around) it is flash-driven architectures.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Veritas & PureStorage
Published By: HP Inc.     Published Date: Dec 06, 2017
HP transforming manufacturing with breakthrough 3D printing technology. Our white paper uncovers one the 4th Industrial Revolution's most disruptive technologies. Reinvent your business with Multi Jet Fusion Technology. HP is ushering in a new era for manufacturing with Multi Jet Fusion technology. In this white paper, see how innovations such as high-speed synchronous architecture that builds parts layer-by-layer and HPs Multi Jet Fusion Open Platform are poised to redefine 3D printing.
Tags : 
printer, technical, hp3d, platform, manufacturing
    
HP Inc.
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download The Essential Guide to Infrastructure Machine Data for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Aug 21, 2018
Due to recent cyberattacks, security operations centers (SOCs) have had to focus on a holistic and cohesive security strategy by consolidating the right people, processes and technology to mitigate and remediate attacks. This white paper, The Five Essential Capabilities of an Analytics-Driven SOC, dives into the necessity of SOCs to be analytics driven and how it helps IT and business leaders assess their own risk levels. Download this white paper to to learn about: *How advanced analytics and machine learning are now critical hallmarks of the modern security platform *How proactively hunting and investigating threats can shore up defenses *Why adaptive security architectures, like Splunks, are needed to prevent, detect and respond to attacks in todays security landscape
Tags : 
    
Splunk
Published By: effectual     Published Date: Dec 03, 2018
Multi-Cloud, hybrid strategies add complexity Nearly 60% of businesses say they're moving toward hybrid IT enviornments that integrate on-premises systems and public cloud resources and enable workloads to be pleaced according to performance, security and dependency requirements. Identifying the best execution venue is a key cloud hurdle.
Tags : 
cloud enablement, cloud optimization, digital transformation, cloud migration, cloud computing, cloud architecture
    
effectual
Published By: HP Inc.     Published Date: Jun 13, 2018
HP is ushering in a new era for manufacturing with Multi Jet Fusion technology. In this white paper, see how innovations such as high-speed synchronous architecture that builds parts layer-by-layer and HPs Multi Jet Fusion Open Platform are poised to redefine 3D printing. Download the white paper
Tags : 
    
HP Inc.
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 17, 2015
Around the world, millions of patients remotely monitor vitals signs, download wellness applications, and get access to caregivers through mobile devices.
Tags : 
expand your market opportunities, diversify services, mobile phone, internet access, service providers, network, network architecture, mobile computing, mobile data systems, mobile workers, smart phones, wireless communications, wireless infrastructure, cloud computing
    
Cisco
Published By: Cisco     Published Date: Sep 17, 2015
This paper illustrates how Cisco Open Network architecture for service providers supports the software-driven applications, cloud capabilities, and business models that help you seize opportunities and get ahead.
Tags : 
cisco open network architecture, apis, service providers, virtualization, cloud computing, infrastructure, ip networks, network architecture, application security
    
Cisco
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of todays IT security was built to protect a well-defined network infrastructure, but that is yesterdays architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Juniper Networks     Published Date: Feb 01, 2016
Download this eGuide and learn the following: How the cloud and mobile have changed the enterprise How to manage the security risks of shadow IT Benefits and adoption strategies for shadow IT How the Juniper Unite architecture can help
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
In this paper from TechTarget you will examine: The six key considerations for building security into your architecture The value of an integrated and automated security strategy How the Juniper Unite architecture enables it all
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: May 19, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors Appian, bpmonline, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software and researched, analyzed, and scored them. The evaluation focused on providers adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, software vendors, software, enterprise applications
    
IBM
Published By: Lenovo - India     Published Date: Oct 11, 2018
Business expectations and demands on the data center are increasing and the impact on todays data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that theyre always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. Download this premium guide to understand how HCI can Provide the resilience, scalability and performance to run all your applications without compromise. Design the data center as a fluid resource that can immediately adapt to the evolving needs of the business. Enable agility with scale-out architecture that eliminates the need to rip and replace for seamless growth and scale.
Tags : 
    
Lenovo - India
Published By: BMC Software     Published Date: May 16, 2011
Learn how you can combine the benefits of traditional IT management with the dynamic potential of cloud architectures in this white paper.
Tags : 
bmc software, hybrid cloud delivery, cloud services management, bmc cloud lifecycle management, cloud service delivery, cloud resource management, service catalog establishment, hybrid cloud integration, cloud computing
    
BMC Software
Published By: iPass     Published Date: Apr 08, 2009
Learn what Forrester has uncovered in their latest report on Enteprise Mobility trends. During the past two years, Forrester has seen the number of enterprise mobility inquiries increase nearly 55%, jumping to 550-plus inquiries in 2008. In the past year, we have seen a spike in the number of inquiries focused on mobile network architecture, new types of mobile devices, and deploying vertically focused mobile applications that address the needs of workers in certain industries (e.g., retail, transportation, and healthcare).
Tags : 
forrester, wireless, infrastructure, fmc, fixed mobile convergence, network architecture, healthcare, retail, transportation, wimax, roi, return on investment, wlan, wimax, network management, wide area networks, pda, wireless communications
    
iPass
Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are moving away from monolithic scale-up approaches and adopting scale-out storage providing a powerful and flexible way to respond to the inevitable data growth and data management challenges in todays environments. With extensive data growth demands, there needs to be an increase in the levels of storage and application availability, performance, and scalability. Access this technical report that provides an overview of NetApp clustered Data ONTAP 8.2 and shows how it incorporates industry-leading unified architecture, non-disruptive operations, proven storage efficiency, and seamless scalability."
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations, storage, data center
    
NetApp
Published By: Polycom     Published Date: Oct 17, 2016
With demand for video conferencing growing rapidly, solutions need to provide a robust, resilient, scalable, and manageable infrastructure that delivers unparalleled quality of experience. The Polycom RealPresence Platform is the software infrastructure that underlies Polycoms video conferencing, and binds it together by integrating with core networking and security infrastructure. This enables secure collaboration for any number of users across heterogeneous networks, with up to 50% less bandwidth consumption than other competitor solutions. By delivering an architecture based upon open standards, Polycom has created a flexible, state of-the-art video conferencing platform that provides superior investment protection, at the lowest total cost of ownership. Download to learn more!
Tags : 
    
Polycom
Published By: McAfee     Published Date: Jan 20, 2015
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime, networking, network security appliance
    
McAfee
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.