red hat

Results 351 - 375 of 2295Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: Allscripts     Published Date: Sep 22, 2014
Be prepared for ICD-10 with minimal disruption to your organization, and learn to succeed in a brave new world. Allscripts Revenue Cycle Solutions provide you peace of mind with the Breadth, Depth, and Quality of our products, ensuring you are ready for whatever comes your way. Download now to learn more.
Tags : allscripts, icd-10, revenue cycle solutions, financial growth, quality of products
     Allscripts
By: Red Hat     Published Date: Jun 18, 2012
Join Red Hat's CIO Lee Congdon for a c-level discussion of the key considerations and benefits of building an Open Cloud Architecture.
Tags : red hat, on-demand webinar, private cloud, virtualized server, cloud computing, virtualization, networking
     Red Hat
By: Adobe     Published Date: Jul 04, 2016
This ebook explains how to use data and software to predict what customers will do and how to turn that new knowledge into a business advantage.
Tags : data, information available, customer, customer experience, customer relationship
     Adobe
By: Adobe     Published Date: Oct 10, 2016
If your company is a car, data can change it from a functional sedan to a high-performance machine. Data-driven marketing helps you predict what your customers want and deliver it faster and better. Our report, Pedal to the Metal, outlines five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 10, 2016
If your company is a car, data can change it from a functional sedan to a high-performance machine. Data-driven marketing helps you predict what your customers want and deliver it faster and better. Our report, Pedal to the Metal, outlines five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 10, 2016
If your company is a car, data can change it from a functional sedan to a high-performance machine. Data-driven marketing helps you predict what your customers want and deliver it faster and better. Our report, Pedal to the Metal, outlines five ways data-driven marketing can transform your business into a machine that can leave the competition in the dust.
Tags : 
     Adobe
By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : analytics, big data, forrester
     Riverbed
By: Riverbed     Published Date: Jul 17, 2013
In recent years Boston College has experienced rapid growth in data center network complexity. This complexity was driven by the need to provide a high level of fault tolerance to new, multi-tiered applications that had large bandwidth requirements. Read the case study to learn how the university deployed Riverbed Cascade™ to improve application performance management and increase network uptime.
Tags : boston, boston college, riverbed cascade, riverbed, cascade, application performance management, network uptime
     Riverbed
By: Schneider Electric     Published Date: Oct 17, 2016
In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
     Schneider Electric
By: MarkLogic     Published Date: Jun 09, 2017
Today, data is big, fast, varied and constantly changing. As a result, organizations are managing hundreds of systems and petabytes of data. However, many organizations are unable to get the most value from their data because they’re using RDBMS to solve problems they weren’t designed to fix. Why change? In this white paper, we dive into the details of why relational databases are ill-suited to handle the massive volumes of disparate, varied, and changing data that organizations have in their data centers. It is for this reason that leading organizations are going beyond relational to embrace new kinds of databases. And when they do, the results can be dramatic
Tags : 
     MarkLogic
By: MarkLogic     Published Date: Jun 09, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
     MarkLogic
By: Schneider Electric     Published Date: Oct 31, 2017
In some cases, adopting cloud IoT platform may make more sense where required processes, communication costs and cloud costs meet sufficient total cost of ownership against deploying MDC. Additionally, in situations that an end-user organization already has a secure room or a modular data center solution where infrastructure can be housed and/or the amount of infrastructure involved may be too small to benefit from power/cooling advantages of being housed in an MDC, the organization may not see a need for an MDC. An MDC is nothing more than a smaller form of a modular data center, and a number of providers have entered the modular data center solutions space in the past. These modular data center solution providers came into the market with high expectations for growth and ROI only to find that high sales were not forthcoming due to limited use cases, so many exited the space.
Tags : algorithm analysis, buyer trend, iot, workloads, market, vendors, data centers
     Schneider Electric
By: Oracle     Published Date: Mar 28, 2017
Loyalty programs provide a framework to nurture guest relationships, offering recognition, perks and options to redeem rewards. Most importantly, they create guest profiles and transaction histories that yield the insights needed to foster what is demanded today: individualized guest interactions.
Tags : hotel, loyalty program, perks, redeem, oracle
     Oracle
By: RedHat     Published Date: May 10, 2017
This white paper provides an analysis of five organizations that migrated enterprise applications from proprietary legacy systems to RHEL solutions.
Tags : red hat, linux, enterprise linux, reduce costs, improve efficiency, platform
     RedHat
By: RedHat     Published Date: May 10, 2017
IDC evaluates the the business benefits of RHEL, read on to find out more.
Tags : red hat, linux, enterprise linux, reduce costs, improve efficiency, idc
     RedHat
By: RedHat     Published Date: May 10, 2017
Transform to a digital business through infrastructure optimization.
Tags : improve service, reduce costs, it modernization, trends, red hat, infrastructure
     RedHat
By: RedHat     Published Date: May 10, 2017
A practical path to IT modernization powered by Intel and Red Hat This paper discusses the challenges involved in making this decision and offers recommendations as to how to approach IT modernization in a pragmatic, structured way.
Tags : intel, red hat, it modernization, agility, efficiency, reduce costs
     RedHat
By: RedHat     Published Date: May 10, 2017
By establishing an environment based on an enterprise-ready, open-source operating system — Red Hat® Enterprise Linux® — and a hardware platform based on Intel® architecture, organisations can immediately obtain benefits by migrating select workloads to a standardized environment. More ambitious modernization efforts can yield additional benefits, but the heart of every project should be a solid, proven foundation.
Tags : red hat, linux, enterprise linux, open source, open source platform
     RedHat
By: RedHat     Published Date: May 10, 2017
To reduce IT costs and improve performance, Indesso successfully deployed a SAP application on Red Hat Enterprise Linux. Migrating to Red Hat Enterprise Linux has lowered IT maintenance costs by 45% and hardware costs by 65%. In addition, the company has gained improved operational efficiency across its business. Read on to find out more.
Tags : red hat, linux, enterprise linux, reduce costs, improve efficiency
     RedHat
By: RedHat     Published Date: May 10, 2017
The leading open source platform for modern datacenters
Tags : data centers, red hat, linux, enterprise linux, open source, open source platform
     RedHat
By: Workday     Published Date: Oct 17, 2017
Every day, hundreds of organizations communicate, collaborate, and drive their business forward with Workday cloud applications. Our customers say they gain unprecedented visibility into their workforce, improve overall productivity, and get the right people working on the most important initiatives—things they could not achieve with legacy systems. And all of this is accomplished with applications that are intuitive and easy to use. Our customers are unique and have different goals, challenges, and priorities. What they share in common is that they all decided to move beyond legacy systems to the cloud with Workday. So, why Workday?
Tags : 
     Workday
By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : integration, developers, open enterprise, api, business, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     CA Technologies
By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com