RSS feed Get our RSS feed

News by Topic

cloud era

Results 76 - 100 of 1343Sort Results By: Published Date | Title | Company Name
By: Cognizant     Published Date: Sep 21, 2017
The impact that state-of-the-art simulation and modeling techniques can have on supply chain operations.
Tags : data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
     Cognizant
By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
     Gigamon
By: IBM     Published Date: Mar 28, 2018
The global electronics industry is the cornerstone of the digital economy and the Internet of Things (IoT). Electronic devices act as conduits for users’ digital experiences, which are now seamlessly enabled and updated in the cloud. The industry’s digital device success has also introduced its latest challenge: going beyond the device. Leveraging data to drive insights is key to delivering greater value. Doing so requires electronics firms to flawlessly integrate hardware, software, services and data while learning from and adapting to users. Through Digital ReinventionTM, they can combine digital approaches and data by design to drive new capabilities, changing business from the ground up
Tags : 
     IBM
By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
     IBM
By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
     IBM
By: Tricentis     Published Date: Jan 08, 2018
In this guide you'll learn how to select and integrate the right test management solution for your team: • Why test management software? • How to buy: some general considerations • The 5 must-have features • Tips for evaluating & integrating your new solution • Where to get additional help BUT IT’S NOT ENOUGH. That’s because trends like agility, mobile and cloud computing have QA teams bursting at the seams. As a software development leader, you are under the gun to deliver higher-quality software at an accelerating cadence – and still find time to provide solid evidence of testing at any given moment. Test case management systems are – and have been – a clear value driver in development organizations. But many of these systems do not support today’s unique testing requirements. Potential cost of software defects to U.S. economy: $60B per year 35% of senior IT executives can’t deliver the quality they need to within their allocated budget
Tags : 
     Tricentis
By: Riverbed     Published Date: Jan 25, 2018
This Enterprise Management Associates® (EMA™) research summary, sponsored by Riverbed®, highlights some of the key findings of EMA’s landmark report, “Network Management Megatrends 2016: Managing Networks in the Era of the Internet of Things, Hybrid Cloud, and Advanced Network Analytics.” It examines several major areas of change and evolution affecting network management. These “megatrends” include hybrid cloud networking, the Internet of Things (IoT), advanced network analytics, network management outsourcing, and network management tool consolidation.
Tags : 
     Riverbed
By: Riverbed     Published Date: Jan 25, 2018
Applications underpin today’s cloud and digital transformation initiatives. As a result, it’s imperative for modern IT organizations to implement a holistic, expert approach to managing applications for maximum performance and optimal business execution. Read this insights paper from ESG and Riverbed to discover: How performance management expertise drives critical business outcomes. Why mature organizations are better equipped to embrace DevOps and other modern IT practices. What tools, factors, and behaviors correlate to expert performance management practices.
Tags : 
     Riverbed
By: Dell EMC & Intel     Published Date: Sep 06, 2018
Datacenter improvements have thus far focused on cost reduction and point solutions. Server consolidation, cloud computing, virtualization, and the implementation of flash storage capabilities have all helped reduce server sprawl, along with associated staffing and facilities costs. Converged systems — which combine compute, storage, and networking into a single system — are particularly effective in enabling organizations to reduce operational and staff expenses. These software-defined systems require only limited human intervention. Code imbedded in the software configures hardware and automates many previously manual processes, thereby dramatically reducing instances of human error. Concurrently, these technologies have enabled businesses to make incremental improvements to customer engagement and service delivery processes and strategies.
Tags : 
     Dell EMC & Intel
By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
     Dome9
By: B Channels     Published Date: Apr 27, 2018
bChannels has years of expertise in defining, building and delivering partner ecosystems. We have invested in understanding and developing discrete Hybrid Cloud ecosystem capabilities. Our solutions help our clients plan and deliver scalable Hybrid Cloud by showing an understanding of their market segments, then delivering on designing effective programs.
Tags : 
     B Channels
By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
     Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
     Fortinet EMEA
By: Oracle     Published Date: May 08, 2019
Oracle DBAs Share Insights about the Future of Cloud, Security, Artificial Intelligence, and Autonomous Computing. This year, in addition to canvasing analysts, pundits, and executives for their strategic insights, Oracle is interested in the tactical views, predictions, and opinions of master DBAs, database product experts, and Oracle ACE Directors. We gathered insights about database management, security, artificial intelligence, autonomous computing, and many other topics and cover how future trends will impact DBA careers during 2019, and beyond. The Intelligent Enterprise Era. Download predictions.
Tags : 
     Oracle
By: Oracle     Published Date: May 08, 2019
What if your database could install, manage, secure, and upgrade itself—with little or no manual administration required? Now it’s possible, thanks to machine learning, artificial intelligence and the power of the cloud. Discover how the Oracle Autonomous Database is: • Self-driving: Tell it the service level you want to achieve, and it does the rest. • Self-securing: It installs patches automatically and uses AI to counter threats. • Self-repairing: It patches, scales, and tunes itself while your operations are running, to deliver 99.995% uptime. Discover the power of autonomous data management. Download now.
Tags : 
     Oracle
By: HP Inc.     Published Date: May 21, 2019
Experience unmatched versatility for every single job. HP Indigo’s portfolio of sheet-fed digital presses offer the widest range of compatible substrates, specialty inks, and effects so you can make each application as unique as it can be. All powered by HP PrintOS, a unique cloud-based operating system. To find out more watch this video today!
Tags : 
     HP Inc.
By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Accelerator and Bird Hosting CEO Michael Wallace discusses how a turn-key private cloud platform has transformed his business, how Bird Hosting has improved its environmental footprint, and more.
Tags : ca technologies, cloud computing, bird hosting, data management
     CA Technologies
By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
     Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics