cloud architectures

Results 26 - 50 of 98Sort Results By: Published Date | Title | Company Name
By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
     Ping Identity
By: Pure Storage     Published Date: Jul 18, 2017
Les principales architectures de stockage traditionnelles ont été développées il y a plus de 20 ans pour répondre à un paradigme informatique différent. Si elles ont plutôt bien servi leurs clients pendant cette période, elles sont en train de devenir obsolètes, puisque de plus en plus d'organisations adoptent des modèles cloud ou de type cloud. Afin d'optimiser l'efficacité du cloud, le service informatique doit opter pour des architectures de stockage conçues pour le 100 % flash et développées de A à Z pour l'ère du cloud.
Tags : le cloud computing, améliorer la performance, disponibilité des applications, plateforme de stockage 100 % flash, pure storage
     Pure Storage
By: Pure Storage     Published Date: Jul 26, 2017
Les principales architectures de stockage traditionnelles ont été développées il y a plus de 20 ans pour répondre à un paradigme informatique différent. Si elles ont plutôt bien servi leurs clients pendant cette période, elles sont en train de devenir obsolètes, puisque de plus en plus d'organisations adoptent des modèles cloud ou de type cloud. Afin d'optimiser l'efficacité du cloud, le service informatique doit opter pour des architectures de stockage conçues pour le 100 % flash et développées de A à Z pour l'ère du cloud.
Tags : le cloud computing, améliorer la performance, disponibilité des applications, plateforme de stockage 100 % flash, pure storage
     Pure Storage
By: F5 Networks Inc     Published Date: Mar 30, 2018
It seems like every day there’s another article about IoT, big data analytics, and cloud architectures—and their unlimited potential for companies trying to gain a competitive edge in this digital world. If your business is in the midst of a digital transformation (and chances are, it is), you’re probably already enjoying some the benefits of the public cloud: economies of scale, preconfigured solutions that can be spun up with a few clicks, utility billing, and more. What you may not have heard, however, is how the shared security model of the public cloud affects your security responsibilities —and how it can be used to your advantage in these multicloud environments.
Tags : roi, cloud, security, architectures, business, economies
     F5 Networks Inc
By: EMC Corporation     Published Date: May 27, 2014
Explore three key Cloud computing models—integrated infrastructure systems, reference architectures, and “build your own” solutions. See how EMC gives you the freedom to chose the optimal path to your private Cloud—and the solutions to support your deployment.
Tags : emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services
     EMC Corporation
By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : cloud, best, practices, endpoint, security, data
     MobileIron
By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : cloud, practices, audit, checklist, endpoint, security
     MobileIron
By: IBM     Published Date: May 23, 2017
This paper gives key considerations when making a strategic commitment to a database platform.
Tags : security, operation management, cloud architectures, scale management, data support, ibm db2, cloud management
     IBM
By: DataStax     Published Date: Nov 02, 2018
Most enterprises operate in a hybrid cloud environment, whether they know it or not. The benefits of hybrid cloud and multi-cloud architectures are numerous, but since most companies don’t even realize they’re using multi-cloud, they’re not taking full advantage of the multi/hybrid cloud environment. Read this ebook to learn how proper data management via an enterprise data layer empowers enterprises to unlock the full potential of their multi- and/or hybrid cloud strategies to achieve data autonomy while scaling efficiently, effectively, and safely.
Tags : 
     DataStax
By: Datastax     Published Date: Nov 02, 2018
Most enterprises operate in a hybrid cloud environment, whether they know it or not. The benefits of hybrid cloud and multi-cloud architectures are numerous, but since most companies don’t even realize they’re using multi-cloud, they’re not taking full advantage of the multi/hybrid cloud environment. Read this ebook to learn how proper data management via an enterprise data layer empowers enterprises to unlock the full potential of their multi- and/or hybrid cloud strategies to achieve data autonomy while scaling efficiently, effectively, and safely.
Tags : 
     Datastax
By: Datastax     Published Date: Dec 27, 2018
Most enterprises operate in a hybrid cloud environment, whether they know it or not. The benefits of hybrid cloud and multi-cloud architectures are numerous, but since most companies don’t even realize they’re using multi-cloud, they’re not taking full advantage of the multi/hybrid cloud environment. Read this ebook to learn how proper data management via an enterprise data layer empowers enterprises to unlock the full potential of their multi- and/or hybrid cloud strategies to achieve data autonomy while scaling efficiently, effectively, and safely.
Tags : 
     Datastax
By: Cohesity     Published Date: Nov 20, 2018
Today, hybrid cloud is increasingly the norm, and enterprises are challenged with ways to have visibility, manage and make use of all this data – both on-premises and in the cloud. While much attention has been given to primary data affecting mission-critical workloads, data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide. Download to learn more.
Tags : 
     Cohesity
By: Schneider Electric     Published Date: Feb 17, 2017
In this white paper, we will look into: • The changing face of the colocation buyer • Industry structure, including mergers and acquisitions • The Internet of Things and big data • Edge computing • Cloud computing and Internet Giants • The impact of data center infrastructure management (DCIM) • Data center design architectures
Tags : colocation, iot, internet of things, big data, edge computing, cloud computing, dcim, data center infrastructure management
     Schneider Electric
By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is changing from a traditional focus on cost-efficient enablement to a more strategic contribution. Total Cost of Ownership (TCO), while important, is being surpassed by a growing focus on automation and orchestration that is needed to fulfill enterprise demands for security, agility, and innovation. The cloud-grade enterprise network – spanning the campus, data center, and branch – must be able to respond to rapid changes in business, growing reliance on hybrid cloud architectures, and the needs of users and customers. This IP Networking Comparison Guide examines the four key areas driving enterprise network priorities and looks at key factors within each. This document will give you a clear perspective on how the various options stack up on the most important features and capabilities necessary to meet your transformation needs.
Tags : network, transformation, enterprise, optimization, juniper
     Juniper Networks
By: Workday France     Published Date: Apr 30, 2018
Le changement n'est jamais facile, surtout lorsqu'il concerne les applications de gestion. Les responsables informatiques savent cependant que passer au cloud permet de gagner en efficacité et en rapidité et de réaliser d'importantes économies. Mais en quoi les applications Cloud sont-elles si différentes de celles conçues à partir d'une architecture traditionnelle ou hybride ? Consultez ce livre Blanc de CIO.com pour découvrir les différentes architectures cloud, la façon dont elles influencent les capacités et les performances des applications et ce que cela induit en terme de migration depuis les systèmes actuels.
Tags : 
     Workday France
By: Equinix     Published Date: Oct 20, 2015
The cloud is impacting WAN architectures. IT leaders looking to use a cloud-based infrastructure and/or application services, especially high-bandwidth, real-time voice and video over Internet Protocol applications, should strategically locate communications hubs outside the enterprise data center.
Tags : communication hubs, wan architectures, cloud-based infrastructure, application services, high-bandwith, networking, enterprise applications
     Equinix
By: AWS     Published Date: Nov 16, 2018
"Today’s technology advances at a fast rate. Attempting to adopt modern architectures can uncover a knowledge gap with developers, who might be unfamiliar with new architecture patterns and frameworks. This includes adopting cloud-native architectures to help with greater efficiency and cost benefits. TIBCO’s integration solutions helps enable you to create an environment that simplifies the building of cloud-native applications, with support for modern architectures, such as microservices, event-driven APIs, serverless, and edge deployment. Download this solution brief to see how you can help accelerate your development on AWS cloud by: • Helping reduce your costs with modern application microservices and functions • Seamlessly migrating your integration workloads to Amazon Elastic Container Service using out-of-the-box migration utilities • Connecting your cloud, on-premises, and edge data sources, regardless of data formats "
Tags : 
     AWS
By: AWS     Published Date: Nov 16, 2018
"For existing applications to gain the agility, scalability, resilience, and cost benefits of cloud computing, organizations need to adopt cloud-native architectures. By making this switch, you’ll be better suited to scale more quickly, so you can help meet your ever-changing user demands. The challenge is how to make this transition to a cloud-native architecture, quickly and easily. Download this complimentary white paper to learn how your organization can help simplify the transition to cloud computing by leveraging Amazon Elastic Container Service and TIBCO®. You’ll learn: • Best practices for agile development • New platforms for deployment • The right tools for digital business agility "
Tags : 
     AWS
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com