cloud architecture

Results 76 - 100 of 309Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Feb 19, 2015
This report examines the most common hybrid cloud architectures and the storage management factors required for IT to extend their data center with efficiency. Learn about the keys to successfully implementing a hybrid cloud approach.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Aug 14, 2015
Taking advantage of a variety of private and public cloud services.
Tags : 
data, backup, recovery, protection, cloud, architecture
    
NetApp
Published By: NetApp     Published Date: Aug 14, 2015
Most common hybrid cloud architectures.
Tags : 
cloud computing, storage, infrastructure, operations, data center
    
NetApp
Published By: VMware AirWatch     Published Date: Feb 21, 2017
Download this infographic to learn how VMware Workspace™ ONE™ helps more organizations compete in the mobile cloud era by providing productivity-enhancing capabilities that are simply better. Tailored to uniquely provide both end-user mobility and IT control, VMware mobile-cloud architecture addresses the needs of today’s organizations more effectively than Citrix.
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: Jun 03, 2016
Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Okta is the identity management foundation for a cloud-first IT architecture that enables you to take the lead in adopting new applications and enabling mobile for your organization to drive growth. In this webinar with Okta, and customer Medallia, learn about the benefits of Okta Provisioning to maximize security, efficiency and productivity, and how Medallia recognized significant IT savings and >900% ROI. Speakers: Ed Sawma, Director Product Marketing, Okta Jonathan Hansen, Head of IT, Medallia
Tags : 
    
Okta
Published By: Rackspace     Published Date: Mar 28, 2018
Many businesses want to realize the power of Google Cloud Platform (GCP) without having to incur the challenge and expense of managing it themselves. Some businesses lack the technical expertise or capacity to operate cloud infrastructure, tools and applications while others may have the ability but choose to maintain focus on their core business. Many larger businesses are on a multi-phased journey to the cloud, requiring transition and management services that can adapt to an evolving set of needs. Rackspace Managed Services for Google Cloud Platform is the answer for businesses facing these challenges. As Google’s first Premier Managed Services Partner, Rackspace blends technology and automation plus human expertise to deliver ongoing architecture, security and 24x7x365 operations backed by GCP-certified engineers and architects.
Tags : 
    
Rackspace
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Microsoft     Published Date: Nov 22, 2016
Find out how your organisation can gain access to technologies that re-invigorate the apps they run today and set them up to build groundbreaking new applications using containers and microservices architectures.
Tags : 
hybrid cloud, microsoft, applications, cloud architecture, cloud container
    
Microsoft
Published By: Pure Storage     Published Date: Jul 18, 2017
Les principales architectures de stockage traditionnelles ont été développées il y a plus de 20 ans pour répondre à un paradigme informatique différent. Si elles ont plutôt bien servi leurs clients pendant cette période, elles sont en train de devenir obsolètes, puisque de plus en plus d'organisations adoptent des modèles cloud ou de type cloud. Afin d'optimiser l'efficacité du cloud, le service informatique doit opter pour des architectures de stockage conçues pour le 100 % flash et développées de A à Z pour l'ère du cloud.
Tags : 
le cloud computing, améliorer la performance, disponibilité des applications, plateforme de stockage 100 % flash, pure storage
    
Pure Storage
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: Teradata     Published Date: May 02, 2017
As companies consider incorporating enterprise-level cloud services offered by Amazon Web Services, Microsoft Azure, Teradata, and others, many challenges arise related to data security, integration into existing data architecture, and analytics activities themselves. Download this article to understand these and other considerations for evaluating and adopting a cloud strategy for your enterprise, and what it means for analytics.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Teradata
Published By: Teradata     Published Date: May 02, 2017
Constellation Research presents case studies of two companies that cut costs, gained flexibility, and eased administration by adding cloud data warehouse capacity to their on-premises environment. Both of these deployments: • Solved problems and yielded expected and unexpected benefits • Required some adjustments to administrative processes and expectations • Led to hybrid architecture as being an invaluable aspect of their respective data warehousing strategies Download the case studies now to explore each company’s journey, understand recurring themes, and walk away with actionable insights.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Teradata
Published By: Pure Storage     Published Date: Jul 26, 2017
Les principales architectures de stockage traditionnelles ont été développées il y a plus de 20 ans pour répondre à un paradigme informatique différent. Si elles ont plutôt bien servi leurs clients pendant cette période, elles sont en train de devenir obsolètes, puisque de plus en plus d'organisations adoptent des modèles cloud ou de type cloud. Afin d'optimiser l'efficacité du cloud, le service informatique doit opter pour des architectures de stockage conçues pour le 100 % flash et développées de A à Z pour l'ère du cloud.
Tags : 
le cloud computing, améliorer la performance, disponibilité des applications, plateforme de stockage 100 % flash, pure storage
    
Pure Storage
Published By: IBM     Published Date: Nov 08, 2016
Read this paper to learn 7 steps to getting your API Architecture right the first time.
Tags : 
ibm, cloud, middleware, api, api architecture
    
IBM
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
It seems like every day there’s another article about IoT, big data analytics, and cloud architectures—and their unlimited potential for companies trying to gain a competitive edge in this digital world. If your business is in the midst of a digital transformation (and chances are, it is), you’re probably already enjoying some the benefits of the public cloud: economies of scale, preconfigured solutions that can be spun up with a few clicks, utility billing, and more. What you may not have heard, however, is how the shared security model of the public cloud affects your security responsibilities —and how it can be used to your advantage in these multicloud environments.
Tags : 
roi, cloud, security, architectures, business, economies
    
F5 Networks Inc
Published By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: Find out how EMC’s own IT organization is reaping the benefits of Cloud computing and IT-as-a-Service (ITaaS), including new levels of efficiency, agility, and productivity
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
If your organization is considering building a private cloud, you should read this extensive set of FAQs from EMC. Get answers to critical questions before you make your move.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
Get in-depth insights from a new global survey of executives by The Economist Intelligence Unit, which confirms significant change in how organizations like yours deliver and use IT services, and advocates a blended model of internal and third-party services.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
Explore three key Cloud computing models—integrated infrastructure systems, reference architectures, and “build your own” solutions. See how EMC gives you the freedom to chose the optimal path to your private Cloud—and the solutions to support your deployment.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture
    
EMC Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: