architecture

Results 1401 - 1425 of 1530Sort Results By: Published Date | Title | Company Name
Published By: Storiant     Published Date: Apr 30, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : 
storage technologies, it storage vendors, storiant, storage infrastructures, automated storage, it management, knowledge management, data management
    
Storiant
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications
    
Stratus Technologies
Published By: StreamSets     Published Date: Sep 24, 2018
The advent of Apache Hadoop™ has led many organizations to replatform their existing architectures to reduce data management costs and find new ways to unlock the value of their data. One area that benefits from replatforming is the data warehouse. According to research firm Gartner, “starting in 2018, data warehouse managers will benefit from hybrid architectures that eliminate data silos by blending current best practices with ‘big data’ and other emerging technology types.” There’s undoubtedly a lot to ain by modernizing data warehouse architectures to leverage new technologies, however the replatforming process itself can be harder than it would at first appear. Hadoop projects are often taking longer than they need to create the promised benefits, and often times problems can be avoided if you know what to avoid from the onset.
Tags : 
replatforming, age, data, lake, apache, hadoop
    
StreamSets
Published By: StreamSets     Published Date: Dec 05, 2018
Enterprise analytics is quickly evolving into a democratized capability where anyone can access and act on all available information, often in real-time employing advanced techniques. But the complex, dynamic and urgent nature of modern data analytics demands a new approach to data integration. This paper proposes that DataOps, the application of DevOps practices to data analytics, is the best way to overcome these challenges to create an iterative build-operate process for data movement. Read this white paper to: Understand how modern data analytics create data integration challenges due to architectural complexity, operational blindness and data drift. Learn how DevOps pillars of automation and monitoring can create higher developer productivity, operational efficiency and business confidence in data. See specific examples of DataOps functionality being applied to data integration across modern architectures.
Tags : 
    
StreamSets
Published By: Success Factors     Published Date: Feb 06, 2014
Organizations in regulated industries struggle with adopting SaaS-based learning solutions because of specific documentation, record-keeping, and IT requirements that must be followed, and the need to comply with a range of Good Practice (GxP) requirements. With a cloud solution that supports GxP requirements, companies in regulated industries can address compliance challenges and deliver a validated environment with a cloud-based LMS.
Tags : 
good practice, gxp, learning management system, lms, cloud-based lms, saas-based learning solutions, human resources, e-learning
    
Success Factors
Published By: Sun Microsystems     Published Date: Nov 14, 2008
This free white paper reveals how businesses are benefiting from latest generation of open storage systems. Years ago, all servers were closed and proprietary; then open systems hit the market, combining rapid technological innovation with market-driven choice. In the white paper, you'll explore how open architectures are helping some of today's best-known enterprise names stay flexible and profitable.
Tags : 
open storage, sun, sun microsystems, opensolaris, iscsi, sas, hpc, web 2.0
    
Sun Microsystems
Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware
    
Sunbelt Software
Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile
    
Sybase
Published By: Sybase     Published Date: Dec 01, 2011
This paper explores how the right data management architecture can overcome these challenges.
Tags : 
analytics software, analytics server, analytics server software, data warehousing, data mining, data warehouse, data mining software, business intelligence data mining
    
Sybase
Published By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : 
hackers, information technology, symantec, verisign, web applications, business technology
    
Symantec
Published By: Symantec     Published Date: Jun 18, 2015
Learn about the growing complexities of the cloud and see why there is a growing complexity within IT security and what your organization must do to adapt.
Tags : 
enterprise it architecture, service-oriented architecture, hybrid environments, private and public clouds, user identity
    
Symantec
Published By: Symantec     Published Date: Mar 06, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture.
Tags : 
symantec, data protection, backup appliances, backup applications, data protection architecture, virtual enviornments
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Jul 09, 2017
This paper provides a brief recap of the functionality provided by web proxies, why proxy architecture is still a vital building block for a comprehensive web defense, and how web proxies can work with other solutions such as next-gen firewall (NGFW) to deepen the organization’s defenses against advanced web-based threats.
Tags : 
cybercrime, swg, secure web gateway, firewall, security., threat and vulnerability management
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: Symantec Corporation     Published Date: Jun 18, 2014
"Although many IT professionals believe that using self-signed SSL certificates can help their organizations lower security costs, the real numbers tell a different story. From data center infrastructure and physical security, to the hardware and software required, to the personnel needed to manage the certificate lifecycle, the true costs of self-signed SSL security can become very expensive, very fast. This paper explores the true total cost of ownership (TCO) for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration."
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Systemware     Published Date: Sep 07, 2018
Five key trends are shaping the enterprise content management (ECM) space. New business objectives, new market imperatives, and new cloud-based platforms compel technology and business decision makers to take a fresh look at their strategy and underlying platforms. This report will help enterprise architecture (EA) professionals make informed decisions about their content management agenda.
Tags : 
systemware, content management, digital transformation, content cloud, top key trends, intelligent information, data storage, enterprise content management
    
Systemware
Published By: Systemware     Published Date: Sep 07, 2018
How’s your digital transformation going? What processes are you focusing on? Who’s leading the transformation? What technologies are a priority? What challenges do you face? To answer these questions, tap into the Forrester Data Global Business Technographics® Business And Technology Services Survey of your peers. Digital business pros should open this infographic to see the state of digital transformation.
Tags : 
systemware, content management, digital transformation, content cloud, top key trends, intelligent information, data storage, enterprise content management
    
Systemware
Published By: Systinet     Published Date: Aug 21, 2009
As a strategy for creating a flexible and agile IT, service-oriented architecture (SOA) has gained considerable momentum in recent years, largely due to the advent of standards-based Web services.
Tags : 
web services security, web services, web service security, information management, business analytics, business metrics, system management software, programming application
    
Systinet
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf, networking
    
Tail-f Systems
Published By: TeamQuest     Published Date: Aug 21, 2012
The recent adoption of virtualization technologies lowers the amount of hardware required and reduces power consumption to some extent. But it also raises management complexity since there is no longer a permanent and exclusive relationship between physical resources and the software that runs on it. If you then choose to implement a Service Oriented Architecture (SOA) on top of that, the increase in complexity multiplies.
Tags : 
teamquest, capacity management. maturity model, business technology
    
TeamQuest
Start   Previous    48 49 50 51 52 53 54 55 56 57 58 59 60 61 62    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.