HIT Consultant Insightful coverage of healthcare innovation
 

distributed

Results 26 - 50 of 483Sort Results By: Published Date | Title | Company Name
Published By: StreamSets     Published Date: Sep 24, 2018
If you’ve ever built real-time data pipelines or streaming applications, you know how useful the Apache Kafka™ distributed streaming platform can be. Then again, you’ve also probably bumped up against the challenges of working with Kafka. If you’re new to Kafka, or ready to simplify your implementation, we present common challenges you may be facing and five ways that StreamSets can make your efforts much more efficient and reliable
Tags : 
apache, kafka, steam, sets, data
    
StreamSets
Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn six reasons why XO UCaaS is the right hosted solution for your business: - Lower your 'total cost of ownership' - Business continuity assurance - Eliminates obsolescence - Always the right size - Focus your IT team on business performance - Empower a fully distributed and mobile workforce
Tags : 
xo ucaas, unified communications, hosted service provider, it management, mobile workforce
    
XO Communications
Published By: 6th Sense Analytics     Published Date: Sep 19, 2007
Doug Gold, chief financial officer of CoreObjects, a Los Angeles-based product development company with multiple locations across India, talks about how his company is overcoming the challenges of visibility and control within distributed software development projects.
Tags : 
business management, business metrics, business analytics, offshore, offshoring, outsource, outsourcing, software development
    
6th Sense Analytics
Published By: 6th Sense Analytics     Published Date: Sep 18, 2007
Jake Sorofman, Vice President of Marketing for 6th Sense Analytics interviews Rusty Weston, editor in chief of CMP Media’s Global Services magazine, a premier publication focusing on the trends of off-shoring and outsourcing. The discussion focuses on the trend of globally distributed software development.
Tags : 
offshore, offshoring, outsource, outsourcing, cost, costs, cost savings, spend management
    
6th Sense Analytics
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
    
Butler Technologies
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Red Hat     Published Date: Jan 02, 2018
Organizations are at a strategic crossroads. According to IDC analysts,1 two-thirds of CEOs will center their corporate strategies around digital transformation initiatives. The goal of digital transformation is only partly to make existing functions more effective. The greater goal is to be able to do new things and use existing data in new, better ways. Yet, 72% of current IT spending2—and the focus of IT resources—is on maintaining existing systems. This creates tension between what needs to be done today and what should be done for the future. Middle-tier applications, according to IDC,3 are the core of a digital transformation strategy because they provide data integration, messaging, and application programming interface (API) management. Middle-tier applications also provide a platform for application development and management that can handle traditional enterprise applications and cloud-native, distributed applications. Specifically, a Java™ EE-based application platform can
Tags : 
    
Red Hat
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Dell EMC     Published Date: May 12, 2016
Today’s global business model presents both opportunities for business agility and challenges for IT management. To do business effectively, organizations require an IT infrastructure at remote locations that delivers applications and data with high performance and high reliability. Download this paper and learn how you can enjoy the benefits of having remote offices without the need for an entire IT staff to support it.
Tags : 
    
Dell EMC
Published By: Veracode     Published Date: Jun 26, 2019
As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams.
Tags : 
    
Veracode
Published By: Infor     Published Date: Aug 04, 2011
AB World Foods has a highly complex supply chain, driven in part by the nature of its globally sourced and distributed products as well as by the demands of growth and acquisition. With Infor SCM Demand Planning, the company cut costs while also improving service levels.
Tags : 
infor, ab world food, scm, enterprise business software, customer relationship management, enterprise asset management, enterprise resource planning, financial management
    
Infor
Published By: HP and AMD     Published Date: Nov 16, 2011
This whitepaper examines HP BladeSystem and how and why it is the ideal platform for virtualization during these changing economic times.
Tags : 
blade servers, virtualization, blade, server sprawl, infrastructure, distributed it, energy, power
    
HP and AMD
Published By: SAP     Published Date: Apr 30, 2008
Consider how life sciences manufacturers can deal effectively with dynamic market needs, increased compliance requirements, more distributed manufacturing operations, and rapid product innovation.
Tags : 
sap, scm, erp, lean manufacturing, lean methods
    
SAP
Published By: IBM     Published Date: Jul 23, 2009
Download this white paper and find out  how technological advances are enabling collaboration to extend across the enterprise and through outsourced resources with globally distributed development. (GDD)  Learn how GDD is enabling companies to expand their operations on a  worldwide basis, cost and skills arbitrage, and reduced time to market.
Tags : 
ibm, ibm telelogic, global collaboration, global distributed development (gdd), wide area network (wan), application lifecycle management (alm), lan, software configuration management
    
IBM
Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
Learn how-and how much-you can gain in benefits from using Actional Enterprise for managing the operations of your distributed, interconnected applications. This E-kit will help you understand in measurable terms-such as the costs, cost savings, and ROI-of deploying Actional. Simply register and you will receive the resources required to help you build and communicate a business case.
Tags : 
roi, ekit, actional enterprise, interconnected application, cost savings, progress software
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
Learn how-and how much-you can gain in benefits from using Actional Enterprise for managing the operations of your distributed, interconnected applications. This E-kit will help you understand in measurable terms-such as the costs, cost savings, and ROI-of deploying Actional. Simply register and you will receive the resources required to help you build and communicate a business case.
Tags : 
roi, ekit, actional enterprise, interconnected application, cost savings, progress software
    
Progress Software BTA Telecommunications
Published By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches
    
Druva
Published By: Red Hat     Published Date: Jun 19, 2019
Business success is increasingly based on your ability to react to change. As new disruptive players enter markets and technology upends what consumers expect, organizations increasingly need to change plans in much shorter cycles than ever before. Modern software architectures and processes can make organizations more effective at dealing with this change and emerging as winners in their markets. A new architectural framework called agile integration brings together three important architectural capabilities: containers, distributed integration, and application programming interfaces (APIs). This framework addresses how these key capabilities promote agility and power new processes within your organization to create competitive advantage. Industries like travel and hospitality have been transformed by new ways of doing business—new services are now offered, and consumers interact with services differently. This trend of disruptive change is extending across other major industries—from
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars—distributed integration, containers, and APIs—to deliver flexibility, scalability, and reusability.
Tags : 
    
Red Hat
Published By: Pluribus Networks     Published Date: Sep 25, 2014
Software Defined Networking (SDN) allows organizations to deliver networking with the same level of flexibility and agility as virtualization has allowed them to deliver other parts of their infrastructure. This free webinar will examine current networking architectures at a high level.
Tags : 
pluribus, pluribus networks, sdn, software defined networking, distributed networking, distributed computing, network virtualization, rack switching
    
Pluribus Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai makes online business fast, reliable and secure. We earned our global reputation by building the world’s fastest and largest cloud-enabled delivery platform, which is backed by the most scalable, distributed security solution available. Learn about the security solutions that help protect companies in every industry be secure online.
Tags : 
akamai, cloud security, cloud security solutions, cybersecurity, cloud, cloud delivery platform
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.