red hat

Results 326 - 350 of 2297Sort Results By: Published Date | Title | Company Name
By: Red Hat     Published Date: May 01, 2013
A recent IDG Quick Poll reveals that enterprise decision makers understand OpenStack can help them build open-source systems. However, the challenges of deploying OpenStack make the Red Hat portfolio of open and hybrid technologies critical to getting up and running.
Tags : red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing, standard hardware, deployment, cloud providers, public clouds, virtual architecture, hybrid cloud portfolio, infrastructure
     Red Hat
By: Red Hat     Published Date: Jul 01, 2013
OpenStack is poised to become a cornerstone of the emerging cloud system software market, but “generic” OpenStack can be challenging. Drawing on its experience with enterprise Linux, Red Hat is delivering a commercially supported and tested version of OpenStack that’s “enterprise-ready.”
Tags : red hat, idc, virtualization, cloud system software, infrastructure-as-a-service, cloud providers, hypervisor is commoditizing, enterprise linux, virtualization market, integration, infrastructure, software development, enterprise applications
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
Using Red Hat middleware, virtualization, and platform technologies, consultant Booz Allen Hamilton helped the U.S. Department of Defense save $5.1 million through fiscal year 2015. The solution replaced a complex legacy system that could not scale to meet modern demands.
Tags : idc, red hat, department of defense, technology consulting, supports elasticity, flexibility, private cloud, elastic infrastructure, increase agility, increase flexibility, automatic scaling, automatic process execution, configurationg management, monitoring capabilities
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
IT provisioning was slowing Cigna’s developers. In response, they developed Infrastructure-as-a-Service (IaaS) self-service provisioning using Red Hat and Red Hat-supported open source projects. Success led to a development infrastructure that speeds results and boosts the bottom line.
Tags : red hat, cigna, provisioning processes, infrastructure-as-a-service, innovations, agility, seamless interactions, superior engineering, open source innovations, deployment
     Red Hat
By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud
     Red Hat
By: Oracle     Published Date: Aug 08, 2013
Social media is transforming customer care and should be considered a strategic vehicle for delivering excellent customer experiences. A majority of social conversations are ‘noise’, however, there are topics that are relevant to different parts of the organization. When the topic is customer-service-related, most organizations are ill-equipped to deliver the level of support needed resulting in a splintered, disjointed customer experience. Get your free copy of “Customer Care in a Social World” whitepaper where you will learn: • Three qualifications needed for a social-enabled contact center • To identify the stage of social-enablement for your contact center
Tags : customer care, social world, oracle, crm, social media, data management
     Oracle
By: Oracle     Published Date: Aug 08, 2013
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : oracle, oracle tap, webcast, ipad, application, productivity, software development, it management, enterprise applications
     Oracle
By: Oracle     Published Date: Aug 09, 2013
In this whitepaper, the role of business leaders in driving talent management functions is explored, with a particular focus on the tools and approaches that will make them successful.
Tags : business leaders, talent management, hcm
     Oracle
By: Oracle     Published Date: Aug 15, 2013
Social media is transforming customer care and should be considered a strategic vehicle for delivering excellent customer experiences. A majority of social conversations are ‘noise’, however, there are topics that are relevant to different parts of the organization. When the topic is customer-service-related, most organizations are ill-equipped to deliver the level of support needed resulting in a splintered, disjointed customer experience. Get your free copy of “Customer Care in a Social World” whitepaper where you will learn: • Three qualifications needed for a social-enabled contact center • To identify the stage of social-enablement for your contact center
Tags : customer care, social world, oracle, crm, social media, enterprise applications
     Oracle
By: Oracle     Published Date: Aug 15, 2013
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : oracle, oracle tap, webcast, ipad, application, productivity, enterprise applications
     Oracle
By: Oracle     Published Date: Oct 29, 2015
The rise of the empowered customer has converged B2B and B2C e-commerce. Despite similarities in the challenges faced by firms in both categories, B2B firms differentiate themselves by using content as a key lever to help buyers do their jobs. This report provides an overview of how B2B and B2C commerce are converging and what B2B firms must do to better interact with today’s business buyers.
Tags : oracle, aberdeen convergence brief, b2b, b2c commerce, networking, enterprise applications
     Oracle
By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : ddos, protection, practices, systems, attackers, applications, systems
     Akamai Technologies
By: Pega     Published Date: May 24, 2016
The digital service revolution is well underway. For communications service providers (CSPs), it means going beyond traditional voice and data and upgrading their entire digital communications infrastructure. Research shows enterprise-class organizations are allocating heavy dollars towards communications solutions and prefer a single provider for digital services. This is a massive opportunity for CSPs to expand their services, generate more revenue, grow profit and increase market share. However, the majority of enterprises reported not receiving a consistently excellent experience with their most recent service contract. As a result, many switch to new providers. CSPs are losing credibility and the loyalty of their customers because of legacy and traditional systems that constrain their ability to act quickly. Enterprises are looking for CSPs who understand their complex business and can offer a full portfolio of digital services with quality and creativity to meet their needs.
Tags : 
     Pega
By: Zendesk     Published Date: Jan 03, 2019
Today's marketplace is hypercompetitive. Brands compete for attention, hoping they can turn that attention into a loyal customer. But too many companies are not able to build a long-term relationship that results in a loyal customer because the customer had a poor experience. To remain competitive, brands need to create compelling integrated customer experiences that continue to evolve and reduce the friction between company and customer over the lifetime of the relationship. This IDC Vendor Spotlight discusses the current challenge that organizations face in providing a differentiating customer support experience and the potential that technology offers as a lever to improve the customer support experience.
Tags : 
     Zendesk
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata, updates
     Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
     Rohde & Schwarz Cybersecurity
By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: Allscripts     Published Date: Sep 22, 2014
Be prepared for ICD-10 with minimal disruption to your organization, and learn to succeed in a brave new world. Allscripts Revenue Cycle Solutions provide you peace of mind with the Breadth, Depth, and Quality of our products, ensuring you are ready for whatever comes your way. Download now to learn more.
Tags : allscripts, icd-10, revenue cycle solutions, financial growth, quality of products
     Allscripts
By: Red Hat     Published Date: Jun 18, 2012
Join Red Hat's CIO Lee Congdon for a c-level discussion of the key considerations and benefits of building an Open Cloud Architecture.
Tags : red hat, on-demand webinar, private cloud, virtualized server, cloud computing, virtualization, networking
     Red Hat
By: Adobe     Published Date: Jul 04, 2016
This ebook explains how to use data and software to predict what customers will do and how to turn that new knowledge into a business advantage.
Tags : data, information available, customer, customer experience, customer relationship
     Adobe
By: Adobe     Published Date: Oct 10, 2016
If your company is a car, data can change it from a functional sedan to a high-performance machine. Data-driven marketing helps you predict what your customers want and deliver it faster and better. Our report, Pedal to the Metal, outlines five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 10, 2016
If your company is a car, data can change it from a functional sedan to a high-performance machine. Data-driven marketing helps you predict what your customers want and deliver it faster and better. Our report, Pedal to the Metal, outlines five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 10, 2016
If your company is a car, data can change it from a functional sedan to a high-performance machine. Data-driven marketing helps you predict what your customers want and deliver it faster and better. Our report, Pedal to the Metal, outlines five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.
Tags : 
     Adobe
By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : analytics, big data, forrester
     Riverbed
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com