Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

red hat

Results 1 - 25 of 1628Sort Results By: Published Date | Title | Company Name
Published By: Chatsworth     Published Date: Nov 09, 2017
This 8 page, white paper details the key elements required for a successful data center cabinet ecosystem. Written by David Knapp and Ashish Moondra, Chatsworth Products
Tags : 
data center, chatsworth, cabinets, networking, security, telecom
    
Chatsworth
Published By: Schneider Electric     Published Date: Jun 01, 2016
Earlier this year, Schneider Electric launched its preconfigured edge datacenter resources with its SmartBunker and SmartShelter products. In developing these products, Schneider closely examined the requirements for successful, secure, rapid edge deployments in support of the explosion of edge data. The result is a standardized solution that can be customized as required and deployed virtually anywhere.
Tags : 
data center, idc, schneider, iot schneider_uk
    
Schneider Electric
Published By: Citrix     Published Date: Jul 14, 2016
Reduce IT Costs and Unlock Benefits - That's what most IT infrastructures want to do. This FREE paper covers Cost Savings and Business Benefits of Netscaler, the new application from Citrix.
Tags : 
efficiency, security, infrastructure, wan, virtualisation, citrix_uk/eu, telecom, data center
    
Citrix
Published By: Anixter     Published Date: Nov 23, 2015
This report tackles the challenges, standards and best approaches to thermal efficiency in existing facilities largely due to them being more prevalent when compared to a new facility. You will be introduced to four best practices that are absolutely critical to achieving an optimal thermal environment. The report also explores the future of datacenter cooling and introduces emerging technologies.
Tags : 
thermal efficiency, data centers, anixter, data center
    
Anixter
Published By: SimpliVity     Published Date: Jan 07, 2016
There’s no denying that hyperconverged infrastructure is hot right now, promising to dramatically shift the way infrastructure is procured, deployed and managed. But questions remain. Is it actually addressing the real-world concerns faced by real-world customers? What are the catalysts driving organizations to evaluate hyperconvergence and are they finding that the results match the hype when they actually do deploy? Get the fast facts from this SimpliVity eBook based on research from ActualTech Media, segmented and re-analyzed just for EMEA.
Tags : 
desktop virtualisation, cloud computing, cloud management, networking, data center
    
SimpliVity
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
Published By: Dell     Published Date: Dec 12, 2017
Read this report to learn how your conference rooms can transition from a wired and often cluttered loss of time to an improved collaborative workspace. With increases in efficiency you can enjoy less time worrying about if and how technology will work and more time on what truly matters. See what the Dell OptiPlex 7050 Micro desktop as a hub in conjunction with Intel ® Unite™ host software can do for your collaboration initiatives.
Tags : 
    
Dell
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Secondary DNS (sometimes referred to as multi-DNS) operates in an “always on” manner to complement your existing infrastructure as an additional authoritative DNS service. When an end user’s recursive server initiates a DNS request, both the “primary” DNS service and the “secondary” DNS will respond as soon as they receive the request. The response that reaches the recursive server first will be passed back to the end user, completing their request.
Tags : 
dns, service, server, infrastructure, technology, business, optimization
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Before Bad Things Happen – Be Prepared Providing a great user experience is always the goal, and the best way to achieve that is by having a well-thought-out digital business continuity strategy. You can’t always know what type of disruption you’ll face next, but you can be sure that there will be one. It may come in the form of a broken connection but, even more likely, the availability of the application or host. DNS active failover ensures real-time failover to healthy endpoints, allowing you to extend your business continuity solution to the user edge.
Tags : 
dns, digital, business, geographically, server, online, retailers
    
Oracle Dyn
Published By: Carbonite     Published Date: Jan 04, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: Workday     Published Date: Jun 05, 2017
Today’s banks, credit unions, asset management firms, lending companies, and other financial services businesses operate in a highly competitive and regulated environment. Servicing clients, introducing new products and channels, and opening new markets as well as having insight into your loans, investments, and deposits is critical to your bottom line. At the same time, employing the right people is what drives your future. Workday provides financial management, human capital management, and planning/ budgeting in a single cloud-based system to support your needs.
Tags : 
    
Workday
Published By: Workday     Published Date: Nov 28, 2017
In this episode of “In Good Company,” Meredith Coughlin, assistant dean of enterprise systems at Indian River State College, and Sean Hanna, analyst of student systems at the University of Rochester, discuss the current challenges higher education institutions face as the traditional path to degree completion has evolved. What measures can schools take today to help students of all backgrounds achieve academic success and prepare for productive careers, and what role can technology play? Watch to find out.
Tags : 
    
Workday
Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : 
enterprise mobile security, mobile security risk, risk reduction, device security
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The adoption of mobile in the enterprise space is accelerating. Users of mobile devices choose what applications they want to use, but it is up to the enterprise to predict the data that they will be accessing. With that change, comes a new spectrum of risk that CISOs must consider.
Tags : 
mobile security, mobile devices, device security, enterprise mobile security, enterprise mobile management
    
Lookout
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report
    
Fiserv
Published By: Cloud Direct     Published Date: Jan 17, 2018
Clearly, data centre modernisation can achieve a wide variety of business benefits for an equally wide variety of organisations. Data centre modernisation programmes are also far reaching. They reach way beyond the desire to merely reduce costs. They add significant business value, and often become the essential cornerstone of digital transformation. When starting on your own path towards modernisation, it’s vital to recognise that your success depends on making use of advanced public cloud services that sit at the vanguard of enterprise technology’s capabilities. If they don’t, you risk not being able to gain access to a world of new possibilities.
Tags : 
applications, data, run time, middleware, operating system, virtualisation, servers, storage
    
Cloud Direct
Published By: IBM     Published Date: Nov 14, 2017
Data is the hottest topic in business today. In discussions that range from understanding performance to predicting future outcomes, data is at the core. However, data has a bad reputation. Because businesses have been collecting data for decades, the amount that we must analyze can seem insurmountable. Simply saying “data” is enough to conjure images of someone poring over a thick stack of spreadsheets, manually going through row after row to identify performance, trends and figure out what to do with them. This intimidating view is all too common.
Tags : 
data, ibm, data insight, data analytics
    
IBM
Published By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jan 02, 2018
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications.
Tags : 
    
Red Hat
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.