architecture

Results 351 - 375 of 1408Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Sep 21, 2017
In order to achieve the five nines (aka, 99.999%), or higher availability, it is important to take a closer look at the design of your storage architecture systems. This paper offers a comprehensive method of assessing your current infrastructure, and provides insight into ways to transform your design to drive better outcomes.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
Introduction to Guaranteed Quality of Service is an in-depth account of the crucial importance of incorporating Quality of Service (QoS) technology within data storage architecture, outlining how QoS is the critical factor in enabling dependable storage performance for business-critical applications in a multi-tenant or enterprise infrastructure.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, service
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
An overview of EMC's ExtremIO architecture as it compares to NetApp SolidFire. Provides an overview of each solution's differences and their overall impact suitability needs of a next generation data center
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire, emc
    
NetApp
Published By: MobileIron     Published Date: Jul 31, 2015
To better understand what Windows 10 means for the modern enterprise, this white paper provides a technical overview of these and other new features in the latest OS release. It also includes a brief overview of how the enterprise architecture has evolved and how Windows 10 enables IT leaders to use this fundamental architecture shift as a catalyst for business transformation.
Tags : 
modern enterprise, enterprise architecture, business transformation, windows 10, security
    
MobileIron
Published By: MobileIron     Published Date: Jul 31, 2015
Windows 10 is a major OS overhaul that unifies device and security management for the modern enterprise architecture by converging separate OS versions onto one platform managed by an EMM console. This Infographic details 10 tips for ensuring you and your organization are ready to upgrade to Windows 10.
Tags : 
windows 10, emm, enterprise mobile management, mobile it administrators, security
    
MobileIron
Published By: Dell EMC     Published Date: May 15, 2015
Swiss analyst, Storage Switzerland, reports on the importance of customers assessing the right fit for a data center and workloads, specifically when evaluating an all-flash array solution.
Tags : 
emc, storage switzerland, all-flash, architectures, workload, data center, scale, storage, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : 
emc, storage all-flash, architectures, workload, data center, scale, storage, hybrid, vendor profiles, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
See how XtremIO redefined paradigms in the legal services marketplace for the US-based company, Clutch Group.
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, vendor profiles, legal services, clutch, compliance, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
This SQL Database focused case study is based on Connections Education, an online US-based education leader. Learn how this online education leader chooses EMC XtremIO to manage unpredictably fast growth.
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, xtremio, scalable, development, roi, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, xtremio, ehr, analytics, healthcare, icd-10, data management, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 15, 2015
This Wikibon research shows that flash will become the lowest cost media for almost all storage from 2016 and beyond, and that a shared data philosophy is required to maximize the potential from both storage cost and application functionality perspectives.
Tags : 
emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, analytics, infrastructure, data management, business technology
    
Dell EMC
Published By: VMware AirWatch     Published Date: Feb 21, 2017
Download this infographic to learn how VMware Workspace™ ONE™ helps more organizations compete in the mobile cloud era by providing productivity-enhancing capabilities that are simply better. Tailored to uniquely provide both end-user mobility and IT control, VMware mobile-cloud architecture addresses the needs of today’s organizations more effectively than Citrix.
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: Jun 03, 2016
Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Okta is the identity management foundation for a cloud-first IT architecture that enables you to take the lead in adopting new applications and enabling mobile for your organization to drive growth. In this webinar with Okta, and customer Medallia, learn about the benefits of Okta Provisioning to maximize security, efficiency and productivity, and how Medallia recognized significant IT savings and >900% ROI. Speakers: Ed Sawma, Director Product Marketing, Okta Jonathan Hansen, Head of IT, Medallia
Tags : 
    
Okta
Published By: Rackspace     Published Date: Mar 28, 2018
Many businesses want to realize the power of Google Cloud Platform (GCP) without having to incur the challenge and expense of managing it themselves. Some businesses lack the technical expertise or capacity to operate cloud infrastructure, tools and applications while others may have the ability but choose to maintain focus on their core business. Many larger businesses are on a multi-phased journey to the cloud, requiring transition and management services that can adapt to an evolving set of needs. Rackspace Managed Services for Google Cloud Platform is the answer for businesses facing these challenges. As Google’s first Premier Managed Services Partner, Rackspace blends technology and automation plus human expertise to deliver ongoing architecture, security and 24x7x365 operations backed by GCP-certified engineers and architects.
Tags : 
    
Rackspace
Published By: Ping Identity     Published Date: Feb 12, 2016
Many enterprises today are actively pursuing mobile device initiatives—largely driven by the desire to support BYOD, which holds high potential for productivity gains as well as improved employee satisfaction.
Tags : 
    
Ping Identity
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
forrester, wave, web, application, firewalls, akamai
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Functionality, cost effectiveness and efficiency drive your firm. Apply those standards to sharing large files if you want to beat competitors who use standard, less professional file-sharing tools with clients. Read this e-book to discover how you and your firm can: Avoid the unreliability and time-consuming limitations of FTP and email. Stop breaking up files and start tracking their status. Increase the speed of transferring proposals, specs and more without sacrificing security.
Tags : 
cost effectiveness, efficiency, data sharing, data security
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Today’s DevOps and agile–loving enterprises are striving for fast changes and quick deployments. To these companies, the microservices architecture is a boon, but not a silver bullet. Organizations can enable smaller development teams with more autonomy and agility, and as a result, the business will notice IT being more in tune with their changing demands.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
You want to deliver new innovations, release apps faster and take advantage of new opportunities, but legacy applications and infrastructure are holding you back. Transition to a modern architecture by decomposing monolithic applications into agile microservices—independently created, managed and scaled. Your business will be able to act faster and developers will love the easy access to APIs that give them the freedom to focus on customer experience.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : 
data protection, msps, data storage, scale out data protection
    
Commvault ABM Oct
Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.