Skip to main content
 

open enterprise

Results 1 - 25 of 143Sort Results By: Published Date | Title | Company Name
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Robotic process automation (RPA) has emerged as a hugely popular business-IT priority – and with good reason. RPA platforms grow more and more sophisticated by the day, opening up fresh automation opportunities throughout the enterprise and business. But RPA platforms generally aren’t a one-size-fits-all investment. In this market guide, find out how the top RPA vendors stack up against one another on key investment criteria, including ideal use cases, unique RPA capabilities, and more.
Tags : 
    
Automation Anywhere APAC
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: MuleSoft     Published Date: Jan 16, 2018
To achieve efficiencies in today’s turbulent economic climate, government entities need to integrate legacy applications with modern systems and web services. Orchestration between multiple systems across various departments and municipalities is needed to deliver quality public services. At the same time, public sector agencies face aggressive timelines and budget constraints, changing constituent needs, and open source policies. Learn how utilizing a lightweight, standalone Enterprise Service Bus (ESB) enables government entities to meet these key challenges and deliver vital public goods while cutting costs. Evalute important decisions: Achieving efficiencies in today’s turbulent budgetary environment Time to Delivery and Budget Constraints Constituent Needs and Public Value Open Source Policies & Initiatives The Software Architecture for Government Learn to deliver projects within tight schedules and fiscal constraints - download now.
Tags : 
    
MuleSoft
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).
Tags : 
byoid, security, byoid strategy, it and business views on byoid, bring your own identity
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.
Tags : 
byod, identity, byoid benefits
    
CA Technologies
Published By: Oracle EMEA     Published Date: Apr 15, 2019
Emerging technologies and automation permeate every aspect of our work and lives today. The real opportunity of these technologies — which include artificial intelligence (AI), machine learning, the Internet of Things (IoT), and human interfaces — is to enable us to embrace innovation on a scale never seen before. These technologies help us reimagine what’s possible in work and in life - from self-driving cars and personalized medicine to precision agriculture and smart cities that are changing the way we experience our world. Autonomous opens a new world of opportunities for enterprises. Autonomous Database for Dummies consists of five chapters that describe emerging technology trends and the business value of autonomous. Download this whitepaper to discover the business value of autonomous, Deploy a data warehouse in seconds and more!
Tags : 
    
Oracle EMEA
Published By: Red Hat Government     Published Date: Jul 21, 2011
This whitepaper describes the various forms that cloud computing can take and how different types of technology relate to each other.
Tags : 
red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, jboss
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
An IDC executive report examines the future of cloud computing, focusing on design goals that support portability of applications and data, which will certainly avoid expensive and time-consuming fixes.
Tags : 
cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Learn how your organization can deliver self-service application provisioning, flexible and standardized application deployments, and integrated management, without losing control or radically change existing management and development processes.
Tags : 
red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, jboss, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Learn how CloudForms fully delivers on your requirements to increase business agility, efficiency, innovation, and simplified IT management.
Tags : 
cloudforms, red hat, iaas, infrastructure, service, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, jboss, government, cloud
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
The Red Hat Cloud Quickstart consulting engagement leverages Red Hat's Cloud Foundations Reference Architecture Edition One to speed up assessing the viability of a cloud environment for your enterprise, and, if chosen, it can demonstrate a tangible implementation of a private cloud for testing purposes.
Tags : 
cloud quickstart, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Do you have an effective cloud governance plan? This whitepaper guides you through best practices for ensuring your applications and data can safely move between clouds - whether they are private, public or hybrid.
Tags : 
cloud governance, governance, consistency, portability, consistant, portable, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Organizations around the world are benefiting from public clouds. But, when production applications or critical data is involved, it's important to extend on-premise governance to your public or hybrid cloud resources. Effective cloud governance is possible.
Tags : 
cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Virtualization and cloud computing are sometimes discussed interchangeably. But gaining the full benefits of cloud computing requires approaches and processes that often aren't in place where ad hoc virtualization is the norm. Join us and learn how to make a smooth transition.
Tags : 
cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat     Published Date: Jan 01, 2013
Linux has long since staked its claim to the cloud. Red Hat Enterprise Linux, with its consistency, stability, scalability, and support, is in a class of its own. Offering an outstanding environment for application deployment and the economy and innovation of open source, Red Hat Enterprise Linux also provides the reliability you need.
Tags : 
cloud system, consistency, stability, scalability, support, application deployment
    
Red Hat
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat
Published By: Red Hat     Published Date: Jan 06, 2014
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 06, 2014
Growing business demand for new applications has put a strain on IT organizations leading to the need for an effective PaaS to accelerate app development processes. Explore PaaS market trends, benefits and an in-depth look at OpenShift Enterprise by Red Hat in this IDC Technology Spotlight.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 06, 2014
Struggling to keep up with increasing application demand? Platform as a Service (PaaS) can streamline application development processes and make resource management easy with auto-scaling and consistent integration. Learn how OpenShift Enterprise can help architects standardize development processes, while letting developers focus on their code.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Red Hat     Published Date: Jan 08, 2014
OpenStack is an open source cloud system software project that has broad participation from the IT Industry. IDC evaluates the current situation and provides a future outlook evaluating the deployment and support model and addressing OpenStack enterprise features and support.
Tags : 
idc, openstack, red hat, virtualization, cloud, cloud, cloud software, storage, networking, integration, infrastructure
    
Red Hat
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices
    
Red Hat
Published By: Red Hat     Published Date: Feb 01, 2013
IDC looked at the growing capabilities of open source KVM as a hypervisor for Linux and Windows. In particular, they noted that oVirt, commercially supported by Red Hat with Red Hat Enterprise Virtualization, has emerged as the open source standard for base KVM management.
Tags : 
idc, red hat, virtualization, enterprise grade, server virtualization, deployment method, virtual servers, operating system, cloud system, multihypervisor adoption
    
Red Hat
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.