HIT Consultant Insightful coverage of healthcare innovation
 

stack

Results 251 - 275 of 339Sort Results By: Published Date | Title | Company Name
Published By: Appcito     Published Date: Apr 09, 2015
Appcito CAFE (Cloud Application Front End) is an easy-to-deploy, uni?ed and cloud-native service enabling cloud application teams to select and deploy enterprise-grade L4 to L7 application network services. The multi-cloud CAFE service is available for the OpenStack open-source cloud computing software platform. OpenStack is a multivendor ecosystem used to deploy Infrastructure-as-a-Service (IaaS) solutions. It allows users to bring compute, storage, and networking resources into private and public clouds through a set of open APIs.
Tags : 
openstack, cloud applications, load balancing, application security, cloud application delivery
    
Appcito
Published By: Dell     Published Date: Apr 02, 2015
In this Guide we have delivered the case for the benefits of big data technology applied to the needs of the manufacturing industry.
Tags : 
dell, intel, big data, manufacturing, technology stack, pain points, big data adoption, omneo
    
Dell
Published By: IBM     Published Date: Mar 17, 2015
Read Gartner Inc.'s latest report on Digital Commerce solution providers and learn how IBM's capabilities, strategies, strengths and challenges stack up against others. Understand the key capabilities of a digital commerce solution, and learn why IBM is cited as a leader.
Tags : 
digital commerce, ibm, digital commerce software, digital commerce platform, demandware
    
IBM
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
iam, forgerock, irm, relationship management
    
ForgeRock
Published By: Tealium     Published Date: Feb 20, 2015
Unify Your Marketing Technology and Data–It’s Easy Download our free guidebook, “Build Your Own Marketing Cloud™,” to learn how to maximize your technology investments and drive superior cross-channel experiences.
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising, digital
    
Tealium
Published By: Tealium     Published Date: Feb 20, 2015
Marketing Complexity Got You Down? Download our new guidebook: “How to Tame the Digital Marketing Beast™.”
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising, digital
    
Tealium
Published By: NetApp     Published Date: Feb 19, 2015
Gartner predicts that the next generation technology will evolve integrated and converged infrastructure to be in step with applications and service delivery. Convergent designs will focus on performance, capacity, provisioning, service demands, infrastructure optimization and cloud stacks.
Tags : 
    
NetApp
Published By: Exablox     Published Date: Jan 27, 2015
Object-based storage (referred to as OBS throughout this document) platforms continue to perpetuate cloud and enterprise IT infrastructure. As businesses move toward petabyte-scale data storage, OBS solutions are turning out to be the right choice for balancing scale, complexity, and costs. By way of their core design principles, OBS platforms deliver unprecedented scale at reduced complexity and reduced costs over the long term. Early OBS platforms suffered from "necessity crisis," were too cumbersome to deploy and, in some cases, caused a platform lock-in because of their proprietary access mechanisms. In spite of their from-the-ground-up design, a departure from how traditional SAN and NAS arrays are deployed and, more importantly, a lack of standard interfaces made it difficult for IT organizations to deploy OBS solutions in the infrastructure. Thanks to Amazon S3 and OpenStack Swift becoming de facto access interfaces, this situation has changed.
Tags : 
network attached storage, nas arrays, storage efficiency, idc storage marketscape, storage data resiliency, storage platform scalability, exablox, oneblox
    
Exablox
Published By: McAfee     Published Date: Jan 20, 2015
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
Intel Security
Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
Intel Security
Published By: MineralTree     Published Date: Jan 14, 2015
A Guide to solutions that make AP simpler, safer, and more efficient. Everyday AP is an arduous process. It involves receiving and manually keying data from paper invoices, chasing approvals through e-mail and phone calls, printing paper checks to pay vendors, manually collating checks with printed invoices and purchase orders, tracking down CFOs for signatures, stuffing envelopes, applying postage, and finally, delivering the resulting stack of payments to the local post office.
Tags : 
mineraltree, finance, business, payments, process, modernize, payment, secure, invoice, solution, application, bank, execution
    
MineralTree
Published By: Cisco     Published Date: Jan 06, 2015
The Catalyst 2960-X and 2960-XR switches provide several innovative energy-saving features. They are stackable and support Energy Efficient Ethernet (EEE). Other features include Cisco EnergyWise, Switch Hibernation Mode, Downlink Hibernation Mode, a wide temperature operating range and variable-speed cooling fans.
Tags : 
engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications
    
Cisco
Published By: Stackify     Published Date: Nov 19, 2014
Have you ever had to work with your log files once your application left development? If so, you quickly run into a few pain points. Learn how to create a “culture of logging” and work smarter, not harder.
Tags : 
log management, developer tools, error tracking, log analytics, stackify, application support, debugging tools, software logging, log files, application monitoring
    
Stackify
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder
    
Citrix Systems
Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança, segurança
    
McAfee
Published By: Adobe     Published Date: Oct 30, 2014
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software
    
Adobe
Published By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services
    
ForgeRock
Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail
    
IBM
Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail
    
IBM
Published By: Riverbed     Published Date: Sep 05, 2014
As enterprises have embraced IT trends like cloud computing and virtualization, their operational needs have evolved to make application performance more important than ever before. But operating applications at peak performance is challenging in the cloud. That's why many enterprise IT departments now have Applications Operations groups tasked with ensuring that applications run efficiently across these complex IT stacks. But, most tools designed to address these application performance management (APM) issues were never designed for this dynamic environment. To achieve smooth delivery of applications at all times, Applications Operations groups need APM solutions that can give them insight and analytics to manage their apps. This SlashGuide gives IT managers a scorecard to identify APM solutions that will deliver more efficient application performance.
Tags : 
apm, applications, operations, enterprise, stacks, dynamic
    
Riverbed
Published By: HP     Published Date: Aug 25, 2014
HP ConvergedSystem 700x with Microsoft Hyper-V is an ideal example of the market transition toward integrated computing platforms. Built on HP’s ConvergedSystem 700x converged infrastructure platform, HP ConvergedSystem 700x with Microsoft Hyper-V is a flexible preconfigured solution designed for small to large enterprise and service provider deployments. The solution is built on HP ProLiant or HP BladeSystem servers, HP 3PAR SAN storage, and HP 5900-Series or HP Flex10 networking. The entire stack is managed through HP Insight Control for System Center, which integrates physical and virtual server management through HP Insight with Microsoft System Center 2012 for unified management and orchestration Read this whitepaper to learn more about ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP ConvergedSystem 700x with Microsoft Hyper-V, versus a comparable conventional data center infrastructure comprised of discrete, non-integ
Tags : 
converged system, economic, enterprise, computing, platforms, deployment, vsphere, application, virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business
    
HP
Published By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
McAfee
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: IBM     Published Date: Jul 25, 2014
IBM® SmartCloud® Orchestrator makes complex cloud services easy to manage. Built on OpenStack, IBM SmartCloud Orchestrator provides common cloud services for multi tier application environments on top of compute, network and storage while supporting multiple hypervisors and multi-vendor platforms. It’s designed to simplify and speed the creation and execution of process workflows that then help shorten deployment and change processes in the cloud. With standardization and automation of cloud services through a flexible orchestration engine, IBM SmartCloud Orchestrator (SCO) provides ongoing service lifecycle management and the flexible platform to automate assets that most organizations are already using.
Tags : 
ibm, ibm smartcloud, cloud services, application management, cloud computing, networking, storage, deployment, lifecycle management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.