Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it platforms

Results 126 - 150 of 635Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: IBM     Published Date: Mar 13, 2014
This report takes an in-depth look at the primary challenges facing IT and how the IBM X6 Portfolio can deliver the performance needed as a solution to these challenges.
Tags : 
ibm, enterprise applications, data, server, memory, storage, management platforms
    
IBM
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Business and IT executives should not have to choose between their desire to innovate for future growth and the desire to avoid disrupting current operations. Enterprise innovation that embraces and extends existing infrastructure and applications is possible through modern software architectures such as web services and SOA – as long as those investments perform competitively when measured against alternative platforms and they are able to be modernized to participate in these architectures.
Tags : 
ca mainframe, mainframe, infrastructure, architecture, platforms, network architecture, network management
    
CA Mainframe
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity, wireless, enterprise applications
    
MobileIron
Published By: NetApp     Published Date: Mar 05, 2018
Read this vendor assessment from IDC and find out about the suitability of 10 vendors' AFA platforms for dense mixed enterprise workload consolidation. Discover the areas where the most differentiation between vendors was noted, including their strategies around NVMe and cloud-based predictive analytics.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
One of the most effective ways to address database performance and cost challenges is to modernize the underlying hardware infrastructure. Innovations such as flash storage, converged infrastructure architectures, and sophisticated data management platforms can have a major impact. Learn more in our free eBook: Optimizing Database Storage Performance For Dummies.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron
Published By: VMware AirWatch     Published Date: Jul 19, 2017
The workplace has changed radically, and conventional approaches to desktop management and mobile device management (MDM) are no longer adequate for the new digital workplace. Enterprise IT must quickly and dramatically change the way it manages users’ access to digital resources to deliver a consistent experience across all devices, even as operating systems and platforms relentlessly evolve. Fortunately, with the advent of Windows 10, IT now can rethink the way it aligns endpoint management with users’ new digital work styles. Read this UBM whitepaper to learn more about how these seven “musts” can help IT fully leverage Microsoft’s newest operating system to better serve the business.
Tags : 
    
VMware AirWatch
Published By: Oracle     Published Date: Jan 20, 2017
"Many large enterprises struggle to decide which workloads and systems should be deployed in the public cloud versus on premise. With a strong on-premises platform in place, organizations benefit from increased reliability, speed, and security. On the other hand, by leveraging the public cloud, they gain increased flexibility and recovery capabilities. So, what goes best where? Jim Rapoza, Senior Research Analysts at Aberdeen Group and Chuck Hollis, Senior VP at Oracle, will provide guidance aimed at helping organizations choose the right platforms for their critical workloads. They will analyze how Best-in-Class enterprises effectively integrate on-premises solutions and the public cloud, and recommend steps that businesses can take to become IT infrastructure leaders."
Tags : 
    
Oracle
Published By: Sprinklr     Published Date: Nov 22, 2016
In this social listening whitepaper, you'll learn that listening technology provides brands with the power to reach consumers via the digital platforms where they research, make, and discuss their purchasing decisions.
Tags : 
social listening, value, consumers, purchasing decisions, listening technology, listening, tools, whitepaper
    
Sprinklr
Published By: Carbonite     Published Date: Aug 02, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration.1 Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target
Tags : 
cloud migration, non-disruptive migration, cloud
    
Carbonite
Published By: Carbonite     Published Date: Oct 04, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration. Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target.
Tags : 
migration mistakes, operations, dependencies, expectation setting, contingency planning
    
Carbonite
Published By: TIBCO Software     Published Date: Aug 15, 2018
TIBCO Spotfire® Data Science is an enterprise big data analytics platform that can help your organization become a digital leader. The collaborative user-interface allows data scientists, data engineers, and business users to work together on data science projects. These cross-functional teams can build machine learning workflows in an intuitive web interface with a minimum of code, while still leveraging the power of big data platforms. Spotfire Data Science provides a complete array of tools (from visual workflows to Python notebooks) for the data scientist to work with data of any magnitude, and it connects natively to most sources of data, including Apache™ Hadoop®, Spark®, Hive®, and relational databases. While providing security and governance, the advanced analytic platform allows the analytics team to share and deploy predictive analytics and machine learning insights with the rest of the organization, white providing security and governance, driving action for the business.
Tags : 
    
TIBCO Software
Published By: Splunk     Published Date: Aug 17, 2018
Imagine a world where incident alerts arrive 30 minutes before problems even begin — you’d actually have the power to prevent outages and deliver a truly seamless experience to your customers. Sound impossible? Think again — the right AIOps (Artificial Intelligence for IT Operations) solution can help you maintain uptime, reduce manual incident-management tasks and increase productivity.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations are now responsible for delivering seamless customer experiences while preventing outages and managing an increasing number of systems. With growing responsibility placed on IT, there is an opportunity to drive strategy for company-wide business processes and operations. Companies using machine data powered platforms like Splunk collect disparate data types to quickly troubleshoot and monitor systems. By adding predictive capabilities, IT can glean critical insights for the business and develop strategic initiatives on issues that matter. Download the white paper “Embracing the Strategic Opportunity of IT” to learn how to: Enable a business aware IT organization Unlock operational efficiencies Solve problems with predictive analytics
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
The world of artificial intelligence (AI) has finally arrived at the doorstep of IT operations. As organizations move toward using both big data and machine learning functionality to support a variety of IT operations, processes and tasks, artificial intelligence for IT operations (AIOps) platforms have emerged as a one-stop solution. Gartner has released a “Market Guide for AIOps Platforms” that provides findings about the AIOps industry and its latest developments. Download your complimentary copy to: *Gain insight into the developing industry of AIOps and its future *Learn how to optimize IT operations powered by machine learning to drive business value *Compare different AIOps platform vendors and their range of capabilities
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Australian businesses have long been recognised as leaders in the adoption of cloud services and the migration of core infrastructure to cloud platforms. Yet as ambitious ‘cloud-first’ programs are executed, performance and complexity issues have led many organisations to embrace the middle ground – a hybrid IT solution combining public cloud and on-premises infrastructure. Fast-growing hyperconverged infrastructure (HCI) platforms are increasingly being recognised as an ideal enabler for this strategy, with a software-based design that combines robust computing infrastructure with a high degree of centralisation, integration, flexibility, and analytics-based monitoring and manageability. Read how companies such as Beam Suntory have redefined enterprise architecture and learn more about the way an integrated hyperconverged infrastructure can help you build the right infrastructure for the future.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this latest Data Science Central webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team a
Tags : 
    
Trifacta
Published By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team and how to align skill set
Tags : 
    
Trifacta
Published By: Attunity     Published Date: Nov 15, 2018
Change data capture (CDC) technology can modernize your data and analytics environment with scalable, efficient and real-time data replication that does not impact production systems. To realize these benefits, enterprises need to understand how this critical technology works, why it’s needed, and what their Fortune 500 peers have learned from their CDC implementations. This book serves as a practical guide for enterprise architects, data managers and CIOs as they enable modern data lake, streaming and cloud architectures with CDC. Read this book to understand: ? The rise of data lake, streaming and cloud platforms ? How CDC works and enables these architectures ? Case studies of leading-edge enterprises ? Planning and implementation approaches
Tags : 
optimize customer service
    
Attunity
Published By: Attunity     Published Date: Jan 14, 2019
This whitepaper explores how to automate your data lake pipeline to address common challenges including how to prevent data lakes from devolving into useless data swamps and how to deliver analytics-ready data via automation. Read Increase Data Lake ROI with Streaming Data Pipelines to learn about: • Common data lake origins and challenges including integrating diverse data from multiple data source platforms, including lakes on premises and in the cloud. • Delivering real-time integration, with change data capture (CDC) technology that integrates live transactions with the data lake. • Rethinking the data lake with multi-stage methodology, continuous data ingestion and merging processes that assemble a historical data store. • Leveraging a scalable and autonomous streaming data pipeline to deliver analytics-ready data sets for better business insights. Read this Attunity whitepaper now to get ahead on your data lake strategy in 2019.
Tags : 
data lake, data pipeline, change data capture, data swamp, hybrid data integration, data ingestion, streaming data, real-time data, big data, hadoop, agile analytics, cloud data lake, cloud data warehouse, data lake ingestion, data ingestion
    
Attunity
Published By: Gigamon     Published Date: Dec 13, 2018
"Security Delivery Platforms for Dummies" shows IT professionals how to transform the network deployment of security and monitoring tools for better efficiency and effectiveness. Learn how to detect threats faster by removing network blind spots, monitor what's happening across the global enterprise and optimize your security tools’ performance and efficacy. If you are responsible for protecting corporate networks or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.