architects

Results 1 - 25 of 104Sort Results By: Published Date | Title | Company Name
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
Organizations constantly struggle between embracing technological changes to open up new business opportunities and protecting the business from new challenges and risks. In this paper, we’ll examine containerization and how the adoption of this technology in F5 products affects IT professionals, architects, and business decision makers.
Tags : 
     F5 Networks Singapore Pte Ltd
By: Group M_IBM Q4'19     Published Date: Nov 12, 2019
'Expedite your journey to innovation and modernization by joining us for an introduction to the IBM Garage. IBM Garage brings designers, developers and solution architects together with your business and IT stakeholders to quickly create and scale new ideas that can dramatically affect your business. By focusing on outcomes first, IBM Garage’s new way of working guides your solutions from idea to delivery fast, applies advanced technologies with a purpose and de-risks innovation to achieve real business value. In this webinar, we will describe the IBM Garage co-creation approach and share perspectives from leaders in design, development and building to scale. We will conclude with Q&A.
Tags : 
     Group M_IBM Q4'19
By: MicroStrategy     Published Date: Nov 08, 2019
Today, despite massive investments in data, IT infrastructure, and analytics software, the adoption of analytics continues to lag behind. In fact, according to Gartner, most organizations fail to hit the 30% mark—meaning more than 70% of people at most organizations are going without access to the critical information needed to perform to the best of their abilities. What’s stopping organizations from breaking through the 30% barrier and driving the pervasive adoption of intelligence? Simple. The majority of existing tools only cater to users who are analytically inclined—the analysts, data scientists, and architects of the world. The other 70%—the people making the operational decisions daily within a business—simply lack the time, skill, or desire to seek out data and intelligence on their own. HyperIntelligenceTM helps organizations operationalize their existing investments and arm everyone across the organization with intelligence. Whether it’s a salesperson looking to close a
Tags : 
     MicroStrategy
By: MicroStrategy     Published Date: Nov 08, 2019
Today, despite massive investments in data, IT infrastructure, and analytics software, the adoption of analytics continues to lag behind. In fact, according to Gartner, most organizations fail to hit the 30% mark—meaning more than 70% of people at most organizations are going without access to the critical information needed to perform to the best of their abilities. What’s stopping organizations from breaking through the 30% barrier and driving the pervasive adoption of intelligence? Simple. The majority of existing tools only cater to users who are analytically inclined—the analysts, data scientists, and architects of the world. The other 70%—the people making the operational decisions daily within a business—simply lack the time, skill, or desire to seek out data and intelligence on their own. HyperIntelligenceTM helps organizations operationalize their existing investments and arm everyone across the organization with intelligence. Whether it’s a salesperson looking to close a
Tags : 
     MicroStrategy
By: Box     Published Date: Nov 06, 2019
Why read This report? In Forrester’s evaluation of the emerging market for multitenant cloud content platforms, they identified the 13 most significant providers in the category — aodocs, Box, Citrix, dropbox, egnyte, fabasoft, Google, GrM information Management, Laserfiche, M-files, Microsoft, nuxeo, and openText — and evaluated them. This report details our findings about how well each vendor scored against 10 criteria and where they stand in relation to each other. Enterprise architects can use this review to select the right partner for their cloud content management needs.
Tags : 
     Box
By: Intel     Published Date: Sep 27, 2019
The stakes are high in today's data centers. Organisations have access to massive quantities of data promising valuable insights and new opportunities for business. But data center architects need to rethink and redesign their system architectures to ingest, store and process all that information. Similarly, application owners need to assess how they can process data more effectively. Those who don't re-architect might find themselves scrambling just to keep from being drowned in a data deluge.
Tags : 
     Intel
By: MicroStrategy     Published Date: Aug 28, 2019
Why HyperIntelligence? Today, despite massive investments in data, IT infrastructure, and analytics software, the adoption of analytics continues to lag behind. In fact, according to Gartner, most organizations fail to hit the 30% mark. That means that more than 70% of people at most organizations are going without access to the critical information they need to perform to the best of their abilities. What’s stopping organizations from breaking through the 30% barrier and driving the pervasive adoption of intelligence? Simple. The majority of existing tools only cater to users who are naturally analytically inclined—the analysts, data scientists, and architects of the world. The other 70%—the people making the operational decisions daily within a business—simply lack the time, skill, or desire to seek out data and intelligence on their own. HyperIntelligence helps organizations operationalize their existing investments and arm everyone across the organization with intelligence. Whether
Tags : 
     MicroStrategy
By: Automation Anywhere     Published Date: Jul 16, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
     Automation Anywhere
By: Red Hat     Published Date: Jun 26, 2019
An introduction to the Forrester analyst report: How to Capture the Benefits of Microservice Design There has always been a relationship between an application and the platform and services which run it. For a long time, that relationship was very tight and encompassed a lot of areas related to the application design, from the language the application could be written in to administrative behaviors like monitoring and logging, even things like transaction management, frontend UI development, or integration methods. In a sense, the application platform was just another design consideration for the application. A few years ago, as significant changes in platform technology like cloud, containers, and virtual machines started rolling out, the primary emphasis for CTOs and application architects was on how to move to those platforms. The platform choice was a major part of the application. The focus was — one way or another — getting into “the cloud.” There’s been a shift in customers’ pri
Tags : 
     Red Hat
By: Forcepoint     Published Date: Jun 06, 2019
As organizations become more distributed, directors of network security teams must provide connectivity to new locations, applications and systems at a moment’s notice. What’s more, protecting users and data from rising threats is changing the demands for network performance, manageability and security. In this session, we discuss how distributed organizations are enabling new locations, both physical and virtual, to be brought up quickly and managed consistently. We then examine how to take advantage of commodity broadband instead of traditional leased lines, implement business security processes seamlessly across all locations, and how to interactively monitor remote environments. Presenter: Michael Knapp, Director of Network Security Architects, Forcepoint This session is part of the Forcepoint-sponsored Network Security eSummit in partnership with the MIS Training Institute (MISTI). Watch the other event sessions: Digital Transformation and the Intersection of Networks, Securi
Tags : 
     Forcepoint
By: Rackspace     Published Date: May 28, 2019
Moving enterprise applications to the cloud is a task that can daunt even the most seasoned IT professional. Beyond the technical considerations, many other variables also influence the migration effort, and the sheer number of options available to application architects and developers can be overwhelming. Most migration scenarios however, can be addressed by following a simple four-phase approach, namely Assess, Plan, Prepare and Migrate, where each phase is intended to move the migration effort forward with maximum learning and minimum risk. This white paper examines the most common application migration issues and provides guidance on these four phases, so that you can have an easier time in determining the best migration strategy, and take maximum advantage of the cloud.
Tags : 
     Rackspace
By: Blue Prism     Published Date: Mar 15, 2019
RPA platforms represent a hyper growth market, with enterprises investing in new RPA platforms for process and task automation to achieve greater operating efficiency and agility, while allowing the human workforce to focus on more strategic and higher priority projects and tasks. Intelligent process automation (IPA) is in an early phase of its evolution and represents the next frontier for RPA vendors. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT and business leaders, including chief information officers (CIOs), enterprise and process architects, IT directors, line-of-business (LOB) leaders and process owners, and digital transformation leaders select an RPA platform that is well suited to their specific requirements.
Tags : 
     Blue Prism
By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
     Avi Networks
By: Equinix APAC     Published Date: Feb 25, 2019
The Edge Completes the Cloud Edge computing delivers the decentralized complement to today’s hyperscale cloud and legacy data centers. To maximize application potential and user experience, enterprise architects and technology innovation leaders need to plan distributed computing solutions. Enabling this thinking is that although the cloud is becoming mainstream, that does not imply that all workloads will be placed in the cloud during the next decade or so. Technical incompatibilities, decades of embedded business logic in mainframe applications, government regulations and simple economics all conspire to keep some workloads out of the cloud, driving us toward a hybrid multi cloud future.
Tags : 
     Equinix APAC
By: Docker     Published Date: Feb 21, 2019
Why Read This Report In Forrester’s evaluation of the emerging market for enterprise container platform (ECP) software suites, we identified the eight most significant providers in the category — Docker, IBM, Mesosphere, Pivotal, Platform9, Rancher Labs, Red Hat, and SUSE — and evaluated them. This report details our findings about how well each vendor scored against 10 criteria and where they stand in relation to each other. Enterprise architects can use this review to select the right partner for their enterprise container platform needs.
Tags : migrate applications, containerization, application development, digital transformation, microservices, modernization, cloud computing, hybrid cloud, application security
     Docker
By: Attunity     Published Date: Feb 12, 2019
Read this technical whitepaper to learn how data architects and DBAs can avoid the struggle of complex scripting for Kafka in modern data environments. You’ll also gain tips on how to avoid the time-consuming hassle of manually configuring data producers and data type conversions. Specifically, this paper will guide you on how to overcome these challenges by leveraging innovative technology such as Attunity Replicate. The solution can easily integrate source metadata and schema changes for automated configuration real-time data feeds and best practices.
Tags : data streaming, kafka, metadata integration, metadata, data streaming, apache kafka, data integration, data analytics, database transactions, streaming environments, real-time data replication, data configuration
     Attunity
By: Jelecos     Published Date: Feb 11, 2019
The AWS Well-Architected framework has been developed to help cloud architects utilize best practices to build the most secure, high-performing, resilient, and efficient infrastructure possible for their applications. This framework provides a consistent approach for Jelecos and its customers to evaluate architectures and provides guidance to help implement designs that will scale with your application needs over time.
Tags : 
     Jelecos
By: Dell SB     Published Date: Jan 24, 2019
Dell Precision delivers versatile designs, top performance & reliability to conquer the industry’s most demanding applications. From award-winning filmmakers and animators to architects and engineers our expansive portfolio enables you to customize the workstation for your creative expertise.
Tags : 
     Dell SB
By: MuleSoft     Published Date: Nov 27, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservices implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
     MuleSoft
By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
     Fortinet EMEA
By: Attunity     Published Date: Nov 15, 2018
Change data capture (CDC) technology can modernize your data and analytics environment with scalable, efficient and real-time data replication that does not impact production systems. To realize these benefits, enterprises need to understand how this critical technology works, why it’s needed, and what their Fortune 500 peers have learned from their CDC implementations. This book serves as a practical guide for enterprise architects, data managers and CIOs as they enable modern data lake, streaming and cloud architectures with CDC. Read this book to understand: ? The rise of data lake, streaming and cloud platforms ? How CDC works and enables these architectures ? Case studies of leading-edge enterprises ? Planning and implementation approaches
Tags : optimize customer service
     Attunity
By: MuleSoft     Published Date: Jul 13, 2018
"This brief API management best practices eBook will give API strategists, architects and developers a roadmap for creating practical APIs by leveraging existing services. By following the 7 best practices outlined in this ebook, developing successful APIs is easier than you think. The best practices guide will cover: -The relationship between SOA and API management -How to think about and approach API design -A pattern for securing and managing your APIs -Things to consider when selecting an API management solution"
Tags : 
     MuleSoft
By: Aviatrix     Published Date: Jun 11, 2018
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei reviews seven best-practice topics for Global Transit Network architecture. Free Evaluation Checklist In addition to the slides, you’ll also receive a handy spreadsheet-based checklist with 50 architecture and business goals to consider when evaluating solutions for your own Global Transit Network. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
     Aviatrix
By: Aviatrix     Published Date: Jun 11, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
     Aviatrix
By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : aws, aws vpc, aws openvpn, aws bastion, aws remote access
     Aviatrix
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com