cloud architecture

Results 151 - 175 of 316Sort Results By: Published Date | Title | Company Name
By: Intacct Corporation     Published Date: Jan 02, 2014
Learn the 4 essential features to bring your accounting system out of the Stone Age. Modern businesses are, by their nature, complex. But if you're using an accounting system that forces you to struggle with manual processes—limiting your flexibility and draining your productivity—you might as well be stuck in the Stone Age. But there's great news! It's 2014, and there's never been a better time to make the move to a modern accounting system. What features should you look for? Download our new checklist, "Essential Features of a Modern Accounting System," to learn how the right accounting system can help you: • Automate financial processes and optimize workflows to fit your organization's business processes. • Access real-time data to drive business insight and improve decision making. • Lower IT costs and reduce technology risks with a best-in-class cloud architecture.
Tags : accounting, modernizing account system, automate financial processes, business processes, real-time data access, best-in-class cloud architecture, business technology
     Intacct Corporation
By: Oracle     Published Date: Apr 03, 2012
Download this free white paper to learn how platform-as-a-service private cloud offers enterprises one of the best ways to take advantage of cloud computing.
Tags : oracle, cloud, private cloud, middleware, platform as a service, stack, architecture, silo, roi, weblogic
     Oracle
By: Equinix     Published Date: Oct 20, 2015
The cloud is impacting WAN architectures. IT leaders looking to use a cloud-based infrastructure and/or application services, especially high-bandwidth, real-time voice and video over Internet Protocol applications, should strategically locate communications hubs outside the enterprise data center.
Tags : communication hubs, wan architectures, cloud-based infrastructure, application services, high-bandwith, networking, enterprise applications
     Equinix
By: AWS     Published Date: Nov 16, 2018
"Today’s technology advances at a fast rate. Attempting to adopt modern architectures can uncover a knowledge gap with developers, who might be unfamiliar with new architecture patterns and frameworks. This includes adopting cloud-native architectures to help with greater efficiency and cost benefits. TIBCO’s integration solutions helps enable you to create an environment that simplifies the building of cloud-native applications, with support for modern architectures, such as microservices, event-driven APIs, serverless, and edge deployment. Download this solution brief to see how you can help accelerate your development on AWS cloud by: • Helping reduce your costs with modern application microservices and functions • Seamlessly migrating your integration workloads to Amazon Elastic Container Service using out-of-the-box migration utilities • Connecting your cloud, on-premises, and edge data sources, regardless of data formats "
Tags : 
     AWS
By: AWS     Published Date: Nov 16, 2018
"For existing applications to gain the agility, scalability, resilience, and cost benefits of cloud computing, organizations need to adopt cloud-native architectures. By making this switch, you’ll be better suited to scale more quickly, so you can help meet your ever-changing user demands. The challenge is how to make this transition to a cloud-native architecture, quickly and easily. Download this complimentary white paper to learn how your organization can help simplify the transition to cloud computing by leveraging Amazon Elastic Container Service and TIBCO®. You’ll learn: • Best practices for agile development • New platforms for deployment • The right tools for digital business agility "
Tags : 
     AWS
By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
     Ciena
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
     Ciena
By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
     CA Technologies EMEA
By: VMware     Published Date: Sep 06, 2017
Download this infographic to learn how VMware Workspace™ ONE™ helps more organizations compete in the mobile cloud era by providing productivity-enhancing capabilities that are simply better. Tailored to uniquely provide both end-user mobility and IT control, VMware mobile-cloud architecture addresses the needs of today’s organizations more effectively than Citrix.
Tags : 
     VMware
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Jelecos     Published Date: Feb 11, 2019
The AWS Well-Architected framework has been developed to help cloud architects utilize best practices to build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for Jelecos and its customers to evaluate architectures and provides guidance to help implement designs that will scale with your application needs over time.
Tags : 
     Jelecos
By: BMC ASEAN     Published Date: Dec 18, 2018
400+ IT professionals reveal what’s next for workload automation How are today’s leading companies using workload automation to drive their most important IT initiatives? Find out in this detailed report summary from analyst firm Enterprise Management Associates (EMA). You’ll learn how the role of workload automation is evolving, including: The rise of predictive analytics in WLA Surprising stats on the frequency and ease of migration How big data and cloud impact WLA The use of containers and micro services architectures Workload automation is changing fast. Keep up with the latest analyst research – download the report.
Tags : 
     BMC ASEAN
By: Citrix NetScaler     Published Date: May 06, 2013
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application visibility and control function is only growing, as trends such as mobility, virtualization, and cloud computing fundamentally alter datacenter and application architectures. With NetScaler Insight Center enterprises get: • Unparalleled application visibility and invaluable operational intelligence; • Increased operational efficiency, as troubleshooting and capacity planning efforts are greatly simplified; • An optimized user experience that drives greater employee productivity and customer satisfaction; • Increased assurance that governing SLAs will always be met; and, • Reduced total cost of ownership, based on having a low-cost, low-impact solution—particularly compared to traditional
Tags : application visibility, netscaler insight center, optimized user experience, low cost, citrix, knowledge management, enterprise applications
     Citrix NetScaler
By: Workday France     Published Date: Aug 03, 2018
Le changement n'est jamais facile, surtout lorsqu'il concerne les applications de gestion. Les responsables informatiques savent cependant que passer au cloud permet de gagner en efficacité et en rapidité et de réaliser d'importantes économies. Mais en quoi les applications Cloud sont-elles si différentes de celles conçues à partir d'une architecture traditionnelle ou hybride ? Consultez ce livre Blanc de CIO.com pour découvrir les différentes architectures cloud, la façon dont elles influencent les capacités et les performances des applications et ce que cela induit en terme de migration depuis les systèmes actuels.
Tags : 
     Workday France
By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure™ and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen™, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isn’t effective against a given threat, another will step in to eliminate the threat.
Tags : 
     Trend Micro
By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : idc, cloud, cloud federation, identity and access management, iam, security, silos, deployment
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : ddos, ddos defense, security
     F5 Networks Inc
By: NaviSite     Published Date: Sep 02, 2014
This whitepaper explores the hybrid cloud, the traditional approaches to cloud computing and why companies are not opting for 100% cloud architecture or 100% physical architecture.
Tags : the hybrid cloud, cloud versus physical architecture
     NaviSite
By: Amazon Web Services     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
     Amazon Web Services
By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
     Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com