Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

auto

Results 326 - 350 of 2966Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 21, 2011
This book provides a practical set of detailed steps to implement an Information Governance program, as well as the associated automation.
Tags : 
    
IBM
Published By: Dell Storage     Published Date: Apr 17, 2012
This webcast discusses the ins and outs of automated storage tiering, and the 4 key ways it can boost your data center efficiency.
Tags : 
    
Dell Storage
Published By: HP     Published Date: Jan 18, 2013
Virtualization increases the agility and flexibility of IT organizations looking to leverage automated self-service - giving birth to cloud service. Read to learn more about the troubles traditional storage systems have with cloud and keeping pace.
Tags : 
hp technology, services for storage solutions, hp teech, white papers, virtualization, it management, data center
    
HP
Published By: HP     Published Date: Mar 14, 2013
HP Webinar
Tags : 
hp software. 11.5 suite, automates functional, integrated developer environment, ide
    
HP
Published By: HP     Published Date: Mar 15, 2013
HP Webinar: Automate Your Way to the Pragmatic Cloud
Tags : 
    
HP
Published By: Salesforce.com     Published Date: Jul 16, 2013
Sales managers have faced the same challenges since long before CRM applications were invented. However, new tools and technologies are making their jobs easier. The future of sales performance management is integrated with CRM and social collaboration. It helps managers provide real-time coaching and motivation in context to drive better sales behaviors and, ultimately, better sales results.
Tags : 
sales force automation, sales performance management, social performance management, crm applications, social collaboration
    
Salesforce.com
Published By: Juniper Networks     Published Date: Sep 10, 2014
Get our Practical Guide to enhancing business agility with network automation and orchestration. Find out how simplifying orchestration and operations will help you unlock the value in your applications, and maximize business efficiency.
Tags : 
business agility, network automation, network orchestration, business efficiency, sdn, architectual simplifications, network management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Nov 06, 2014
Hear the views of 250 network professionals in this Webinar with GigaOM Research and Juniper Networks. Like-minded professionals speak on effective cloud adoption, the potential of software-defined networking and network automation.
Tags : 
gigaom, cloud adoption, network professionals, software-defined networking, network automation, cloud
    
Juniper Networks
Published By: Juniper Networks     Published Date: Nov 06, 2014
Simplified and automated networks deliver business agility. In this Webinar, experts from IDC, Shutterstock and Juniper discuss how to transition to network virtualization and look at benefits of SDN and automating their networks.
Tags : 
automated networks, network virtualization, benefits of sdv, business agility, simplified networks
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
As application workloads are redefined, data centers must change. This IDC Whitepaper looks at how network automation and orchestration can aid this transition, building simpler and more agile networks.
Tags : 
network automation, cloud datacenter, data traffic, network architecture, seamless integration, cloud orchestration
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 28, 2014
To learn how to simplify network operations to bring apps to market more quickly and reliably, get our eBook on network automation. Read about how you can make the most of the cloud with SDN and open, intelligent network architectures.
Tags : 
network automation, cloud, juniper, best practices
    
Juniper Networks
Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management, apt, automated applications
    
Venafi
Published By: MobileIron     Published Date: Aug 04, 2016
Office 365 est la suite de productivité cloud de Microsoft. Elle comprend une version en ligne des solutions les plus connues de Microsoft, comme Exchange et SharePoint, un espace de stockage avec OneDrive et plusieurs applications mobiles, dont Word, Excel, PowerPoint, OneNote, Outlook, Publisher, Skype for Business et Yammer. Office 365 est au coeur de la stratégie d'évolution de Microsoft qui tend à devenir un fournisseur de solutions et de logiciels axés sur le mobile et le cloud. De nombreux clients MobileIron organisent également leur stratégie de productivité autour de cette suite en raison de l'utilisation croissante d'Office sur les appareils mobiles plutôt que sur les ordinateurs traditionnels. Dans ce contexte, ils exigent de pouvoir sécuriser et déployer Office 365 sur les appareils mobiles avec nos solutions.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss, security
    
Vectra Networks
Published By: Dynatrace     Published Date: Dec 16, 2015
This eBook is inspired by the famous 6th century Chinese manuscript: The Art of War. Today, we will embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly.
Tags : 
dynatrace, devops, application development, automated testing, performance monitoring, software development, enterprise applications
    
Dynatrace
Published By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks
Published By: Red Hat     Published Date: Jun 23, 2016
CA Technologies, a software company servicing the majority of the Global Fortune 500, wanted to help its internal development teams get its world-class apps to market faster. By using OpenShift Enterprise by Red Hat, CA Technologies was able to provide a Platform-as-a-Service (PaaS) for its internal teams to more quickly build and deploy Software-as-a Service (SaaS) applications for its external customers. Development times dropped from months to weeks in most cases. In addition, the new system offers maximum scalability by automatically spinning up or spinning down servers based on user load.
Tags : 
technology, best practices, global fortune 500, development, productivity
    
Red Hat
Published By: Red Hat     Published Date: Jun 23, 2016
Amadeus is a leading provider of innovative technology solutions for the global travel industry. To meet changing customer demand, the €4 billion company needed a new computing platform that was highly available, flexible, and tolerant to infrastructure fluctuations. Amadeus chose OpenShift Enterprise by Red Hat as the foundation for its new application infrastructure. When the project is complete, Amadeus expects the cloud solution to decrease system latency for better customer service, increase platform availability, streamline operations through automation, and reduce time to market for new services.
Tags : 
enterprise, best practices, productivity, technology, cloud solution
    
Red Hat
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
This paper introduces five architectural principles guiding the development of the next generation data center (NGDC). It describes key market influences leading a fundamental enterprise IT transformation and the technological trends that support it. The five principles are: scale-out, guaranteed performance, automated management, data assurance, and global efficiencies. Cloud infrastructure delivery models such as IaaS, private clouds, and software-defined data centers (SDDC) are foundations for the NGDC. In an era where IT is expected to ensure productiongrade support with a plethoric flow of new applications and data, these models demonstrate how to eliminate bottlenecks, increase self-service, and move the business forward. The NGDC applies a software-defined everything (SDx) discipline in a traditional, hardware-centric business to gain business advantage.
Tags : 
    
SolidFire_NetApp
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
OAuth ist ein relativ neuer Webstandard zur Autorisierung des eingeschränkten Zugriffs auf Anwendungen und Daten. Er sorgt dafür, dass Anwender Drittanbieterkunden, etwa Fotodruckwebseiten, eingeschränkten Zugriff auf ihre Ressourcen gewähren können, z. B. auf Bilder auf Webseiten wie Flickr oder SmugMug. Bisher forderte der Client den Anwender üblicherweise zur Eingabe von Anwenderrnamen und Passwort auf – eine täuschend einfache Bitte, die ein inakzeptables Security-Risiko birgt. OAuth bietet im Gegensatz dazu ein Modell der geringstmöglichen Zugriffsrechte. Anwender können dabei mithilfe eines funktional begrenzten Tokens eingeschränkten Zugriff auf ihre Anwendungen und Daten gewähren.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
    
CA Technologies
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.