Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it structure

Results 326 - 350 of 3493Sort Results By: Published Date | Title | Company Name
Published By: Rackspace     Published Date: Mar 07, 2019
SapientRazorfish is a global company that helps organizations in digital business transformation. For these enterprises, cloud migration is a mandate, and SapientRazorfish ensures the desired outcomes are achieved with Rackspace Fanatical Support for AWS services – to provide clients with expertise in planning, architecture services and counseling, migration, deployment, infrastructure maintenance and solution optimization.
Tags : 
    
Rackspace
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks
Published By: IBM APAC     Published Date: Mar 06, 2019
A cyber resilient enterprise is one that can prevent, detect, contain and recover from a myriad of serious threats against data, applications and IT infrastructure. The Ponemon Institute and IBM surveyed more than 2,848 IT and IT security professionals from around the world and released the findings of the third annual study on the importance of cyber resilience for a strong security posture.
Tags : 
    
IBM APAC
Published By: Oracle     Published Date: Mar 01, 2019
Discover real-life customer stories and see how Oracle IaaS can transform your organization.
Tags : 
    
Oracle
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
The scalability of its EP-LAN lets MMC Corp seize new opportunities without adding infrastructure. For example, Scales and Trusler are looking at virtual desktops or virtual desktop image [VDI] files for some offices and even job sites. “We’ll probably have to scale some bandwidth internally for that,” Trusler notes, “but if we do the VDI internally or we do it with an external third party, it doesn’t really matter… because we can get them on that EP-LAN network and we can get the bandwidth that we need… quickly.” EP-LAN is scalable. In most cases, adding additional services at a specific customer location can easily be turned up by Spectrum Enterprise remotely. Choosing a fiber EP-LAN over MPLS not only met the challenge to connect MMC Corp locations: it created an IT platform that continues to scale to support rapid expansion and innovation.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
    
Spectrum Enterprise
Published By: Group M_IBM Q119     Published Date: Mar 01, 2019
The velocity of technology infrastructure change continues to accelerate, putting serious stress on Security Operations (SecOps). This has forced security folks to face the fact that operations has never really been their forte. That’s a bit harsh, but denial never helps address problems. The evidence is fairly strong that most organizations are pretty bad at security operations. How many high-profile breaches could have been avoided if one of many alerts was acted upon? How many attacks were made possible by not having properly patched servers or infrastructure? How many successful compromises resulted from human error?
Tags : 
    
Group M_IBM Q119
Published By: Dell APAC     Published Date: Mar 01, 2019
With Dell EMC, you will be ready for your next step. Improve efficiency and ready your organization for expansion with secure and purpose-built solution, from devices to infrastructure.
Tags : 
    
Dell APAC
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya
Published By: Red Hat     Published Date: Feb 25, 2019
How to strike the balance between your existing systems and emerging technologies. Many organizations are struggling with the pressure to adopt cloud-native architectures while maintaining existing conventional systems. A virtualized infrastructure can connect your new and old systems. This IDC paper helps you achieve the ideal balance by: Embracing the new without disrupting the current infrastructure. Preparing for next-generation computing requirements. Enabling agile application delivery to compete and win. Read the IDC whitepaper to learn more about balancing your investment in new and existing systems.
Tags : 
    
Red Hat
Published By: Oracle     Published Date: Feb 22, 2019
Is your business looking to leverage the benefits of the Cloud, but isn’t clear on how to get there with existing applications running on the Oracle Database? Register for our webcast to see how: • in a few simple steps you can move your application and Oracle database to the Oracle Cloud • you can easily scale up or down infrastructure services use based on your needs • you can leverage the benefits of the Oracle Cloud - sink hardware costs, reduce capital expenditure, decrease provisioning time, increase productivity and accelerate time to market. Reap the benefits from the Oracle Cloud today. Register for this webcast now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Feb 22, 2019
Successful digital business depends on fast, reliable,and secure applications. Threats of service disruptions from performance slow downs, availability outages, or security incidents are driving IT organizations and service providers to double down on comprehensive system management solutions across infrastructure, applications, and end-user devices.
Tags : 
    
Oracle
Published By: Red Hat     Published Date: Feb 22, 2019
De nombreuses entreprises ont investi massivement pour se doter d'une infrastructure et de plateformes qui forment la base de leur environnement informatique. Mais au fil des années et de l'acquisition et de l'ajout de nouveaux systèmes, la dette technique s'accumule. Les infrastructures, applications et processus vieillissants génèrent des problèmes de coûts, d'entretien et de sécurité.— En parallèle, les entreprises concernées doivent impérativement se moderniser et mettre en œuvre de nouvelles technologies pour rester compétitives. Pour cela, elles doivent déplacer ou migrer leurs charges de travail vers des plateformes capables de leur apporter davantage d'efficacité, de sécurité et de flexibilité.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
Linux est désormais le système d'exploitation de référence pour les infrastructures cloud et le moyen de distribution privilégié des applications modernes. Ceci est dû en partie à la fiabilité de cet environnement à la fois évolutif et sécurisé qui prend en charge de nombreuses applications. Red Hat Enterprise Linux s'appuie sur cette confiance et cette crédibilité pour proposer un environnement d'entreprise adapté et renforcé qui vous permet de réduire vos coûts d'exploitation et de bénéficier de performances supérieures en termes de fiabilité, de disponibilité et d'évolutivité. Le résultat est un meilleur retour sur investissement pour les entreprises clientes. Téléchargez l'étude d'IDC pour en savoir plus.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
Dans ce rapport d’analyse, IDC se penche sur le défi auquel font face les entreprises actuellement pour équilibrer leurs investissements dans les infrastructures en place dans le but d’améliorer l’efficacité et de moderniser leur datacenter, tout en répondant simultanément au besoin d’adopter de nouvelles techniques de développement et de déploiement des technologies apportant la promesse d’améliorations significatives en termes de productivité des développeurs, d’agilité opérationnelle et de gestion des cycles de vie à moindre coût. IDC fournit des informations approfondies sur les options à la portée des entreprises pour atteindre ces objectifs à l’aide d’une infrastructure capable de prendre en charge les applications actuelles et celles de prochaine génération, ainsi que sur le rôle joué par la standardisation et la modernisation dans l’atteinte des objectifs d’optimisation opérationnelle.
Tags : 
    
Red Hat
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q119
Published By: Apstra     Published Date: Feb 21, 2019
When Bloomberg Television opened its state-of-the-art broadcast facility in the company’s new European Headquarters in London last year, network engineers from the company’s IT infrastructure team collaborated with Apstra to successfully pilot its technology in order to gain visibility across and more effectively manage the network fabric supporting the building’s media production systems.
Tags : 
apstra, bloomberg, network engineering
    
Apstra
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Gigamon     Published Date: Feb 20, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: Dell EMC     Published Date: Feb 14, 2019
Technology is quickly moving to the forefront as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. Read this executive summary from Dell and Intel® to learn why businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.