RSS feed Get our RSS feed

News by Topic

next generation computing

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
     Red Hat
By: Juniper Networks     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: Dell & Microsoft     Published Date: Aug 14, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
     Dell & Microsoft
By: HP - Enterprise     Published Date: Sep 27, 2013
Learn why you need to embrace next-generation firewalls to stay ahead of the newest threats to IT with this whitepaper from HP
Tags : next generation firewall, firewall, next-gen, whitepaper, cloud computing, virtualization, mobility
     HP - Enterprise
By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
     Intel
By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing. To make the most of these next-generation applications, you need a next-generation database. It must handle a massive volume of data while delivering high performance to support real-time analytics. At the same time, it must provide data availability for demanding applications, scalability for growth and flexibility for responding to changes.
Tags : database, applications, data availability, cognitive applications
     Group M_IBM Q1'18
By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi
     AMD
By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager
     Frontrange
By: Dell     Published Date: Sep 12, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
     Dell
By: IBM     Published Date: Oct 01, 2012
This IDC white paper discusses an important sea change happening in IT: the development of expert integrated systems.
Tags : expert integrated systems, virtual machines, converged systems, virtualization
     IBM
By: SafeNet     Published Date: Jan 14, 2014
The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access to the data and services they need. It is growing increasingly clear that organizations can’t meet these demands with legacy platforms—they need next-generation authentication. This paper examines why this need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Tags : authentication, next-generation, cloud computing, internet security, safenet
     SafeNet
By: Silver Peak     Published Date: Apr 18, 2014
Gartner has published its latest Magic Quadrant for WAN Optimization. Be among the first to get complimentary access to this new report now! Silver Peak is leading the way into a new era of software-defined WAN optimization. Now more than ever, organizations like yours depend on the wide area network to connect their data centers, branch offices and the cloud. They see that better network performance means better bottom-line results, and Silver Peak gives them the most comprehensive and flexible options for network acceleration, and the most innovative approach to the next-generation WAN.
Tags : wan optimization, silver peak, gartner, software-defined, wide area network, data centers, next-generation wan, netowork acceleration
     Silver Peak
By: IBM     Published Date: Sep 27, 2013
This IDC white paper discusses an important sea change happening in IT: the development of expert integrated systems.
Tags : expert integrated systems, converged systems, convergence, applications, enteprise application platform, integrated systems, computing, computing platform
     IBM
By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure
     IBM
By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation
     Cisco
By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
     Cisco
By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
     Cisco
By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : quocirca, application security, security
     Quocirca
By: Group M_IBM Q1'18     Published Date: Jan 08, 2018
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing.
Tags : database, applications, data availability, cognitive applications
     Group M_IBM Q1'18
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics