RecruitingBlogscom

Follow Us:

 

it architecture

Results 176 - 200 of 966Sort Results By: Published Date | Title | Company Name
Published By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Google     Published Date: Jan 24, 2019
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Riverbed     Published Date: May 24, 2012
Hybrid cloud architectures are growing in popularity as a way to cope with today's business needs. This paper outlines a framework and specific solutions for adopting a hybrid cloud architecture to support increased profits and productivity.
Tags : 
cio, cloud computing, hybrid cloud adoption, wan optimization, application delivery controllers, network performance management, cloud storage gateways, business technology, data center
    
Riverbed
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience, networking, enterprise applications, business technology
    
Dyn
Published By: Dyn     Published Date: Nov 03, 2016
The more you invest in an internet hybrid infrastructure, the more exposed you can be to internet events. At the internet infrastructure layer, this can mean unavailable destinations, poor performing paths and security events such as DDoS attacks. The fact is that there are thousands of internet events that happen every day and when it comes to DDoS attacks 97% of them happen at the infrastructure layer. You shouldn't rely on a single DNS service to protect you from all of these potential problems. Just like everything else in your IT architecture you should always have a backup plan. How you implement a redundant DNS architecture is not a given. Watch this informative webinar and learn about different ways you can get the benefits of a hardened internet infrastructure layer that fits your existing and planned online architecture. Get insights and examples from our DNS experts on different key approaches.
Tags : 
dyn, dns, hybrid infrastructure, networking, enterprise applications, business technology
    
Dyn
Published By: IBM     Published Date: Jun 16, 2015
Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.
Tags : 
enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
For more and more organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. In fact, hybrid cloud is the new norm for IT. IDC says more than 80% of enterprise IT organizations will commit to hybrid cloud by 20171, and 70% of IT decision-makers say they will always have a mix of traditional IT and cloud architectures.2 With important applications and workloads architected across both on-premises and hybrid, public and private cloud environments, business and IT stakeholders must be able to access data with equal efficiency, reliability and speed—regardless of physical location, infrastructure type or time frame.
Tags : 
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"With the introduction of Oracle Database In-Memory and servers with the SPARC S7 and SPARC M7 processors Oracle delivers an architecture where analytics are run on live operational databases and not on data subsets in data warehouses. Decision-making is much faster and more accurate because the data is not a stale subset. And for those moving enterprise applications to the cloud, Real-time analytics of the SPARC S7 and SPARC M7 processors are available both in a private cloud on SPARC servers or in Oracle’s Public cloud in the SPARC cloud compute service. Moving to the Oracle Public Cloud does not compromise the benefits of SPARC solutions. Some examples of utilizing real time data for business decisions include: analysis of supply chain data for order fulfillment and supply optimization, analysis of customer purchase history for real time recommendations to customers using online purchasing systems, etc. "
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : 
middleware, java, big data, analytics, mobile development
    
JBoss Developer
Published By: JBoss Developer     Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
Tags : 
microservices, architecture, java, paas, soa
    
JBoss Developer
Published By: VMware     Published Date: Apr 09, 2019
Download Infographic.
Tags : 
    
VMware
Published By: Gigamon     Published Date: Feb 20, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon
Published By: AppDynamics     Published Date: Sep 20, 2017
A microservice architecture provides benefits in the areas of service isolation and deployment as well as independent scalability. These benefits lead to more rapid release cycles and better use of available resources. But a microservice architecture also presents a host of new challenges in both deployment as well as performance management. The benefits to microservices far outweigh their challenges and, by identifying them early, you can plan for and ensure that your adoption of a microservices architecture goes smoothly.
Tags : 
microservice, management, business transactions, hybrid cloud, docker, environment
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 20, 2017
Larger organizations run into problems when monolithic architectures cannot be scaled, upgraded or maintained easily as they grow over time. Microservices architecture is an answer to that problem. It is a software architecture where complex tasks are broken down into small processes that operate independently and communicate through language-agnostic APIs.
Tags : 
mobile devices, web apps, operating systems, ram, server utilization, multi-core services, ethernet
    
AppDynamics
Published By: CA Mainframe     Published Date: Sep 12, 2008
Business and IT executives should not have to choose between their desire to innovate for future growth and the desire to avoid disrupting current operations. Enterprise innovation that embraces and extends existing infrastructure and applications is possible through modern software architectures such as web services and SOA – as long as those investments perform competitively when measured against alternative platforms and they are able to be modernized to participate in these architectures.
Tags : 
ca mainframe, mainframe, infrastructure, architecture, platforms
    
CA Mainframe
Published By: Liaison Technologies     Published Date: Nov 21, 2011
In this whitepaper, we describe how executive and IT management can get and maintain control of their company's data architecture to help meet business objectives. We describe the relationship between data integration projects and data architecture concepts and practices. We describe how the business planning and IT development processes that direct and leverage data integration projects depend on tooling. We describe breakthrough ways in which data architects, business analysts, programmers, and business users can collaborate to address their organization's pressing business challenges.
Tags : 
enterprise, soa, technology, liaison, business, data integration, data architecture, it management
    
Liaison Technologies
Published By: Teradata     Published Date: Jan 30, 2015
This TDWI Checklist Report discusses adjustments to DW architectures that real-world organizations are making today, so that Hadoop can help the DW environment satisfy new business requirements for big data management and big data analytics.
Tags : 
data, data warehouse, hadoop, hadoop ecosystem, data architectures, data archiving, advanced analytics, data management, data center
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
This report is about two of those architectures: Apache™ Hadoop® YARN and Teradata® Aster® Seamless Network Analytical Processing (SNAP) Framework™. In the report, each architecture is described; the use of each in a business problem is illustrated; and the results are compared.
Tags : 
teradata, data, big, data, analytics. insights, solutions, business opportunities, challenges, technology, aster, snap, framework, apache, hadoop, yarn, architectures, data management, business technology
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
It is hard for data and IT architects to understand what workloads should move, how to coordinate data movement and processing between systems, and how to integrate those systems to provide a broader and more flexible data platform. To better understand these topics, it is helpful to first understand what Hadoop and data warehouses were designed for and what uses were not originally intended as part of the design.
Tags : 
teradata, data, big, data, analytics. insights, solutions, business opportunities, challenges, technology, framework, apache, hadoop, architecture, warehouse, optimization, security, scalability, consistency, flexibility, data management
    
Teradata
Published By: CAST     Published Date: May 06, 2013
Download the paper to learn about CAST Application Intelligence Platform (AIP), the only enterprise-grade software quality assessment and performance measurement solution available.
Tags : 
architecturally complex violation, architectural hotspot, architecture of decay, cast, cast aip
    
CAST
Published By: Juniper Networks     Published Date: Jan 11, 2016
Le guide, Les 5 étape de la planification et de la conception d'un pare-feu, résume les étapes de la planification d'un pare-feu réseau. Il contient aussi des liens vers un guide détaillé comprenant d'autres sites et publications utiles sur le sujet. Si vous concevez l'architecture du pare-feu de votre société, commencez par lire ce document.
Tags : 
    
Juniper Networks
Published By: Red Hat     Published Date: Nov 30, 2015
A step-by-step guide for adopting software-defined storage as part of a practical, proactive strategy for managing enterprise data. Flexibility is inherent in this technology, and now more than ever, a flexible IT architecture might be the key to facing the once unthinkable challenges of big data.
Tags : 
software-defined storage, enterprise data, it architecture, big data, enterprise applications
    
Red Hat
Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top