red hat

Results 351 - 375 of 2652Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Feb 15, 2018
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. A recent Gartner survey found that more than 80 percent of CIOs consider Infrastructure as a Service (IaaS) to be a viable option and 10 percent of CIOs already consider it to be their default choice for infrastructure. Utilizing an infrastructure with an elastic, pay-as-you-go service model not only reduces costs and worries, but also frees IT organizations to innovate in ways that will enhance business growth.
Tags : 
iaas, business, legacy, infrastructure, oracle, organisations
    
Oracle
Published By: Oracle     Published Date: Feb 15, 2018
The rapid pace of change in attitudes to IaaS underlines how quickly it has become a key part of enterprise IT. Even in the past three months, adoption levels and positive attitudes toward IaaS have grown. IaaS was originally seen as a way to reduce overall spend and shift budgets from capital expenditure to operating expenditure, and there is no doubt that it has done both. But it is striking how businesses have grown to appreciate the wider benefits of IaaS from greater productivity to freeing staff from routine maintenance in order to work on more value-adding projects.
Tags : 
iaas, enterprise, projects, budget, businesses
    
Oracle
Published By: Oracle     Published Date: Feb 16, 2018
The rapid pace of change in attitudes to IaaS underlines how quickly it has become a key part of enterprise IT. Even in the past three months, adoption levels and positive attitudes toward IaaS have grown. IaaS was originally seen as a way to reduce overall spend and shift budgets from capital expenditure to operating expenditure, and there is no doubt that it has done both. But it is striking how businesses have grown to appreciate the wider benefits of IaaS from greater productivity to freeing staff from routine maintenance in order to work on more value-adding projects.
Tags : 
iaas, enterprise, projects, budget, businesses
    
Oracle
Published By: Oracle     Published Date: Feb 16, 2018
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. A recent Gartner survey found that more than 80 percent of CIOs consider Infrastructure as a Service (IaaS) to be a viable option and 10 percent of CIOs already consider it to be their default choice for infrastructure. Utilizing an infrastructure with an elastic, pay-as-you-go service model not only reduces costs and worries, but also frees IT organizations to innovate in ways that will enhance business growth.
Tags : 
iaas, business, legacy, infrastructure, oracle, organisations
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2018
There is no doubt that enterprise cloud is a new and improved IT strategy. Cloud services have proven to improve organizational agility and reduce the burden of IT infrastructure and cost. Moving to the cloud is no longer a question of “if” but “when” and “how.” Most enterprises we interviewed are moving to cloud in phases over time and matching workloads to their perceptions of a vendor’s cloud capabilities that will best support their objectives. Many will require the ability and flexibility to support multivendor cloud and multiple deployment choices (e.g., public cloud, private cloud, and hybrid cloud).
Tags : 
cloud, enterprise, scale, infrastructure
    
Oracle
Published By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
    
Avanade  DACH
Published By: ServiceNow     Published Date: Nov 05, 2012
Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.
Tags : 
servicenow, it management, it visibility, it value, service catalog
    
ServiceNow
Published By: Dell     Published Date: Aug 08, 2018
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 12, 2018
Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Though the two approaches differ, they are not in opposition. They strive for the same goals and face similar challenges. As IT leaders provide their workforce with the tools to carry out the corporate mission, they should develop a PC lifecycle strategy that encompasses the key organizational needs of systems management, end-user productivity, business innovation and data-centric security. Read this Dell whitepaper to learn more about the findings of a recent Forrester Consulting study, “Digital Transformers Innovate, Digital Controllers Optimize”. This paper will help clarify the PC lifecycle continuum, from the basics of control to the advanced levels of transformation, so you will be better equipped to determine the needs of your organization on that spectrum.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 12, 2018
In December 2017, Dell commissioned Forrester Consulting to conduct a study refresh to determine how enterprise organizations are structured from an IT departmental perspective. The study explored two types of IT: digital controllers and digital transformers; and the trends and challenges seen in PC provisioning. Digital controllers are often associated with top-down approach, linear structure, and emphasize security and accuracy. In contrast, digital transformers focus on innovation, employee-and customer-centricity, and prioritize speed and flexibility. By understanding the two groups, enterprises can overcome challenges that arise from PC life-cycle management. By investing in existing PC management tools and partnering with a company that specializes in PC deployment and management, firms can empower employees to better serve customers. Download this Forrester report to learn more about the approach and strategy differences in how these two groups address the dynamic digital demand
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Apr 13, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Dell EMC     Published Date: Feb 14, 2019
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article from Dell and Intel® to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 14, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report from Dell and Intel® for more information Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 14, 2019
Today’s organizations must have IT solutions that can handle both current and emerging workloads. The modular design of PowerEdge MX—powered by Intel® Xeon® scabable processors—meet that demand. Access this Dell brief to learn the five ways PowerEdge MX can help you scale, secure and simplify your IT. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Sage EMEA     Published Date: Jan 29, 2019
Enterprises must continuously change to keep ahead of the competition, reduce silos, improve connectivity and respond rapidly to a changing world. Organisations also need to drive continuous innovation with technology that helps them adapt faster. So if you’re thinking of replacing your legacy ERP system, start by asking yourself these three essential questions:
Tags : 
    
Sage EMEA
Published By: Dell EMEA     Published Date: Aug 20, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security.
Tags : 
    
Dell EMEA
Published By: Dell EMEA     Published Date: Aug 28, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security. Download this whitepaper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: NetApp     Published Date: Dec 05, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions in a Software as a Service (SaaS) model to more than 2,800 customers with employees in 150 countries. “Storage has always been Ultimate’s biggest technology challenge" according to Senior Director of Cloud Operations, Steven May. The company’s storage goals revolve around managing growth while combining the economics of leveraging shared resources on demand with the performance and predictability of dedicated infrastructure. Seeking high IOPS performance, fault tolerance, and scalability, along with a high availability solution that supports both VMware and OpenStack, Ultimate's search led them to SolidFire.
Tags : 
    
NetApp
Published By: Dell EMC     Published Date: May 08, 2019
Greater performance, agility and security are the new imperatives of the modern data center, and according to the Edison Group, Dell EMC PowerEdge servers outperform HPE servers. PowerEdge servers?with Intel® Xeon® Scalable processors? have customer-centrice innovation that is better able to meet the advance demands of IT Transformation, today and tomorrow. Download this infographic to learn the 5 reasons why.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report for more information.
Tags : 
    
Dell EMC
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading technology conglomerate had to renew the current data center agreement, also it was no longer strategic to maintain their own hardware. LTI partnered with Oracle and helped in designing and executing the migration plan that would ensure Zero business disruption without stringent timeline. LTI leveraged a toolkit built by its in-house, dedicated Oracle Innovation and Solution Center (OISC) to help ensure an error-free migration. Benefits i. $1 M Overall Cost saving ii. 40% reduced TAT Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe®, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat
    
Blue Coat Systems
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.