Share us:
 

architecture

Results 101 - 125 of 1366Sort Results By: Published Date | Title | Company Name
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 01, 2018
Why Read This Report The demand for databases is on the rise as organizations build next-generation business applications. NoSQL offers enterprise architecture (EA) pros new choices to store, process, and access new data formats, deliver extreme web-scale, and lower data management costs. Forrester’s 26-criteria evaluation of 15 big data NoSQL solutions will help EA pros understand the choices available and recommend the best for their organization. This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help EA.
Tags : 
nosql, market, industries, strategy, presence, vendor
    
AstuteIT_ABM_EMEA
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: Dell EMC     Published Date: Nov 02, 2015
Infrastructure that’s too expensive, inflexible, and difficult to manage has a stranglehold on enterprise IT. A new architecture from Dell is tackling these challenges by offering more choice, less complexity, and impressive scalability.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 09, 2015
While the EDW plays an all-important role in the effort to leverage big data to drive business value, it is not without its challenges. In particular, the typical EDW is being pushed to its limits by the volume, velocity and variety of data. Download this whitepaper and see how the Dell™ | Cloudera™ | Syncsort™ Data Warehouse Optimization – ETL Offload Reference Architecture can help.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
data, software-defined, hyper-convergence, hdd, sddc, storage management, data warehousing
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
Whether you’re dead set on winning the America’s Cup for Britain the first time like Olympian Sir Ben Ainslie or simply determined to keep your business competitive, success demands an infrastructure that can deliver quickly. Download the case study to learn how Ainslie’s British sailing team Land Rover Bar used innovative IT to deliver agility, reliability and speed in its bid to win, and how using hyper-converged infrastructure created a competitive advantage through improved performance and collaboration, reduced risk to critical applications, and provided the ability to spin up VMs in less than 15 minutes.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange, storage management, business intelligence
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 10, 2015
Storage is becoming more difficult for organizations to manage – learn how a unifying storage architecture can help.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 10, 2015
No matter how advanced data centers may become, they remain in a perpetual state of change in order to meet the demands of virtualized environments. But with the advent of software-defined storage (SDS) architecture, capabilities associated with hyperconverged technologies (including compute, storage, and networking), help data centers meet virtualization requirements with less administrator intervention at webscale.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 10, 2015
Download this whitepaper to see how Dell offers the technology, know-how and experience to deliver new workload-optimized architectures that simplify IT for any size enterprise.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile."
Tags : 
zero trust, security, cyber security, cloud
    
Akamai Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper offers a detailed look at the solution’s architecture, and some of the key features that make it stand apart from the competition.
Tags : 
ca uim, infrastructure management solutions, infrastructure management, virtualization, cloud computing, infrastructure
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This info-graph explains the challenges and potential problems caused by the monitoring of multiple tools and devices and provides a complete unified visualization to help provide you with a single view in one architecture.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim, virtualization, cloud computing, infrastructure
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
apis, risks of apis, apis can increase organization's risks, api security, access control, anti spam, application security, disaster recovery, intrusion detection, security management, data integration, data protection
    
CA Technologies
Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
A Dell Reference Architecture for 2,000 users with mailbox resiliency.
Tags : 
dell, microsoft® exchange server, vrtx, traditional information technology, it management
    
Dell Brought to you by Intel
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : 
collaborative consulting, business value, user expectations, mobile web, service architecture, technology challenges, information technology, program management, software solutions, context and services, wireless, business activity monitoring
    
Collaborative Consulting
Published By: Collaborative Consulting     Published Date: Dec 23, 2013
There are some surprisingly straightforward reasons behind the glitches, delays, and cost-overruns that can bedevil data warehouse initiatives. ...The first is simply confusing expectations with requirements. But four other troublemakers can also lead to big problems for developers, IT departments, and organizations seeking to maximize the business value of information.
Tags : 
collaborative consulting, data warehouse, failed projects, business intelligence, business solution, meet expectations, big data, profile importance, cloud vendors, data quality, business goals, complicated architectures, avoid wasted expense, data management, data center
    
Collaborative Consulting
Published By: Dell     Published Date: May 04, 2015
Read now to learn how you can get the most out of your private cloud, as well as the hardware and software components of this architecture.
Tags : 
    
Dell
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, enterprise applications
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, enterprise applications
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Intel® Xeon® Prozessor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, enterprise applications, data center
    
DellEMC and  Intel®
Published By: Dell EMC     Published Date: Aug 17, 2017
If your business uses a three-tier architecture with disaggregated servers, storage, and SAN to run applications, you might be considering upgrading to an integrated solution to streamline your business. However, implementing a hyperconverged Dell EMC XC Series cluster powered by Nutanix software is an even more attractive option that can provide over 73 percent greater database performance - an advantage that translates to 50 percent greater database performance per dollar than a traditional integrated solution.
Tags : 
three-tier architecture, disaggregated servers, integrated solution, hyperconverged infrastructure, database performance
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2018  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service