container

Results 1 - 25 of 136Sort Results By: Published Date | Title | Company Name
By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 25, 2019
As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we値l walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
     Red Hat
By: Avi Networks     Published Date: Mar 12, 2019
TCPdump may be old, but does that matter? Application proliferation as apps move from bare metal to virtual machine to containers Network teams are asked to do more with the same number of people Network analysis in public clouds and containers requires different tools
Tags : 
     Avi Networks
By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
     Avi Networks
By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
     Avi Networks
By: Tagman     Published Date: Mar 21, 2011
This white paper examines the true costs associated with the Tagging of websites to implement and track the performance of online marketing technologies such as web analytics, display ad serving and search marketing. This research was conducted by TagMan, a smart container tag with real-time attribution and web-page acceleration.
Tags : web analytics, tagging, real time attribution, web page acceleration, tagman
     Tagman
By: HPE APAC     Published Date: Jun 20, 2017
This white paper shows IT architects, administrators, and DevOps developers how to deploy Docker hosts and execute containerized applications on bare-metal infrastructure.
Tags : infrastructure, bare--metal infrastructure, it transformation, business opportunities, operations
     HPE APAC
By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars妖istributed integration, containers, and APIs葉o deliver flexibility, scalability, and reusability.
Tags : 
     Red Hat
By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE thanks to a unique shared memory and vertical scale architecture make it suitable for workloads such as databases and systems of reco
Tags : 
     IBM
By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the 訴dentity-aware perimeter. The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on 層here you are than 層ho you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
     Preempt
By: CA Technologies     Published Date: Nov 07, 2014
D馗ouvrez dans ce livre blanc une technologie unique de gestion des caract駻istiques de s馗urit, de performances, de conformit et de support de tout type de p駻iph駻ique, d誕pplication, de contenu ou de courriel, qui pr駸erve la qualit de l弾xp駻ience utilisateur mobile.
Tags : mobile user experience, security features, security in the cloud, the mobile user experience, optimising the user experience, business technology
     CA Technologies
By: VMWare - vFabric     Published Date: May 10, 2012
Learn why your peers are replacing JEE containers with lightweight application servers - and what you can gain from the move.
Tags : vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, networking, data management
     VMWare - vFabric
By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
     Oracle APAC
By: Oracle APAC     Published Date: May 24, 2018
Container technologies have substantial benefits especially given the need to isolate applications to increase service levels. Linux Containers (LXC) and Docker containers can be your best choice, depending on your use case.
Tags : 
     Oracle APAC
By: Oracle     Published Date: Mar 06, 2017
Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production monitoring, or Node.js running on enterprise-grade cloud infrastructure.
Tags : 
     Oracle
By: Juniper Networks     Published Date: Oct 25, 2017
The primary purpose of containerized applications is to improve the effectiveness of software teams, making it easier for people to work together while lowering the communications overhead. In large enterprises, applications such as ERP or CRM software suites often begin as simple projects, but as time passes, they quickly become clunky and inefficient, with a monolithic code base that slows progress for development teams.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you can稚 escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: Adopt and scale containers faster. Move existing services to containers. Eliminate the friction between development, QA, and production environments.
Tags : 
     Puppet
By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast there痴 so much more than servers and endpoints. Now, you池e responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you池e responsible for guarding your organization痴 fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
     Tenable
By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it痴 fair to say the perimeter has left the premises. Whether it痴 discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today痴 attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
     Tenable
By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function especially IT security. Whether it痴 discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for 撤anel Webinar: Reducing Cyber Exposure from Cloud to Containers. Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
     Tenable
By: Loodse     Published Date: Feb 06, 2019
Customers began to approach hosting provider SysEleven about running containers and using container orchestration. To offer their customers the highest quality services for which they are known, they sought an easy to use container orchestra- tion solution. SysEleven chose to partner with Loodse to create MetaKube, a white label of Loodse痴 Kubermatic Container Engine, giving their customers Kubernetes clusters in one click. Simon Pearce, MetaKube Team Lead and Systems Architect at SysEleven, explains why they chose Kubermatic to run Kubernetes in their data centers.
Tags : 
     Loodse
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com