architect

Results 1 - 25 of 2037Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
This blueprint, based on HPE Pointnext Services experts’ real-world experience, is a “How To” guide that captures the business and technology challenges driving software defined infrastructure (SDI) and provides actionable steps for overcoming them. Gain tips to transition to hybrid cloud and take advantage of software-defined architectures for agile development and self-serve IT.
Tags : 
    
Hewlett Packard Enterprise
Published By: SPTel APAC     Published Date: Jul 03, 2020
This white paper addresses the opportunity for the acceleration of IoT deployment supported by Singapore’s first IoT-as-a-Service (IoTaaS) platform developed by SPTel. It also discusses the benefits of integrating IoT with Edge Computing via pervasive hubs around the island and how users can leverage this advantage that is unique to SPTel. The paper highlights the use cases of IoT supported by Edge Computing, explores the areas where it will benefit organizations and clarifies how SPTel’s network and digital services proposition can help in the development of a Smart Nation. This white paper will be of value to Architects, IoT Enthusiasts and other decision makers working in the ICT domain looking to deploy new or integrate existing IoT solutions in a wide range of smart city use cases like smart facility management, Industry 4.0, Smart Surveillance and more.
Tags : 
    
SPTel APAC
Published By: DELL IS Cloud     Published Date: May 27, 2020
Public cloud adoption is a reality for most enterprises: 65% of North American enterprises have adopted the use of public cloud and it is the preferred deployment for many applications.1 Today, organizations leverage more than one cloud provider — e.g., multicloud — with 75% of decision makers describing their approach as hybrid, and 66% defining hybrid as a form of multicloud.2 Recent research revealed almost all organizations with a multicloud strategy now use multiple clouds for mission-critical applications too — including those that store customer and financial data, drive sales and eCommerce, and deliver customer experience.3For many organizations, the power to leverage different clouds for different applications allows them to optimize capabilities, sourcing, and deployment models according to their business requirements. The tradeoff, however, can be an overwhelmingly complex multicloud architecture, with many moving parts that slow decisions and progress.4Organizations with mu
Tags : 
    
DELL IS Cloud
Published By: Fortinet EMEA     Published Date: May 14, 2020
Corporate DevOps teams are leading the way to the cloud, but many are overlooking the full security implications of the move. If they simply accept the security offerings of their cloud platform, they are likely to leave gaps that attackers can exploit to steal data or infiltrate other areas of the corporate network. There are at least five security areas that security architects need to ensure they have covered when building and managing security in the cloud. Fortinet offers a critical layer of security that integrates with the broader security architecture. It includes solutions for cloud platform security management, native integration of purpose-built security into the cloud platform, as well as web application and application programming interface (API) protection. It also provides integrations that help DevOps teams to automate security tasks in their cloud environments. All these help organizations achieve a consistent security posture and an effective security life-cycle manag
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 15, 2020
IT infrastructure modernization is well underway as healthcare organizations need to be more agile in their response to digital transformation initiatives. Legacy architectures simply cannot keep up with the pace of change associated with value-based health and rapidly evolving technical requirements. Constrained IT resources require solutions that improve operational efficiencies and optimize resources. This IDC InfoBrief presents a case study that describes how a customer deployed Fortinet Secure SD-WAN to improve network and application performance while reducing total cost of ownership (TCO).
Tags : 
    
Fortinet EMEA
Published By: Pure Storage     Published Date: Jun 23, 2020
Using log analytics to generate insight and value is challenging. The volume of log data generated all over an enterprise is staggeringly large, and the relationships among individual pieces of log data are complex. There is no simple way of determining what is important or unimportant when the logs are first collected, and conventional data analytics are ill suited to handle the variety, velocity, and volume of log data. This report examines emerging opportunities for deriving value from log data, as well as the associated challenges and some approaches for meeting those challenges. It investigates the mechanics of log analytics and places them in the context of specific use cases, before turning to the tools that enable organizations to fulfil those use cases. The report next outlines key architectural considerations for data storage to support the demands of log analytics. It concludes with guidance for architects to consider when planning and designing their own solutions to drive
Tags : 
    
Pure Storage
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 07, 2020
LTI partnered with a Leading Nordics Electronics Retailer to establish a technology foundation that enabled the customer to deliver on its digital transformation agenda. LTI took a two-step approach to deliver a scalable and modular architecture with pay as you go model OPEX Model, removing the need to make Capex investments to handle seasonal peaks. LTI provided a true Infrastructure as a Service Model encompassing – Capacity, Licenses, Implementation & Operations.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Menlo Security     Published Date: Apr 30, 2020
Cloud applications, such as Office 365 and G Suite, offer improved productivity but leave users susceptible to new forms of attacks. Network architectures not configured for direct-to-Internet connectivity cannot adapt to meet these security concerns that arise from greater SaaS adoption. Cloud-delivered security offers many advantages to meet the demands of SaaS and move beyond accepting network security as “almost safe.” A critical component of this modern security architecture is web isolation—the practice of moving the threat of attack away from the endpoint and into the cloud.
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
Zero Trust Internet is the solution for 100% email and web security because it considers all traffic to be potentially dangerous and isolates it, instead of trying to classify email and websites as either "safe" or "dangerous." Menlo Security’s Isolation Core™ embodies the principles of Zero Trust Internet to create a technical milestone in cybersecurity. The Isolation Core™ rewrites incoming web code, removes active content, and safely projects inactive content to end-user devices without lag. All content goes through the same process to ensure full, proactive protection. Download this whitepaper to understand: • How the Zero Trust Internet paradigm creates a safe browsing and email experience • The weakness of traditional network architectures to safeguard the end-user experience • How Menlo Security helped a Fortune 100 company achieve zero malware attacks in six months while adhering to Zero Trust Internet practices with our Isolation Core™
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
In-office employees have always experienced direct connections to a highly secure, highly controlled data center architecture, while a small subset of employees—on average around 10 percent of the workforce—worked remotely through secure virtual private network (VPN) connections. As we transform digitally, remote working becomes a ubiquitous reality, but how does this new way of working alter security and the current IT landscape? Delivering security through the cloud allows organizations to offload Internet traffic from legacy network security architectures such as VPNs and firewalls, while ensuring that security policies are applied consistently to all traffic originating from any user. The Menlo Security Global Cloud Proxy platform with an Isolation Core™ provides this new approach—enabling more robust security for the direct-to-cloud connectivity needed by your new remote workforce. Read this whitepaper to learn: • The inadequacies of traditional VPN architectures • The promise of
Tags : 
    
Menlo Security
Published By: Fortinet     Published Date: Jul 08, 2020
More and more organizations are turning away from branch routers in favor of Secure SD-WAN to become cloud-ready and improve the user experience. Not only are Secure SD-WAN solutions simple to manage but they also simplify WAN operations overall. Organizations should embrace Secure SD-WAN solutions to help branch users better leverage unified communications and collaboration, use critical SaaS applications, and easily access resources stored in the cloud. Find out the four key advantages Secure SD-WAN offers over legacy branch routing architectures.
Tags : 
    
Fortinet
Published By: BlackBerry     Published Date: Jun 01, 2020
According to the COVID-19 Employer Flash Survey, 36% of respondents reported that cyber threats has increased since employees started working from home. Some providers of cybersecurity are treating the current crisis as a gold rush, releasing so-called specially packaged versions of endpoint protection products that were never designed to secure a mobile workforce. BlackBerry® products and services, in contrast, are designed to offer customers a granular level of control regarding data collection for forensic examination. We go to great lengths to ensure privacy-by-design in the architecture of our endpoint agent, and we never treat our customers’ data as something to be profited from. Download this whitepaper to find out how BlackBerry can support you to mitigate cyber threats.
Tags : 
    
BlackBerry
Published By: Intel     Published Date: May 28, 2020
New-age banking driven by digital customers, demands modern infrastructure that is future-ready. Learn how Intel worked closely with SBI, the largest public sector bank in India, on their branch server consolidation project. SBI maximized Intel® Xeon® Scalable processors to accelerate their IT modernization and build an agile and scalable infrastructure by: • Deploying a virtualized cloud platform based on Intel® architecture • Consolidating 25000 branch servers spread across locations • Enhancing customer experience at branch level • Simplifying workloads and reducing costs
Tags : 
    
Intel
Published By: Intel     Published Date: May 28, 2020
More data means more opportunities to discover powerful, actionable insights around customers, but legacy IT architectures and approaches can block progressive analytics efforts. Intel® technologies-based infrastructure is optimized to help accelerate insights for core analytics applications. Find out how the 2nd Gen Intel® Xeon® Scalable processors and Intel® Optane™ DC persistent memory can help accelerate insights and boost your efforts by: • Getting your infrastructure tailored for analytics tasks • Delivering full-scale analytics to businesses • Improving ROI
Tags : 
    
Intel
Published By: Intel     Published Date: May 28, 2020
Modern businesses are looking for robust and powerful infrastructure that is scalable, secure, high-performing and can handle the data-hungry workloads in the data center. Intel® technology is empowering its partners to innovate and improve multi-cloud services to keep their customers at the forefront of their respective industries. Find out how Comarch, a leading service provider, is utilizing Intel® Xeon® Scalable processor family, Intel® Omni-Path Architecture (Intel® OPA), and Intel® Optane™ SSDs to serve its clients better by: • Running the needed workloads in the right place - be it on premise or in the cloud • Offering speed and reliability • Providing end-to-end multi-cloud services • Ensuring cost-efficiency, flexibility and high-performance infrastructure
Tags : 
    
Intel
Published By: Intel     Published Date: May 28, 2020
Artificial intelligence (AI) is a serious consideration for most organizations, and its potential grows even stronger when combined with high-performance computing (HPC). Intel is committed to ensuring its latest compute platforms based on Intel® Xeon® Scalable processors and other Intel® technologies are optimized for AI with HPC convergence. Find out how AI and HPC workload convergence running on an Intel-based HPC infrastructure reduces the need for specialized hardware/software and accelerates innovation with: • Quick-to-deploy infrastructure • Faster time to breakthrough • Actionable insights
Tags : 
    
Intel
Published By: Intel     Published Date: May 28, 2020
Artificial intelligence (AI) is a highly disruptive technology. The convergence of AI and high performance computing (HPC) can solve the most complex problems. Intel is driving this transformation with its data-centric portfolio that addresses unique challenges of HPC systems. HPC compute infrastructure, supported by 2nd Generation Intel® Xeon® Scalable processor and other Intel® technologies, can help build and speed machine learning and deep learning workflows Find out how Intel can jumpstart an organization’s AI journey on the existing HPC infrastructure to • Unlock scale and efficiency • Drive unprecedented agility, flexibility, and performance
Tags : 
    
Intel
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Intel     Published Date: Mar 12, 2020
As organizations adopt analytics platforms and AI technologies as distinct entities, there is a need to create dedicated clusters to deploy these capabilities. The existence of multiple clusters leads to under-utilized infrastructure. Intel works across the ecosystem to make converged HPC clusters function optimally. Clusters built on Intel® architecture like the 2nd Generation Intel® Xeon® Scalable processors deliver flexible, reliable and cost-effective performances across workloads. Explore the challenges and opportunities around running AI and analytics workloads on existing high-performance computing (HPC) clusters by downloading this detailed guide.
Tags : 
    
Intel
Published By: Intel     Published Date: Mar 12, 2020
Today, enterprises are looking to expand their definitions of high-performance computing (HPC) beyond simulation and modeling workloads to include artificial intelligence (AI) and analytics. Intel is working on all fronts to ensure enterprises have a seamless transition by contributing optimizations for Intel® architecture to open source projects. Innovations like the 2nd Generation Intel® Xeon® Scalable processors have been designed to enable more robust computing clusters that drive results across an array of workloads. Discover how you can improve workload performance with the latest Intel technologies by downloading this comprehensive guide.
Tags : 
    
Intel
Published By: ServiceSource     Published Date: May 07, 2020
Architecting Your Customer’s Success
Tags : 
    
ServiceSource
Published By: Trend Micro     Published Date: May 15, 2020
The common security challenges faced in the cloud stem from misconfiguration, compliance, and an exploding set of cloud infrastructure services. Hear how to combat these challenges and gain visibility into security, compliance, and governance vulnerabilities on your public cloud infrastructure. Join us to learn skills that will help you gain more free time and resources, while providing peace of mind that your infrastructure is secure: - Automatically evaluate how well your architecture is aligned to AWS best practices and industry compliance standards - Embrace a culture of security and DevOps in your organization - Implement necessary guardrails to grow and scale your business safely and securely
Tags : 
    
Trend Micro
Published By: Trend Micro     Published Date: Jun 19, 2020
While AWS provides secure, cloud infrastructure, through the Shared Responsibility Model, you are responsible for securing the workloads, applications, and data that you run on AWS. Learn how to do so in this guide.
Tags : 
    
Trend Micro
Published By: CloudPassage     Published Date: May 19, 2020
Enterprises large and small are migrating existing applications to the cloud and developing new applications on cloud-native infrastructure. Datacenter security practices don’t translate to cloud environments due to technical and operational changes that disrupt existing security and compliance approaches. As organizations transition to distributed DevOps models, application development velocity increases dramatically. Continuous delivery and software-defined infrastructure result in additions and changes to critical assets on-demand at any time. This webinar is for security engineers, DevOps engineers, cloud architects, and security executives. Your take-aways from this webinar will be the six “must-haves” for achieving real-world, practical cloud security. You will leave the webinar with a working understanding of: • How moving to the cloud changes development and security practices • How the concept of “practical cloud security” cuts through the noise and hype • What to expect an
Tags : 
    
CloudPassage
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture
    
Bell Micro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.