app performance

Results 1 - 25 of 1292Sort Results By: Published Date | Title | Company Name
By: Dell EMC Storage     Published Date: Aug 15, 2019
Au fur et à mesure que les entreprises effectuent une transformation numérique, elles se tournent vers de nouveaux modèles économiques qui reconnaissent les données comme une ressource stratégique essentielle pour alimenter les applications et favoriser les décisions métiers. Pour ce faire, il est nécessaire de transformer les données collectées et gérées par les entreprises en un capital important appelé « capital de données ». L’infrastructure et les charges de travail traditionnelles des technologies de l’information ne sont pas conçues pour favoriser la création d'un capital de données. L’ampleur des données qui doivent être capturées, stockées, protégées et disponibles à l’utilisation, ainsi que les besoins des applications de nouvelle génération (NGA) que les départements informatiques développent pour stimuler la création de ce capital de données dépassent les fonctionnalités de l’infrastructure traditionnelle dans le domaine des performances, de l’évolutivité, de la disponibili
Tags : 
     Dell EMC Storage
By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
     NTT Ltd.
By: Cohesity     Published Date: Aug 09, 2019
As organizations continue to look for ways to increase business agility, a need for a modern database architecture that can rapidly respond to the needs of business is more apparent than ever. While an RDBMS still serves as a lifeline for many organizations, the adoption of technologies such as NoSQL and Hadoop are enabling organizations to best address database performance and scalability requirements while also satisfying the goals of embracing hybrid cloud and becoming more data-driven. And with organizations relying so heavily on these new technologies to yield rapid insights that positively impact the business, the need to evaluate how those new technologies are managed and protected is essential. Hadoop and NoSQL workloads are now pervasive in production environments and require “production-class” data protection, yet few data protection solutions offer such capabilities today.
Tags : 
     Cohesity
By: Riskified     Published Date: Aug 06, 2019
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming. Riskified is proud to present the eCommerce Fraud Solution Buyer’s Kit, a comprehensive series of resources designed to guide executives, decision makers, and procurement professionals through the process of assessing current fraud management performance and understanding which available approaches and solutions can best meet their needs.
Tags : 
     Riskified
By: VMware SD-WAN by VeloCloud     Published Date: Aug 01, 2019
SD-WAN is designed for modern business. With it, you can apply software-defined principles to automate, optimize, and accelerate application performance over the WAN to meet business outcomes. Quite simply, SD-WAN is one of the smartest ways to modernize connectivity to the branch office and bring end-to-end simplicity across the network. Read this e-book now to discover 6 ways SD-WAN redefines branch office networking.
Tags : 
     VMware SD-WAN by VeloCloud
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Juniper Networks     Published Date: Jul 31, 2019
As the number and severity of cyberattacks continue to grow with no end in sight, cybersecurity teams are implementing new tools and processes to combat these emerging threats. However, the oneoverriding requirement for meeting this challenge is improved speed. Whether it’s speed of detection, speed of remediation or other processes that now need to be completed faster, the ability to do things quickly is key to effective cybersecurity. The reason why speed is essential is simple: As the dwell time for malware increases, the lateral spread of an attack broadens, the number of potentially breached files expands, and the difficulty in remediating the threat increases. And the stealthy nature of many of the newer threats makes finding them faster?before they become harder to detect?a critical focus in reducing the impact of an intrusion. These requirements make it essential that security operations centers (SOCs) can complete their activities far more quickly, both now and moving forwa
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Workday     Published Date: Jul 30, 2019
This Aberdeen report centers it's focus on where they have seen ME organizations spend most of their time -- in employee acquisition. And rather, their study finds that their focus could be better applied to workforce engagement strategies and real-time performance management that can better manage retention goals over time.
Tags : 
     Workday
By: Group M_IBM Q3'19     Published Date: Jul 30, 2019
Some technologies cause ripples, others cause waves of transformation. Artifical Intelligence (AI) is prehaps the most transformative of ur era. Read this paper to learn how AI can help you transform your business and B2B network so that you can build a business network for the future. Discover three ways you can apply AI--today--to build a modern, faster, more efficient B2B network: Access detailed, real-time transactional intelligence across your business Gain in-depth, real-time visability into supplier and partner performance Empower supply chain and LOB users with self-service
Tags : 
     Group M_IBM Q3'19
By: AWS     Published Date: Jul 29, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
     AWS
By: AWS     Published Date: Jul 24, 2019
Add more value to your business Independent Software Vendors (ISVs) are turning to the cloud to modernize their applications and get rid of their commercial database dependencies to improve application performance, lower total cost of ownership (TCO), and reach new customers. DB Best delivers the established processes and technology ISVs need to accelerate the modernization of applications still running on commercial databases to Amazon Aurora. This enables your customers to quickly get up-and-running on the cloud and drive greater business value through Amazon Web Services (AWS). View the webinar to learn how DB Best and AWS enable you to accelerate every stage of your application modernization journey – from evaluating the right migration path for your application, to following a proven and repeatable database migration process, to driving growth and reaching more customers.
Tags : 
     AWS
By: AWS     Published Date: Jul 24, 2019
Modernize your applications quickly Many organizations are finding their legacy technology to be inadequate due to its rigidity and high costs. In search of more flexible and cost-effective solutions, many are turning to the cloud. Most Independent Software Vendors (ISVs), however, still build their solutions on commercial databases that are expensive and time-consuming for their customers to deploy and maintain. This is a significant undertaking that can hinder adoption. To address these challenges head on, ISVs can modernize their applications on Amazon Aurora, a database offering from AWS that combines the reliability and performance of commercial databases with the cost-effectiveness and flexibility of open source solutions. In this webinar, you will learn how Virtusa, an AWS Partner Network (APN) Premier Consulting Partner, can accelerate your application modernization journey and help you grow your business. PTNR_ipc-database-migration-icon_245×155_Mar-2019.png View the webin
Tags : 
     AWS
By: AWS     Published Date: Jul 24, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
     AWS
By: NetApp APAC     Published Date: Jul 04, 2019
"This report discusses NetApp’s AFF and FAS product lines, ONTAP 9 advanced functionality, NetApp SAN history and NetApp AFF A700s SAN IO performance. Our performance review uses recent benchmark results, ranks the A700s against a list of enterprise flash storage systems and shows where the NetApp AFF A700s falls on Silverton Consulting’s All-Flash Storage ChampionsChart™."
Tags : 
     NetApp APAC
By: NetApp APAC     Published Date: Jul 04, 2019
This IDC study provides an evaluation of 10 vendors that sell all-flash arrays (AFAs) for dense mixed enterprise workload consolidation that includes at least some mission-critical applications. "All-flash arrays are dominating primary storage spend in the enterprise, driving over 80% of that revenue in 2017," said Eric Burgener, research director, Storage. "Today's leading AFAs offer all the performance, capacity scalability, enterprise-class functionality, and datacenter integration capabilities needed to support dense mixed enterprise workload consolidation. More and more IT shops are recognizing this and committing to 'all flash for primary storage' strategies."
Tags : 
     NetApp APAC
By: Pure Storage     Published Date: Jul 03, 2019
Splunk® has become a mission critical application. Thousands of organizations are gaining insight from their machine data and transaction logs using Splunk, and many more are planning to deploy Splunk. No matter what stage you’re in, having guidelines to follow can help improve the Splunk experience. Since a mission critical data application deserves a mission critical data platform, Pure Storage® built the solution on the Pure FlashStack™ converged infrastructure solution. FlashStack is a joint offering from Cisco® and Pure Storage. This paper is intended to provide a framework for designing and sizing a high-performance, scalable, and resilient Splunk platform. Pure Storage is a leading all-flash array provider focused on reducing storage complexity while improving Splunk performance, resiliency, and efficiency. To assure that your Splunk platform is sized appropriately, Pure Storage tested Splunk Enterprise on Pure’s FlashStack platform. The top takeaways from these efforts are tha
Tags : 
     Pure Storage
By: Red Hat APAC     Published Date: Jun 27, 2019
"To be competitive today, you must deploy robust, innovative applications that meet your customers’ needs. Many times, those new apps depend on existing apps and data sources to function. The success of your apps—not to mention your ability to compete—depends on your ability to integrate new services with old systems and technologies. By integrating with Red Hat Fuse, these organizations achieved: - An average three-year ROI of 520%. - A payback time of six months. - 5.5x more apps integrated per year. - 31% better app performance. Download the IDC whitepaper to learn more, and see how Red Hat Fuse can make your apps more efficient and productive."
Tags : 
     Red Hat APAC
By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 21, 2019
Accelerate your digital transformation journey by giving teams and tools the application visibility needed to monitor and secure modern digital applications. Download this whitepaper to learn how you can Isolate and extract application and component traffic across multiple tiers for monitoring, Provide application metadata to analytics tools, enabling faster detection of customer experience, application performance and security-related issues and send only relevant traffic to the appropriate tools to reduce load and increase effectiveness.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 21, 2019
An online threat prevention strategy should be more than a collection of security tools. It needs to be an integrated and intelligent approach. A complete threat prevention solution not only enhances the performance of prevention tools, but it also increases the efficiency of operations teams by enabling them to quickly deploy patches and implement new technology without impacting network performance or relying on maintenance windows. Read this solution brief in local language to learn how you can gain 50% in team productivity.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
     Gigamon
By: Zscaler     Published Date: Jun 20, 2019
Office 365 n’est pas une application SaaS comme les autres. Sa voracité en matière de bande passante et sa sensibilité aux temps de latence représentent un véritable challenge pour les réseaux traditionnels. Pourquoi ? Car les réseaux en étoiles ne permettent pas d’offrir une performance utilisateur digne de ce nom, tout en augmentant significativement les coûts d’implémentation. Office 365 peut transformer votre activité, à condition que votre réseau soit adapté à son utilisation. Découvrez dans ce guide comment les solutions Zscaler, recommandées par Microsoft, peuvent vous aider dans votre migration vers Office 365.
Tags : 
     Zscaler
By: Genesys     Published Date: Jun 19, 2019
Successfully managing a contact center requires a collaborative, multidisciplinary approach to handle a broad range of operational and tactical tasks. Planning, day-to-day operations and quality management must be seamlessly orchestrated, along with human resources functions like recruitment, learning and development, and employee scheduling. Read this executive brief to learn how to transition to an AI strategy that can take your team – and business results – to the next level. See how you can: Create an AI strategy with a single data model that includes routing, interaction analytics, forecasting/scheduling and predictive engagement Harness the power of your data to align customers with the best resource Drive employee effectiveness by ensuring you hire the right people and manage their performance to drive their success over the long term
Tags : 
     Genesys
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com