Whitepaper Library
 

it as service

Results 1 - 25 of 1977Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
Now there's an innovative new way to move enterprise applications to the public cloud while actually reducing risks and trade-offs. It's called multi-cloud storage, and it's an insanely simple, reliable, secure way to deploy your enterprise apps in the cloud and also move them between clouds and on-premises infrastructure, with no vendor lock-in. Multi-cloud storage allows you to simplify your infrastructure, meet your service-level agreements, and save a bundle.
Tags : 
hpe, multicloud, storage, private cloud, public cloud, digital
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Feb 07, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DNS speed and reliability are fundamental to the performance of your website and essential to your business. Contact Dyn today to learn how a supplemental DNS service can help you optimize DNS performance and improve user experiences. We can help you determine which multi- DNS option is best for your business and assist with planning and service integration efforts.
Tags : 
dns, service, management, traffic, vendors, delegation, protocol, traffic
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : 
software provider, cloud service provider, gdpr
    
Mimecast
Published By: IBM     Published Date: Oct 17, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive (MiFID2). Many of these new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data
Tags : 
    
IBM
Published By: Epicor     Published Date: Feb 09, 2018
As mobile devices become increasingly essential to our working lives, your business—and your enterprise resource planning (ERP) system—must connect to these vital tools or risk losing to the competition. When employees can use their preferred devices to access information on demand, distributors like you can improve employee collaboration, increase productivity, and deliver exceptional customer service. In this Epicor eBook, you’ll discover how mobile technologies can integrate with your ERP solution to help you: • Instantly give customers what they want • Make faster business decisions • Use the right tools to enhance sales productivity Download the eBook to learn how else you can capitalize on greater mobility and grow your distribution business.
Tags : 
distribution, mobility
    
Epicor
Published By: Staples Business Advantage     Published Date: Jan 26, 2018
As a Staples Business Advantage® customer, exclusive content is just one of the perks you can access any time. In this white paper, we’ll explain how everything can come as a service (XaaS), even the devices used to access your network (DaaS). Learn why this should be your company’s ultimate goal.
Tags : 
daas, xaas, it services
    
Staples Business Advantage
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. The MP7000 is loaded with features that take scanning performance and simplicity to the next level, enabling faster-than-ever checkout in cashier-manned and self-checkout lanes, improving cashier productivity, POS throughput and the shopper experience. A smart investment, the MP7000 offers an unmatched industry-best total cost of ownership (TCO) by delivering maximum uptime and minimum power consumption in an easy-to-service design with fewer parts and components. And with Zebra's complimentary powerful management applications, you can remotely manage all of your MP7000s, no matter where they are located.
Tags : 
scanner, customer, productivity, mp7000, tco, total cost of ownership
    
Zebra ABM
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
As enterprises work to replicate the development agility of internet companies and innovate in highly competitive markets, application development has grown increasingly complex. The large, monolithic codebases that traditionally power enterprise applications make it difficult to quickly launch new services. Siloed and potentially distributed development and operations teams present organizational alignment problems. On top of this, users are more demanding than ever – enterprises need to scale effectively and monitor deployments to ensure customers are provided with high performance and a consistent experience. Of course, all this needs to be done while providing always-on service availability.
Tags : 
microservices, mongodb, optimization, applications, astute
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
À l’heure où les entreprises traditionnelles s’emploient à copier les pionniers d’Internet sur le terrain de l’agilité et de l’innovation, le développement d’applications devient de plus en plus complexe. Tout d’abord, les codes source monolithiques sur lesquels reposent traditionnellement les applications d’entreprise ralentissent le lancement de nouveaux services. Quant au cloisonnement et à la dispersion des équipes opérationnelles et de développement, ils provoquent un manque de coordination des actions de chacun en interne. Et pour couronner le tout, les utilisateurs sont plus exigeants que jamais sur les questions d’expérience et de performance. Les entreprises doivent donc assurer une scalabilité efficace et un suivi attentif de leurs environnements. Le tout, bien entendu, sur fond de disponibilité à 100 % des services.
Tags : 
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Viele Unternehmen möchten sich in stark umkämpften Märkten einen Ruf als Innovatoren erarbeiten und streben daher die Flexibilität an, die erfolgreiche Internet-Unternehmen auszeichnet. Die Komplexität der Anwendungsentwicklung nimmt dadurch jedoch schnell stark zu. Der umfangreiche und oft monolithische Quellcode herkömmlicher Unternehmensanwendungen ist keine geeignete Basis für die schnelle Einführung neuer Services. Voneinander isolierte und möglicherweise auch geografisch verteilte Entwickler- und Administratoren-Teams bringen zusätzliche Herausforderungen auf organisatorischer Ebene mit sich. Gleichzeitig steigen die Ansprüche der Anwender. Unternehmen müssen ihre Anwendungen effektiv skalieren und überwachen können, um eine gleichbleibend hohe Leistung und Benutzerfreundlichkeit zu gewährleisten. Dabei gilt es inzwischen als selbstverständlich, dass Services rund um die Uhr uneingeschränkt verfügbar sind.
Tags : 
    
AstuteIT_ABM_EMEA
Published By: Oracle     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
In this white paper, IDC discusses the inherent difficulties associated with traditional backup schemes and the changing dynamics of data protection strategies. We examine Oracle's Zero Data Loss Recovery Appliance (ZDLRA) and the role it can play in providing significantly improved service levels for all types of Oracle databases.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
    
Oracle
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
The right third party solution can ensure that email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Office 365. But, what are the three key areas of concern around Office 365 email that you should be aware of? Read what Microsoft Office Servers and Services MVP, J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
office 365, risk mitigation, geek book, sla, cyberattacks
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
An Email Security Risk Assessment conducted this year by Mimecast re-examined more than 40 million emails that had been OK’d by various security solutions, including Office 365. Of those, more than 19,000 were found to be “dangerous file types,” infected with malicious malware attachments or cleverly disguised impersonation attacks. This expert white paper explores how you can close Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Tags : 
office 365, email security, risk assessment, security services, malware, security solutions
    
Mimecast
Published By: VMware     Published Date: Dec 05, 2017
"Are you planning a migration off Citrix XenApp or XenDesktop? Or looking for ways to make them run as good as you thought they should? Then this is the session for you. Come hear from the architect of VMware's Citrix migration and enhancement strategies as he explains how key VMware technologies such as Horizon, App Volumes, Instant Clone and NSX can help. We will dive deep on how to evaluate the state of the Citrix environment, assess project requirements and review real world scenarios. By the end of the session you will know all about the best-practices, tools and services available to ensure your project is a complete success. Download the webinar to learn how VMware technologies can help solve your Citrix problems!"
Tags : 
vmware, citrix, app volumes
    
VMware
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas
    
NEC
Published By: MuleSoft     Published Date: Jan 16, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservice implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.