HIT Consultant Insightful coverage of healthcare innovation
 

solution architect

Results 226 - 242 of 242Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Aug 17, 2017
Communications service providers are looking for alternative deployment models that will help them support fast-growing network demand. Moving to a virtualized EPC (vEPC) solution can help service providers achieve more cost-e?ective scaling by using standard high-volume servers in place of purpose-built systems. System integrators, software vendors, and platform providers rely on Intel® technologies to deliver the performance and scalability required for vEPC solutions. Intel is also participating in the development of open standards, contributing to the open source community, developing reference architectures, engaging with industry participants, and collaborating on trials that can help facilitate the evolution to vEPC solutions and accelerate network transformation by use of network functions virtualization.
Tags : 
    
Intel
Published By: HP VMware     Published Date: Mar 03, 2008
This white paper, created for solutions architects, engineers, and project managers, contains planning information to help customers effectively plan a VMware Infrastructure running on HP ProLiant servers, HP StorageWorks storage solutions, and HP ProLiant Essentials management software components.
Tags : 
hp vmware, vmware, infrastructure, virtual, virtual server, virtualization
    
HP VMware
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot
    
Webroot Inc
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Download this webcast today to hear guest speakers discuss and review key issues and themes around SD-WAN. Guest speakers will talk through recommendations on how to address the unique challenges that SD-WAN presents to network operations: Industry expert panel discussion featuring: -Shamus McGillicuddy, Senior Analyst, EMA -Fred Estienne, Managed Solutions Architect, Bell Canada -Paul Kohler, Director, Technical Alliances, Viptela -Time Diep, Director Product Management, CA Technologies Download and listen today!
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Download this webcast today to hear guest speakers discuss and review key issues and themes around SD-WAN. Guest speakers will talk through recommendations on how to address the unique challenges that SD-WAN presents to network operations: Industry expert panel discussion featuring: -Shamus McGillicuddy, Senior Analyst, EMA -Fred Estienne, Managed Solutions Architect, Bell Canada -Paul Kohler, Director, Technical Alliances, Viptela -Time Diep, Director Product Management, CA Technologies Download and listen today!
Tags : 
    
CA Technologies EMEA
Published By: Red Hat     Published Date: Jan 20, 2011
Dr. Malcolm Herbert - Director, Strategy & Solutions, Red Hat Lee Denison - Senior Architect, Red Hat In this session, Malcolm Herbert and Lee Denison, senior architect at Red Hat, will discuss key Red Hat technologies, methodologies, and ideas for implementing an open standards, open source IaaS (Infrastructure-as-a-Service) environment.
Tags : 
red hat, cloud computing, best practices, iaas tools, infrastructure-as-a-service
    
Red Hat
Published By: Cohesity     Published Date: Nov 20, 2018
Today, hybrid cloud is increasingly the norm, and enterprises are challenged with ways to have visibility, manage and make use of all this data – both on-premises and in the cloud. While much attention has been given to primary data affecting mission-critical workloads, data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide. Download to learn more.
Tags : 
    
Cohesity
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: • The critical role DNS plays in the user experience • The failure and outage risks of relying on a single DNS solution • The major resiliency and performance differences between unicast vs anycast addressing • Criteria for evaluating a managed DNS service provider Download Now! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: The critical role DNS plays in the user experience The failure and outage risks of relying on a single DNS solution The major resiliency and performance differences between unicast vs anycast addressing Criteria for evaluating a managed DNS service provider Download Now!
Tags : 
    
Oracle + Dyn
Published By: Citrix Systems     Published Date: Feb 10, 2016
An ADC is one of the most critical elements of an organization’s datacenter and cloud architecture. As you evaluate ADC solutions, it’s essential to pay close attention to their ability to address the most important challenges in your environment. This paper highlights nine key datacenter and cloud architecture challenges that NetScaler helps solve more effectively than F5 to help you.
Tags : 
    
Citrix Systems
Published By: VMware     Published Date: Jun 28, 2019
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
    
VMware
Published By: VMware     Published Date: Oct 12, 2018
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
    
VMware
Published By: Loodse     Published Date: Feb 06, 2019
Customers began to approach hosting provider SysEleven about running containers and using container orchestration. To offer their customers the highest quality services for which they are known, they sought an easy to use container orchestra- tion solution. SysEleven chose to partner with Loodse to create MetaKube, a white label of Loodse’s Kubermatic Container Engine, giving their customers Kubernetes clusters in one click. Simon Pearce, MetaKube Team Lead and Systems Architect at SysEleven, explains why they chose Kubermatic to run Kubernetes in their data centers.
Tags : 
    
Loodse
Published By: Dropbox for Business     Published Date: Aug 27, 2014
In this webinar, Mobify Solutions Engineer Kyle Young and Dropbox Solutions Architect Rajan Kapoor will discuss how organizations large and small are embracing mobile work, to their advantage. They will also outline five strategies you can use today to make sure employees have the flexibility they need.
Tags : 
productivity, dropbox, mobile work, mobile trends, best practices
    
Dropbox for Business
Published By: VMware AirWatch     Published Date: Feb 21, 2017
More organizations are choosing Horizon 7 over Citrix XenDesktop and XenApp because Horizon offers a more comprehensive and feature-rich solution. The three key architectural advantages that Horizon has over Citrix are a trusted platform, flexible delivery options, and workspace environment management. Download this whitepaper to learn how VMware Horizon® 7 helps IT manage, control, and protect all Windows resources at the speed required and with the efficiency that business demands, delivering desktops and applications through a single platform to end users anytime, anywhere, on any device.
Tags : 
    
VMware AirWatch
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.