Skip to main content
 

open source

Results 226 - 248 of 248Sort Results By: Published Date | Title | Company Name
Published By: SBE     Published Date: Nov 17, 2006
This white paper covers the use of new growth-oriented file systems with snapshot capabilities, iSCSI for network layer independence, and a collection of other technologies provided by various vendors and open source projects to create a multi-tiered storage solution with self-service data restoration, long term growth, and disaster recovery.
Tags : 
iscsi, storage management, storage scalability, scalable storage, scalability, multi tiered, multitiered, sbe
    
SBE
Published By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : 
email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform, email marketing, email automation, mta, mail transport, mail transport agent, email delivery, email archiving, email gateway, email backbone, email management, open source email, ironport
    
ColdSpark
Published By: Microworld     Published Date: Dec 12, 2007
Due to its nature of open source code, Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them.
Tags : 
virus, spam, linux, anti-spam, anti spam, anti virus, anti-virus, mailscan, email security, internet security, email filter, filter, filtering, blocking, white list, black list, microworld
    
Microworld
Published By: SAS     Published Date: Apr 16, 2015
This research brief begins with an outline of the major costs to consider when making an investment in analytics, the second section presents five modernization stages that analytics hardware/software have experienced, and the final section finishes with considerations when calculating total cost of ownership of the analytics ecosystem.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 16, 2015
SAS Institute is gearing up to make a self-service data preparation play with its new Data Loader for Hadoop offering. Designed for profiling, cleansing, transforming and preparing data to load it into the open source data processing framework for analysis, Data Loader for Hadoop is a lynchpin in SAS's data management strategy for 2015. This strategy centers on three key themes: 'big data' management and governance involving Hadoop, the streamlining of access to information, and the use of its federation and integration offerings to enable the right data to be available, at the right time.
Tags : 
    
SAS
Published By: Red Hat     Published Date: Jan 20, 2011
Dr. Malcolm Herbert - Director, Strategy & Solutions, Red Hat Lee Denison - Senior Architect, Red Hat In this session, Malcolm Herbert and Lee Denison, senior architect at Red Hat, will discuss key Red Hat technologies, methodologies, and ideas for implementing an open standards, open source IaaS (Infrastructure-as-a-Service) environment.
Tags : 
red hat, cloud computing, best practices, iaas tools, infrastructure-as-a-service
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Chuck Dubuque - Product Marketing Manager, Red Hat Server and desktop virtualization technologies, which bring cost and agility advantages to enterprise IT, have become mainstream in most datacenters. However, after nearly 10 years, virtualized servers still only represent about 30 percent of x86 production workloads due to technology limitations and the expense of proprietary virtualization platforms. In this session, Chuck Dubuque will cover: * The benefits of datacenter virtualization * Technologies in the open source community that will enable pervasive virtualization * The move to the cloud * The particular advantages of Red Hat Enterprise Virtualization and the Red Hat subscription model
Tags : 
red hat virtual tradeshow, live event, business agility, enterprise virtualization, product marketing, server, desktop virtualization, datacenter, virtualized server
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Gunnar Hellekson - Chief Technology Strategist, US Public Sector, Red Hat The government was an early advocate of open source and Red Hat. Red Hat is now ubiquitous, in every state, every branch of the Department Of Defense, and in every cabinet-level agency. After ten years, we no longer hear about security or whether open source is ready for the enterprise. So what's next? How is Red Hat driving the next wave of innovation in government?
Tags : 
red hat virtual tradeshow, live event, us government, public sector, department of defense
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Douglas O'Flaherty - Senior Manager, Product Marketing, Red Hat Red Hat Enterprise Linux is the proven leading enterprise open source operating system. Now, with cloud computing progressing into the enterprise and public clouds emerging as a viable alternative, Red Hat Enterprise Linux is well positioned to be leveraged as the cloud guest operating system of choice. In this session, Douglas O'Flaherty will cover the technical and business elements of Red Hat Enterprise Linux that are relevant when used in cloud computing infrastructures, emphasizing the unique challenge of public cloud deployments. Session topics will include: * Cloud-relevant technologies included within Red Hat Enterprise Linux * Release models for Red Hat Enterprise Linux on public clouds * ISV certifications * Security * Deployment flexibility & planning
Tags : 
red hat virtual tradeshow, live event, enterprise linux, operating system, cloud computing, isv certification, security, deployment flexibility
    
Red Hat
Published By: Liaison Technologies     Published Date: Aug 15, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : 
gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology, hardware, software, business technology, virtualisation, microsoft, google, apple, iphone, ipad, information technology, ict, open source
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Aug 22, 2011
This Case Study provides useful lessons for combining e-commerce with cloud computing. See what Liaison Technologies can do for your business...
Tags : 
gartner, liaison, cloud, cloud computing, fine appers, csb, brokerage, technology, hardware, software, business technology, virtualisation, microsoft, google, apple, iphone, ipad, information technology, ict, open source
    
Liaison Technologies
Published By: HP and Intel ®     Published Date: May 06, 2013
Read this case study to learn how GMO Media achieved a significant reduction in the implementation period of a service development environment using a private cloud. HP Converged Infrastructure and private cloud built on HP ProLiant BL465c G7 Server Blades and open-source software (OSS) with Red Hat Enterprise Virtualization (RHEV) enables speed and supports business growth.
Tags : 
implementation, case study, deployment, it infrastructure, private cloud, virtualization, servers
    
HP and Intel ®
Published By: IBM     Published Date: Jan 09, 2014
In a world that demands scalability, modularity, quality, fast performance and a best practices approach is key to ensuring predictable results for the business. IBM’s PowerLinux Open Source Infrastructure Services solution is a workload-optimized system that meets or exceeds best practices for a virtualized infrastructure at a reasonable price point. The PowerLinux solution can help turn today’s IT infrastructure into a well-tuned utility, providing a more flexible, scalable and valuable asset to the business.
Tags : 
best practices, virtualized infrastructure, powerlinux, open source, virtualized infrastructure, hurwitz white, infrastructure page, source infrastructure, virtual machines, infrastructure services, ibm powerlinux
    
IBM
Published By: IBM     Published Date: Feb 10, 2016
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a Websphere Application Server Liberty migration on their organizations.
Tags : 
ibm, roi, application server, servers, cloud, migration, tei
    
IBM
Published By: Nginx     Published Date: Jun 25, 2014
Learn four concrete tips to help you avoid benchmarking confusion, so you can achieve the most accurate and understandable results.
Tags : 
riverbed, application delivery, application development, application infrastructure, application performance, enterprise software, load balancing, open source, server software, web applications, web servers, software testing, testing and analysis
    
Nginx
Published By: JBoss Developer     Published Date: Jan 25, 2016
Deploying open source software successfully in an enterprise environment requires careful evaluation. Not all open source software is designed for enterprise use, and not all open source communities serve the unique needs of enterprise development. Read this paper to learn about Red Hat's proven track record of delivering IT solutions to the Forbes Global 2000.
Tags : 
red hat, open source software, integration software, enterprise development, it solutions
    
JBoss Developer
Published By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : 
black duck, science logic, open source, visibility, secutiry, software
    
Black Duck Software
Published By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: Datastax     Published Date: Aug 15, 2018
Today’s companies require serious POWER at the data layer if they’re going to thrive in the Right-Now Economy. That’s why DataStax upped the ante with the latest version of its flagship product: DataStax Enterprise (DSE) 6. DSE 6 offers double the performance of DataStax Enterprise 5.1 and has now been independently verified as being at least twice as fast as open source Apache Cassandra. Read this white paper to learn all about DSE 6 performance improvements.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
    
Datastax
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.