Skip to main content
 

app infrastructure

Results 1 - 25 of 1011Sort Results By: Published Date | Title | Company Name
Published By: TriNet     Published Date: Mar 13, 2013
Establishing a startup’s business infrastructure early — that is, establishing support in the areas of legal, accounting, tax, insurance, and human resources (HR) — provides a number of critical benefits for any entrepreneur to consider. This paper discusses suggestions for management teams that will facilitate establishment of an appropriate infrastructure.
Tags : 
    
TriNet
Published By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
    
NTT Ltd.
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether it’s speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
AWS Service Catalog is the tool for governing and managing your organization’s approved software and infrastructure services on AWS.
Tags : 
marketplace, security, catalog, aws, software, users, cloud, data
    
Amazon Web Services EMEA
Published By: NetApp APAC     Published Date: Jul 08, 2019
All-flash storage is on a strong growth trajectory, but the industry is not swooning naively over the blazing fast I/O speeds. Most IT managers are talking a mature, step-by-step approach to all-flash adoption. Falling per-gigabyte prices are making the technology more commonplace. Solid state drives are no longer just for specialized, high-performing tasks. Before they leap, however, storage professionals want to understand the full business picture as they formulate a winning strategy for putting all-flash storage to use for more workloads. This paper offers insights for business success with all-flash storage based on IT Central Station reviews. Real users weigh in on what it takes to get the most out of the technology. It covers such aspects of flash storage as the need for simplicity and the importance of flexibility. The paper also looks at how to build a business case for all-flash and think through the implications of issues such as integration with existing infrastructure.
Tags : 
    
NetApp APAC
Published By: NTT Ltd.     Published Date: Aug 05, 2019
Enterprises preparing for a digital future have much to consider when they modernise their network infrastructure and have to contend with connectivity demands from their business units, staff, and customers. In this e-book, leaders from different parts of our business provide their perspectives on how to approach digital transformation. In our experience at Dimension Data, now part of NTT Ltd., you can’t look at any one piece of the infrastructure puzzle without looking at all of it. And it’s the network that holds all those pieces together.
Tags : 
    
NTT Ltd.
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Data continues to grow at an astounding pace? As a result, data center space is becoming more scarce, as more arrays are acquired to store all of this data. Along with this data taking up space, it is also utilizing a great deal of power and cooling. In fact, the average data center in the U.S. uses approximately 34,000 kW of electricity each year, costing $180,000 in annual energy costs. As Infinidat set out to revolutionize the storage industry, one of our goals was to help consumers of storage build a more sustainable infrastructure that would be not only better for the environment, but also help them to save money as well. All of our patents come together to form InfiniBox, a storage solution that does just this.
Tags : 
    
Infinidat EMEA
Published By: Right Networks     Published Date: Aug 13, 2019
Transforming your firm doesn’t happen overnight. It takes time, patience and planning. However, the value of moving away from the old, transaction-based way of doing business and into a more modern model is immense. Consider getting to a place where you’ve built a cloud technology infrastructure that allows staff and clients to collaborate via access to real-time data and documents. Where you are running at peak efficiency. Build a business that’s modern. One that allows you to be a leader, not mired down in transactional work. It can be a reality. Our 3-step guide, courtesy of our friends at Rootworks, can help you transform your firm into one that will last well into the future and secure your legacy.
Tags : 
    
Right Networks
Published By: AWS     Published Date: Jul 26, 2019
What you'll learn in this webinar: When you migrate your databases and applications from Oracle to Amazon Aurora, you can take advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS) to optimize your operations so you can focus on innovation. Clckwrk analyzes your existing database environment and creates a plan to embrace an elastic, scalable, cloud-native database solution that can grow with your business and help you eliminate the exorbitant costs of commercial database licenses. Watch this webinar to learn how: You can accelerate your migration off Oracle databases to Amazon Aurora with minimized disruption to your business You can leverage refactor code to work in your new database Clckwrk can help you establish a unique migration strategy for your needs, supported by a consultation practice that covers discovery to implementation
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 25, 2019
What you'll learn in this webinar: Modernize your databases and applications by migrating to Amazon Aurora. Take advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS) to optimize your operations. TekStream, an AWS Partner Network (APN) Advanced Consulting Partner, specializes in migrating legacy on-premises databases to AWS. Watch this webinar to learn how TekStream helps you break free from commercial database licenses, such as Microsoft and Oracle, and move your databases to the cloud in order to focus on your core business. Watch our webinar to learn how TekStream can help you: Understand your options when migrating your databases to Amazon Aurora Reduce the annual maintenance and support costs associated with commercial database licenses See how the combination of business consultation and technology implementation can markedly improve operations
Tags : 
    
AWS
Published By: ASG Software Solutions     Published Date: Jul 20, 2009
Managing service delivery in todayís complex and dynamic business environments demands new and different approaches from IT. The explosive growth and the rate of change of information has brought particularly daunting challenges for IT that have contributed to incredibly complex underlying infrastructures. To get a true picture of all of the components necessary to support an IT or Business Service, you must access and bring together data that resides in disparate data silos throughout the enterprise.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
    
ASG Software Solutions
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®. Intel Inside®. Powerful Productivity Outside.
Tags : 
productivity, migration, security, support, hardware, software, devices, dell
    
Dell PC Lifecycle
Published By: HPE APAC     Published Date: Jun 20, 2017
This white paper shows IT architects, administrators, and DevOps developers how to deploy Docker hosts and execute containerized applications on bare-metal infrastructure.
Tags : 
infrastructure, bare--metal infrastructure, it transformation, business opportunities, operations
    
HPE APAC
Published By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : 
infrastructure, devops, agile, hpe, it transformation, enterprise
    
HPE APAC
Published By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat
Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
Artificial intelligence (AI) and machine learning (ML) are emerging technologies that will transform organizations faster than ever before. In the digital transformation era, success will be based on using analytics to discover the insights locked in the massive volume of data being generated today. Historically, these insights were discovered through manually intensive data analytics—but the amount of data continues to grow, as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.
Tags : 
    
Cisco
Published By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Speed time-to-value, improve end user experience of customer service applications.
Tags : 
user experience, time-to-value, customer service, applications, infrastructure, saas, business intelligence, network infrastructure
    
HP AppPulse Mobile
Published By: Cisco     Published Date: Dec 11, 2018
WAN edge infrastructure is changing rapidly as I&O leaders responsible for networking face dynamic business requirements, including new application architectures and on-premises and cloud-based deployment models. I&O leaders can use this research to identify vendors that best fit their requirements. By year-end 2023, more than 90% of WAN edge infrastructure refresh initiatives will be based on virtualized customer premises equipment (vCPE) platforms or software-defined WAN (SD-WAN) software/appliances versus traditional routers (up from less than 40% today).
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.