red hat

Results 1 - 25 of 2295Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
     Cisco
By: Cisco     Published Date: Mar 22, 2019
Be proactive in protecting your data center with complete visibility, multilayered segmentation, and threat protection that follow the workload everywhere.
Tags : 
     Cisco
By: ABB     Published Date: Mar 21, 2019
Many in the United States’ power generation industry no doubt long for the relative market tranquility of the late 20th century. The generation plants built and operated then were carbon-fueled or nuclear-powered, with a few hydro-electric plants sprinkled in. The economics were largely stable and predictable, often thanks to regulation that shielded utilities from market fluctuations. But even in those simpler times, when the market was far less volatile, there was still much due diligence required when investors and developers were considering multi-milliondollar commitments in new generation projects. Today’s market is more volatile, due in large part to the disruptive effect of low-cost natural gas and the subsequent, rapid growth of affordable renewable energy. As more uneconomical and inefficient generation plants go offline, there is, for the most part, sufficient carbon-free or carbon-reduced generation to meet the growing demand for electric energy. There are pockets of growth
Tags : 
     ABB
By: SAS     Published Date: Mar 20, 2019
Seeing value from analytics and emerging technologies such as AI begins with trust in the data. That trust relies on how data is collected, shared, protected and used. The annual Data and Analytics Global Executive Study with MIT Sloan Management Review looks at how 2,400 global business leaders make decisions based on analytics insights – and what steps are needed to get trustworthy data.
Tags : 
     SAS
By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
     Akamai Technologies
By: Oracle     Published Date: Mar 18, 2019
Oracle Blockchain Cloud Service, an enterprise grade distributed ledger, is part of a comprehensive PaaS portfolio delivered by a scalable, distributed transaction processing platform that accelerates revenue, create new revenue streams and reduces risk.
Tags : 
     Oracle
By: Avaya     Published Date: Mar 15, 2019
Organizations around the globe are finding measurable success with their DCX initiatives, which has become a competitive differentiator, redefining loyalty by how well an organization engages, serves, and responds to customers and prospects. A recent global study by Nemertes Research shows that the metrics for DCX are so compelling, as business and IT leaders you must align on strategic goals and objectives you need to meet, and then move swiftly to launch your own DCX initiatives.
Tags : 
     Avaya
By: Avaya     Published Date: Mar 15, 2019
Organizations around the globe are finding measurable success with their DCX initiatives, which has become a competitive differentiator, redefining loyalty by how well an organization engages, serves, and responds to customers and prospects. A recent global study by Nemertes Research shows that the metrics for DCX are so compelling, as business and IT leaders you must align on strategic goals and objectives you need to meet, and then move swiftly to launch your own DCX initiatives.
Tags : 
     Avaya
By: Salsify     Published Date: Mar 15, 2019
Branded product pages on the digital shelf have become incredibly important both as a sales and marketing channel. For that reason, most brands are putting time and resources into improving the content of their product pages. But how exactly does content impact the numbers every business relies on? Read this report to get deep statistical insights on how product page content impacts search ranking, online market share, and sales overall. This study includes a range of analyses to help you quantify the actual sales value of your brand's product content using a variety of methodologies, including: An analysis of more than 500,000 Amazon search results pages A full-year examination of 60,000 Amazon product pages across 78 brands working with Salsify Data and stories from individual Salsify customers that invested in product content optimization Salsify is the product experience management platform for thousands of brands and retailers worldwide.
Tags : 
     Salsify
By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
     SambaSaftey
By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot, artificalintelligence, future-ready
     Lenovo UK
By: HERE Technologies     Published Date: Mar 13, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : location data, location technology solutions, security
     HERE Technologies
By: Cylance     Published Date: Mar 12, 2019
Enhance cybersecurity by reducing your attack surface CISOs understand that the smaller a company’s attack surface, the fewer areas need to be protected. Keeping a low profile lets you make better use of your resources. Esther Shein reports.
Tags : 
     Cylance
By: Anaplan     Published Date: Mar 12, 2019
In this paper, learn how Tata Steel Europe achieved 2-3x faster and more efficient planning Tata Steel Europe (TSE) knew they wanted to connect supply chain processes to the rest of the business—and that required a true platform. “The deciding factor was the robust nature of Anaplan’s platform. It is not just a planning solution for supply chain planning experts,” said Ardy Duwel, Head of Commercial Projects Office at TSE. “We wanted something that would scale to meet the needs of our planning professionals while bringing the rest of our business into the planning process."
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 12, 2019
In this paper, learn how Tata Steel Europe achieved 2-3x faster and more efficient planning Tata Steel Europe (TSE) knew they wanted to connect supply chain processes to the rest of the business—and that required a true platform. “The deciding factor was the robust nature of Anaplan’s platform. It is not just a planning solution for supply chain planning experts,” said Ardy Duwel, Head of Commercial Projects Office at TSE. “We wanted something that would scale to meet the needs of our planning professionals while bringing the rest of our business into the planning process."
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 12, 2019
In this paper, learn how Tata Steel Europe achieved 2-3x faster and more efficient planning Tata Steel Europe (TSE) knew they wanted to connect supply chain processes to the rest of the business—and that required a true platform. “The deciding factor was the robust nature of Anaplan’s platform. It is not just a planning solution for supply chain planning experts,” said Ardy Duwel, Head of Commercial Projects Office at TSE. “We wanted something that would scale to meet the needs of our planning professionals while bringing the rest of our business into the planning process."
Tags : 
     Anaplan
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
     Cisco EMEA
By: Loop Commerce     Published Date: Mar 08, 2019
Fung Global Retail & Technology had the opportunity to interview Roy Erez, Co-Founder and CEO of Loop Commerce. Loop’s gifting solution is already used by many large retailers including Neiman Marcus, Saks Fifth Avenue, and Coach. Erez shared his insights about the gifting category and the emergence of what Loop defines as “G-Commerce” (gift commerce). Loop Commerce is changing the landscape of the online gift-buying and receiving experience, creating new opportunities and leading the way to a $600B gifting market.
Tags : 
     Loop Commerce
By: IBM APAC     Published Date: Mar 06, 2019
Achieve superior control and performance across multicloud environments with IBM Multicloud Manager. With a multicloud strategy, it can become time-consuming, expensive and difficult to manage environments as you contend with scattered visibility, security and workloads across multiple Kubernetes clusters and clouds. IBM Multicloud Manager integrates all your environments in a single view that gives you optimal control over how you see, govern and automate everything.
Tags : 
     IBM APAC
By: BetterUp     Published Date: Mar 06, 2019
Looking to transform your organization to offer employees the meaningful, inspiring workplace they deserve? Learn how from industry experts in our exclusive Digital Conference Experience. Your registration includes instant access to videos, slides and other materials including: - Data that predicts what the future of work will look like - Toolkit elements your employees need to thrive in a new world of work - Steps for taking your emerging leaders and making them great
Tags : human resource technology
     BetterUp
By: BetterUp     Published Date: Mar 06, 2019
Despite the huge amount of time, money, and resources invested in L&D solutions, most simply deliver information without effecting lasting transformational change. In fact, after a year, only about 30% of employees successfully transfer their learnings to the workplace. A new approach is required as most L&D solutions are failing us. In this report, we share the five shortcomings of L&D solutions today and offer insights into how you can create a program that delivers the business outcomes you need, while enabling your people to thrive.
Tags : 
     BetterUp
By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q119     Published Date: Mar 05, 2019
Check out the IBM Marketplace where you can explore hundreds of IBM and partner products and services that make you and your business smarter
Tags : 
     Group M_IBM Q119
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com