HIT Consultant Insightful coverage of healthcare innovation
 

enterprise it architecture

Results 126 - 150 of 165Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro SPN
Published By: IBM     Published Date: Jun 24, 2009
This white paper outlines the advantages of WebSphere Portal for System z software and provides essential information to those considering adding Web-facing workloads on their mainframe hardware. Also, with these WebSphere Portal for System z options, IBM illustrates its ongoing commitment to mainframe computing and underscores the business value that remains inherent in the System z platform. Learn more today!
Tags : 
enterprise, web 2.0, ibm, system z, platform, mission critical applications, web facing, workloads
    
IBM
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an “all-or-nothing” paradigm, instead preferring a pragmatic, “evolution, not revolution” approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud – at least not in the foreseeable future. That’s why so many IT professionals advocate a so-called “hybrid” approach. But what do we mean by “hybrid” and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio
    
Navisite- A Time Warner Cable Company
Published By: McAfee     Published Date: Aug 14, 2014
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
McAfee
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Published By: BlackBerry     Published Date: Mar 16, 2009
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Tags : 
blackberry, enterprise solution, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software
    
BlackBerry
Published By: Exablox     Published Date: Jan 27, 2015
When it comes to the increasingly complex task of managing data storage, many small and midsize organizations face even greater challenges than large, global enterprises. Small and midsize companies have ever-increasing volumes of information to manage and secure, and they are confronting a number of difficulties when it comes to storage. Among the biggest hurdles: ›› Scaling storage as the business grows rapidly ›› Meeting the rising expense of data storage capacity ›› Dealing with the complexity of management and architecture ›› Devoting precious staff time managing storage and data backup Whereas larger organizations have significant IT budgets and staff to handle storage-related challenges, small and midsize companies lack the IT resources to dedicate to storage management. Fortunately, there are new approaches to data storage on the market that can help such companies address their data storage needs without requiring dedicated storage management resources, while at the same ti
Tags : 
scaling storage, data storage capacity, data backup, data protection, data management, exablox, oneblox
    
Exablox
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services
    
CrownPeak
Published By: IBM     Published Date: Apr 17, 2013
IBM has used the Storwize architecture to produce multiple storage systems across different usage segments to meet different customer needs. The ability to scale with a common underlying architecture has proven to deliver multiple benefits to IBM customers. Features developed for high-end enterprise systems now meet customer needs in other, more price conscious segments. The leverage from a common base for systems helps reduce development and support costs which are reflected in product costs for customers. The Storwize architecture also builds on Intel-based hardware, which provides continued advances with each new generation yet retains the same fundamental architecture. Customers also benefit from a storage architecture that provides a consistent experience across multiple products and generations.
Tags : 
storwize, storage systems, benefits, high-end enterprise, intel-based hardware, customers, development
    
IBM
Published By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : 
microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment
    
SilverSky
Published By: Cisco     Published Date: Nov 17, 2015
In March 2014, Cisco Systems commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco Unified Computing System (UCS). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Cisco UCS on their organizations. To better understand the benefits, costs, and risks associated with a Cisco UCS implementation, Forrester interviewed several customers with multiple years of experience using Cisco UCS. Cisco Unified Computing System and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture
Tags : 
cisco, ucs, unified computing system, total economic impact, forrester report
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Technology’s role in business and society has shifted away from largely driving efficiencies to innovating and creating engaging experiences that attract and retain customers. Innovations and business outcomes are fueled by a perfect storm of technology trends in cloud, analytics, machine learning, IoT and the emerging API Economy. The convergence of these technologies has created new opportunities for enterprises to improve business performance by acquiring customers faster while creating brand loyalty. The role of technology expands the interaction with customers beyond the core of the enterprise – away from 100% dependencies on systems of records – and towards real-time, contextual interactions. Businesses are a digital business or they are evolving to become one. This requires enterprises to re-think how they build software architectures.
Tags : 
    
Cisco
Published By: Riverbed     Published Date: Jun 02, 2015
The Internet is increasingly becoming critical to enterprise connectivity, but there remains confusion regarding the role of the Internet in the enterprise WAN architecture. Learn to overcome the confusion with this whitepaper.
Tags : 
hybrid network, wan architecture, integrated wan, cloud infrastructure, increase reliability, reduce costs, hybrid networking
    
Riverbed
Published By: VMware AirWatch     Published Date: Sep 16, 2015
This infographic shows how AirWatch help enterprises meet new challenges as they cater to an increasingly mobile workforce by offering new solutions – such as content collaboration and consistency with any app on any device - and address the increased demand for mobile-cloud architecture.
Tags : 
mobile empowerment, airwatch, mobile, cloud
    
VMware AirWatch
Published By: IBM     Published Date: Jul 08, 2015
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as ETL, ELT (also known as ETL Pushdown), data replication or data virtualization. Read this new whitepaper to learn about the seven essential elements needed to achieve the highest performance.
Tags : 
    
IBM
Published By: Riverbed     Published Date: Aug 22, 2014
Businesses are rapidly adopting virtualization, cloud infrastructure, and SaaS applications broadly across the enterprise to minimize costs and enable seamless collaboration and communication. This is significantly straining the traditional network paradigm. IT organizations globally are faced with the challenge to transform network architectures to deliver the right performance and reliability cost-effectively while retaining control.
Tags : 
business performance, hybrid networks, virtualization, cloud infrastructure, saas, collaboration, communication
    
Riverbed
Published By: HP     Published Date: Sep 08, 2014
Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect
Tags : 
servers, innovative, management, mobility, security, computational, technologies, mainframes
    
HP
Published By: Symantec     Published Date: Jun 18, 2015
Learn about the growing complexities of the cloud and see why there is a growing complexity within IT security and what your organization must do to adapt.
Tags : 
enterprise it architecture, service-oriented architecture, hybrid environments, private and public clouds, user identity
    
Symantec
Published By: NEC     Published Date: Aug 12, 2014
NEC has introduced the Express5800/A2000 Series Servers to accommodate enterprise application demands with peak server reliability, availability, and serviceability. The new server architecture and NEC engineering functionality align well with many of the most important IT priorities in 2014, including virtualization, big data and advanced data analytics. With the Express5800/A2000 Servers, NEC has the opportunity to educate application owners and work with system integrators to drive awareness and ultimately investment in its new server platform, which will help drive customer value. In this white paper, you will learn how these next-generation servers from NEC are ready to accommodate some of today’s demanding workloads.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability
    
NEC
Published By: NEC     Published Date: Aug 12, 2014
By now, much has been written about the advantages server virtualization brings to an enterprise. In the June 2013 survey, 63% of all companies and 100% of large enterprises reported having a server virtualization program. However, when you segment the virtualization rates, you find a trend that indicates that large enterprises in particular are not gaining all of the advantages that server virtualization has to offer. What is more difficult and remains a challenge, particularly for large enterprises, is virtualizing Tier 1 applications. These are large, mission-critical enterprise applications such as email, customer relationship management (CRM), or enterprise resource planning (ERP). These applications tend to be very large, consume the entire capacity of a current generation server, and require high application uptimes. As shown in Figure 1, the virtualization rates for these applications are far lower than Tier 2 apps. In this eBook, you’ll learn how the NEC enterprise server provides a platform that now gives customers the right platform to virtualize their Tier 1 apps.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability
    
NEC
Published By: NEC     Published Date: Aug 26, 2014
In addition to high reliability and availability, enterprise mission critical applications, data centers operating 24x7, and data analysis platforms all demand powerful data processing capabilities and stability. The NEC PCIe SSD Appliance for Microsoft® SQL Server® is a best-practice reference architecture for such demanding workloads. It comprises an Express 5800 Scalable Enterprise Server Series with Intel® Xeon® processor E7 v2 family CPUs, high-performance HGST FlashMAX II PCIe server-mounted flash storage, and Microsoft® SQL Server® 2014. When compared with the previous reference architecture based on a server with the Intel® Xeon® processor E7 family CPUs, benchmark testing demonstrated a performance improvement of up to 173% in logical scan rate in a data warehouse environment. The testing also demonstrated consistently fast and stable performance in online transaction processing (OLTP) that could potentially be encountered.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators
    
NEC
Published By: IBM     Published Date: Mar 11, 2008
This document introduces the reader to the concept of Enterprise Portals as a means of conducting business on the Internet. We continue on to a discussion of the value of using Enterprise Portals, combined with Service Oriented Architecture (SOA) methods, to tie existing processes and applications together to support the Enterprise.
Tags : 
ibm, corporate portal, portal, portals, soa, ebusiness, ep campaign
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
One of the biggest hurdles that enterprises face is a lack of trust in IT’s ability to deliver business value. While a Service Oriented Architecture (SOA) can sort things out by making systems more flexible and agile, this is only part of the answer. What’s missing is an effective model for engaging consistently with business teams throughout the whole lifecycle of IT investments.
Tags : 
ibm, ibm mi, ibm grm, service management, service oriented architecture, soa
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.