aditi

Results 226 - 250 of 1519Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Sep 25, 2017
Despite talented IT teams and years of head start in both architectural and development work, it is still difficult to respond to these challenges using traditional development patterns centered around monolithic software applications. It’s simply impossible to get to market quickly when applications need to be maintained, modified and scaled as a single entity by a large, heavily inter-dependent team.
Tags : 
scaling, messaging, communication, autonomously, decentralized, automated, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : 
decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
    
CA Technologies
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Juniper Networks     Published Date: Oct 20, 2015
In today’s world, your firewall must be able to take immediate action based on known or emerging intelligence.
Tags : 
juniper, cloud, data center, security intelligence
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
In the wake of billion-dollar acquisitions, some industry watchers believe SDN is poised to revolutionize traditional networking, while others claim that it is significantly over-hyped.
Tags : 
juniper, sdn, networking, software
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
With nearly every organization implementing some degree of cloud computing, virtualization security is as integral a component as traditional firewalls are in today’s networks.
Tags : 
juniper, network, virtualization, data center, virtual security, firewall
    
Juniper Networks
Published By: Equinix EMEA     Published Date: May 22, 2019
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
Published By: Schneider Electric     Published Date: Mar 28, 2019
Latest generation high density and variable density IT equipment create conditions that traditional data center cooling was never intended to address, resulting in cooling systems that are oversized, inefficient, and unpredictable. Room, row, and rack-based cooling methods have been developed to address these problems. This paper describes these improved cooling methods and provides guidance on when to use each type for most next generation data centers.
Tags : 
variable density, schneider electric, data center cooling
    
Schneider Electric
Published By: Schneider Electric     Published Date: Mar 28, 2019
Implementing prefabricated modular data centers results in well-understood benefits including speed of deployment, predictability, scalability, and lifecycle cost. The process of deploying them – from designing the data center, to preparing the site, to procuring the equipment, to installation – is quite different than that of a traditional data center. This paper presents practical considerations, guidance, and results that a data center manager should expect from such a deployment.
Tags : 
predictability, scalability, life cycle cost, schneider electric, - prefabricated data center, modular data center, data center design, data center manager
    
Schneider Electric
Published By: Logrhythm     Published Date: Sep 05, 2017
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defences with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 11, 2017
Der traditionelle Ansatz der Cyber-Sicherheit besteht in einer präventionsorientierten Strategie, die darauf fokussiert, Angriffe zu stoppen. Und tatsächlich lassen sich mit präventionsorientierten Ansätzen viele Bedrohungen abwehren, doch den versierten und hochmotivierten Bedrohungsakteuren von heute gelingt es immer öfter, diese Abwehrmaßnahmen mit kreativen, verdeckten, gezielten und permanenten Angriffen zu umgehen, die oft lange unentdeckt bleiben.
Tags : 
network, cloud saas, users, mobile devices, iot, malicious insiders, hacktivists
    
Logrhythm
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: Workday DACH     Published Date: Feb 01, 2019
Es heißt: Erfolg ist da, wo Vorbereitung und Chancen aufeinandertreffen. Noch nie war der Moment für CFOs günstiger, aktiv zum Unternehmenserfolg beizutragen. Denn CEOs bauen zunehmend darauf, dass sie die Unternehmensausrichtung und -strategie mitgestalten. Während sich der CFO früher ausschließlich mit Zahlen beschäftigte, bringt er heute traditionelle Aufgaben mit dem steigenden Bedarf an datengestützten, Wachstum und Strategie fördernden Analysen und Einblicken in Einklang.
Tags : 
finanzen, belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Workday DACH     Published Date: Feb 25, 2019
Es heißt: Erfolg ist da, wo Vorbereitung und Chancen aufeinandertreffen. Noch nie war der Moment für CFOs günstiger, aktiv zum Unternehmenserfolg beizutragen. Denn CEOs bauen zunehmend darauf, dass sie die Unternehmensausrichtung und -strategie mitgestalten. Während sich der CFO früher ausschließlich mit Zahlen beschäftigte, bringt er heute traditionelle Aufgaben mit dem steigenden Bedarf an datengestützten, Wachstum und Strategie fördernden Analysen und Einblicken in Einklang.
Tags : 
finanzen, belegschafts technologie, digitale strategie
    
Workday DACH
Published By: NetApp     Published Date: Aug 26, 2016
In competitive business environments, speed is a key differentiator. IT organizations worldwide have realized significant value in transitioning from traditional disk to flash-based storage architectures, paving the path to making businesses more responsive and ultimately more competitive. Learn how to transform traditional IT with high-speed data delivery while reducing the costs and risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented. Intel Inside®. Nya möjligheter på utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside, intel core, intel inside, intel inside logotyp, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented. Intel Inside®. Intel otwiera nowe mo?liwo?ci. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Intel otwiera nowe mozliwosci. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Pure Storage     Published Date: Sep 27, 2019
For most enterprises, 60 to 73 percent of enterprise data goes unused for business-intelligence (BI) and analytics efforts, according to Forrester.1 Data that is out of sight or out of date creates a competitive blind spot for businesses today. With customer demands, economic changes, and new trends and technologies evolving at a dizzying pace, staying relevant — not to mention competitive — requires that businesses access all available BI to be ?exible and agile. Businesses must have quick access to data that is comprehensive, accurate, current, and consumable in real time. A traditional infrastructure, where the online analytical processing (OLAP) platform and the online transaction processing (OLTP) platform are separate, makes ?exibility and agility difficult to achieve. When a business has accurate, current data in hand, it can make real-time data-driven business decisions so that it can stay relevant and competitive, or even be a disruptor in its industry. One way that a busines
Tags : 
    
Pure Storage
Published By: Dell and VMWare     Published Date: Oct 26, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented.
Tags : 
    
Dell and VMWare
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.