next generation

Results 301 - 325 of 790Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : 
ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure
    
IBM
Published By: Cisco     Published Date: Sep 17, 2015
Symantec Delivering on Its Strategic Vision with Next-Generation Secure Datacenter Powered by Cisco ACI
Tags : 
datacenter, aci, enterprise, networking
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Read more to learn how Symantec delivers on its strategic vision with Next-Generation Secure Datacenter powered by Cisco ACI.
Tags : 
    
Cisco
Published By: Veritas & PureStorage     Published Date: Jun 23, 2017
As flash costs continue to drop and new, flash-driven designs help to magnify the compelling economic advantages AFAs offer relative to HDD-based designs, mainstream adoption of AFAs —first for primary storage workloads and then ultimately for secondary storage workloads — will accelerate. Well-designed AFAs that still leverage legacy interfaces like SAS will be able to meet many performance requirements over the next year or two. Those IT organisations that aim to best position themselves to handle future growth will want to look at next-generation AFA offerings, as the future is no longer flash-optimised architectures (implying that HDD design tenets had to be optimised around) — it is flash-driven architectures.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Veritas & PureStorage
Published By: Mimecast     Published Date: Oct 02, 2019
Often, e-discovery solutions focus on the middle of the electronic discovery reference model (EDRM) and only concern themselves with review and production. Certainly, the majority of e-discovery cost is at the review stage and often the focus is on making that process as efficient as possible. The less you collect then the less you must review. A focus on best practices on the left?hand side of the EDRM can sow great rewards to be reaped later. Organizations that wait until they are sued before they start preparing for litigation lose no matter what the case outcome is. Sponsored by Mimecast, this paper from IDC details how e-discovery trends are changing to accommodate more in-house control and key recommendations on building a next-generation solution.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Oct 02, 2019
Often, e-discovery solutions focus on the middle of the electronic discovery reference model (EDRM) and only concern themselves with review and production. Certainly, the majority of e-discovery cost is at the review stage and often the focus is on making that process as efficient as possible. The less you collect then the less you must review. A focus on best practices on the left?hand side of the EDRM can sow great rewards to be reaped later. Organizations that wait until they are sued before they start preparing for litigation lose no matter what the case outcome is. Sponsored by Mimecast, this paper from IDC details how e-discovery trends are changing to accommodate more in-house control and key recommendations on building a next-generation solution.
Tags : 
    
Mimecast
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
Discover how the shift from "buy and hold" data center strategy to the next generation of HP ProLiant servers can tackle today's IT constraints and tomorrow's business opportunities in this new IDC dynamic white paper.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers
    
Sponsored by HP and Intel® Xeon® processors
Published By: Red Hat     Published Date: Feb 25, 2019
How to strike the balance between your existing systems and emerging technologies. Many organizations are struggling with the pressure to adopt cloud-native architectures while maintaining existing conventional systems. A virtualized infrastructure can connect your new and old systems. This IDC paper helps you achieve the ideal balance by: Embracing the new without disrupting the current infrastructure. Preparing for next-generation computing requirements. Enabling agile application delivery to compete and win. Read the IDC whitepaper to learn more about balancing your investment in new and existing systems.
Tags : 
    
Red Hat
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"IT departments have to manage an infrastructure “duality” — the ability to deploy and manage two sets of applications, each with vastly diverse infrastructure requirements and service-level objectives. IDC found that by implementing next-generation apps on infrastructure designed for current-generation apps, such businesses risk putting their DX initiatives in jeopardy. HPE Synergy take key benefits of converged and hyperconverged infrastructure to the next level by operating on fluid (composable) compute, networking, and storage resource pools and are optimized for operations as well as applications. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Gigamon     Published Date: Oct 19, 2017
Read the IDG Tech Dossier, A Security Delivery Platform Benefits the Entire Organization to learn how a comprehensive, well-integrated security platform provides the foundation for the next generation of cybersecurity. By uniting a variety of security solutions and appliances for efficient operation through network visibility and security workflow orchestration, organizations benefit from continuous and pervasive network visibility, fault tolerance and scaling and optimal CPU utilization – thereby improving security and reducing cost. Download now!
Tags : 
    
Gigamon
Published By: HP     Published Date: May 14, 2014
What worked in storage yesterday is not necessarily effective for today or tomorrow. Legacy storage is too complex and not well aligned with today’s business strategies and objectives. Many storage platforms are not up to the challenge of today’s unpredictable workloads and unconstrained data growth. They don’t offer the adaptability, agility and consolidated management capabilities IT requires, which means that IT needs a future-proof storage architecture. Learn about the next generation in storage.
Tags : 
converged storage, legacy storage, future proof storage, storage, hp converged storage
    
HP
Published By: DocuSign     Published Date: Apr 24, 2018
"In order to succeed in this evolving digital landscape, financial services institutions must embrace trending technology to remain competitive or risk becoming obsolete. Today’s customers expect to be able to bank not just anywhere, any time, but also on any device. What’s more, they want to be able to open new accounts, apply for loans, and perform other tasks that in the past could only be done at a branch, securely and easily. Download this complimentary IDG report to learn about digital banking best practices to stay competitive by going paperless, attract and keep the next generation of customers who demand digital options, and thrive in the digital age. "
Tags : 
    
DocuSign
Published By: SAS     Published Date: Apr 25, 2017
Business intelligence has come a long way ? from assistance with report generation to self-service platforms for discovery and analytical insight. As technological capabilities and business aptitude with information continue to advance, the next generation of BI will be even more capable and valuable to the enterprise. To discuss today’s success factors and tomorrow’s opportunities, IIA spoke with Andy Bitterer, Senior Director of Business Intelligence Product Management at SAS, and Tapan Patel, Principal Product Marketing Manager at SAS.
Tags : 
    
SAS
Published By: Appistry     Published Date: Oct 11, 2007
Learn why GeoEye chose Appistry EAF to reduce development and operational cost and complexity, and enhance the company's agility in meeting the evolving needs of its customers.
Tags : 
application, application performance, application performance management, application fabric, application fabrics, grid computing, appistry
    
Appistry
Published By: IBM     Published Date: Nov 13, 2008
Improve operational efficiencies with next-gen networks and servicesThere has never been a better time for service providers to streamline operations, improve responsiveness and reduce costs. Find out in this white paper how all three can be accomplished with IBM Tivoli® Netcool® solutions. Also discover methods to boost efficiency and minimize expenditures.
Tags : 
ibm, operations management, tivoli, value-added services, operational support systems, wireless, ibm, power
    
IBM
Published By: Rizepoint     Published Date: Feb 13, 2017
Download this white paper,Improving RTE Food Safety by Building a more Complete and Modern Safety Management System, and read about the food safety challenges of ready-to-eat and fresh prepared foods, and how technology plays a growing role in achieving active managerial control with crucial characteristics and capabilities required for a next-generation food safety auditing solution.
Tags : 
    
Rizepoint
Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
    
Venafi
Published By: McAfee     Published Date: Aug 14, 2014
Read this report to get a solid overview of Advanced Evasion Techniques (AET) and how they behave, along with some brilliant Industry Insights.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security. Nearly half of IT professionals report they continue to make this tradeoff, and if you believe our experts, that number is being under-reported based on what they’re seeing.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw
    
Intel Security
Published By: Zebra Technologies     Published Date: Mar 19, 2019
KEEP YOUR TEAMS MOVING AND PATIENTS SAFER More and more patients are turning to Ambulatory Surgery Centers (ASC) for outpatient surgeries, diagnostic testing and preventive procedures. Case volumes continue to rise and competition for patients is intensifying. At the same time, reimbursement rates are declining. How are ASCs thriving in this rapidly-changing climate? By incorporating sophisticated data capture solutions throughout the patient journey, ASCs are enhancing patient safety, improving clinical work flows and reducing overall costs.
Tags : 
    
Zebra Technologies
Published By: SAP     Published Date: Nov 16, 2015
This report, based on a survey of over 200 organizations, illustrates that cloud users are looking for a new generation of cloud solutions which are simple, highly collaborative, and enable high performing Financial Planning and Analysis (FP&A) processes featuring accuracy and effectiveness.
Tags : 
    
SAP
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement
    
Cisco
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf
    
Tail-f Systems
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.