Sort results by: Published date | Company name
Showing items 1-25

Big Data Needs Big Pipes [ Source: Comcast ]

July 2014- With data playing an increasingly important role in business success, companies are seeking faster, more reliable, and more flexible connections to put the information in their data centers to good use. Read this ebook to explore connectivity considerations that meet modern needs.

Delivering Workload Automation for the App Developer [ Source: BMC Software ]

July 2014- These are exciting times for enterprise application developers, as companies challenge them to build solutions that better exploit mobile devices, cloud infrastructures, sensor networks, big data, and APIs for widely used services such as Facebook and Gmail. Application development, however, isn't all intellectual exhilaration. It has its pain points, too, such as the toil that goes into creating and modifying batch workload jobs. This paper explores how app developers can use automation to deal with ...

All-Flash Server-Side Storage for Oracle RAC Solution Brief [ Source: HGST ]

July 2014- In order to support today's high-transaction and data-intensive analytics applications, flash storage has moved into the mainstream to replace spinning disks.

HGST's Server-side PCIe flash storage is a high-performance and cost-effective alternative to a traditional SAN architecture. However, in Oracle environments, the requirement of shared access to all primary storage has limited the full potential of flash storage.

Download this complete Solution Brief to learn how to

• Leverage ...

Advanced Evasion Techniques for Dummies [ Source: McAfee ]

July 2014- This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you'll find out all about AETs, and get ...

10 Best Practices for URL Filtering [ Source: McAfee ]

July 2014- URL filtering, which blocks users from accessing websites that are malicious or erode productivity, is an essential security best practice. Discover 10 ways to make this easier and more effective to implement.

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall [ Source: McAfee ]

July 2014- Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations.

Most network security devices are not capable of detecting them. While many pass industry ...

SteelHead Hybrid Networking [ Source: Riverbed ]

July 2014- Global enterprises are rapidly adopting cloud infrastructure and SaaS applications broadly, and the Internet is now a part of their business critical infrastructure. With combined public and private resources, the network itself needs to go hybrid, combining the strengths of the highly reliable MPLS with the ubiquity, price, and speed of the Internet. The hybrid networking model from Riverbed Technology enables organizations to adopt hybrid networks to maximize the performance of applications, increase network availability, ...

Optimizing VDI Success: The Network Factor [ Source: Riverbed ]

July 2014- As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges. If organizations hope to reap the full benefit of a VDI deployment, they must assure the best possible end-user experience, or adoption will stall and the project will fail. ...

What's Stealing Your Business Performance [ Source: Riverbed ]

July 2014- This inographic describes the simple steps to an effective SharePoint deployment and user acceptance

Transforming Business Performance with Hybrid Network [ Source: Riverbed ]

July 2014- In a world combining public and private resources, the network itself needs to get hybrid, combining the strengths of the highly reliable Multiprotocol Label Switching (MPLS) networks with the ubiquity and lower cost of Internet infrastructure.

Real time endpoint compliance for Continuous Diagnostics and Mitigation [ Source: IBM ]

July 2014- The United States is fighting a continuous cyber war against adversaries of all types, including nation states, terrorist groups, criminal organizations, and other nefarious actors. The US is faced with an ever-increasing multitude and sophistication of cybersecurity threats, which was demonstrated when foreign adversaries compromised US Federal Weapons System programs during 2013. Federal departments and agencies, along with elements of the national critical infrastructure, must take a proactive approach to information and network security.

Critical Network Capabilities for Cloud-Based DDoS Mitigation [ Source: Verisign ]

July 2014- Due to the evolving DDoS threat, companies are turning to cloud based DDoS mitigation providers, who have built out massive amounts of network bandwidth and DDoS mitigation capacity. Just as important as network capacity is the flexibility and diversity of the provider's network. This paper describes how Verisign DDoS Protection Services relies upon a fully redundant network backbone, purpose-built on multiple diverse 10 Gbps optical infrastructures.

DDoS Mitigation And DNS Availability Should Be Key Components Of Your Resiliency Strategy [ Source: Verisign ]

July 2014- DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, the results of a recent research project by Forrester and Verisign show that many companies are experiencing a disconnect between the growing awareness of DDoS attacks and a protection strategy. Additionally, many organizations overlook the connection between DDoS protection and other infrastructure support, such as DNS hosting and management. This report provides an overview of ...

Better Decision Support for Product Management [ Source: IBM ]

July 2014- Make the right decisions to define the right features and functions to build into your products for reaching the right market at the right time. Learn about making better product decisions with a Rational Focal Point solution for product portfolio management.

Controlling In-Vehicle Innovation with IVI Design [ Source: IBM ]

July 2014- In-vehicle infotainment (IVI) systems continues to bear greater influence on consumers' in-car experiences and purchasing decisions. The pressure on OEMs, however, to adequately adapt their solutions is exposing antiquated platforms and straining incumbent processes. In order to keep pace with this accelerating rate of evolution, OEMs are turning to a broadening suite of third-party and open source platforms and looking to the successful, post-deployment software content models from the mobile domain. As the software supply ...

Smarter automotive development: Five key areas for accelerating automotive innovation [ Source: IBM ]

July 2014- Bringing an automotive product or component to the marketplace can involve complex requirements that must be addressed by numerous teams spread across different departments, companies and geographies. This white paper explores some key challenges that automotive companies face in creating smarter, more sophisticated automobiles that are made up of many systems of systems and how a holistic approach can help address them.

Optimizing Cloud and Virtualized Applications: A collection of articles from the Compuware APM Center of Best Practices [ Source: Compuware ]

July 2014- This collection of articles substantiates growing concerns over application performance in cloud and/or virtualized environments. While cost reduction is a primary reason enterprises move from traditional datacenter infrastructure to distributed computing, the economics don't pan out if application performance and, subsequently, user adoption suffer. However, a good understanding of performance in the cloud or in virtualized environments demands a wholly different approach to monitoring, as explained in the following articles authored by technology strategists ...

Take Back Control of Your Cloud Apps: Which SLAs Really Protect Your Bottom Line? [ Source: Compuware ]

July 2014- In December 2013, Compuware commissioned Research in Action to conduct a global, independent survey of 740 senior IT professionals' attitudes and concerns relating to cloud computing. The results revealed that businesses worry that the reduced visibility and control that accompanies their move to the cloud hampers their ability to deliver a high quality end-user experience with applications. The study shows that the Service Level Agreements (SLAs) offered by cloud providers are failing to address the needs of ...

Optimizing Hadoop: A collection of articles from the Compuware APM Center of Best Practices [ Source: Compuware ]

July 2014- This collection discusses the common performance issues encountered when managing jobs in a Hadoop environment. Whether you are running Hadoop on-premise or utilizing a cloud-hosted MapReduce environment, or a combination of the two, this collection will give you real-world examples of how to improve the distribution and utilization of your big data deployment.

Some of the key challenges we have seen include:

• Jobs running slow or failing without a clear ...

Capstone Compliance Using Symantec Archiving and eDiscovery Solutions [ Source: Thundercat Technology, Symantec ]

July 2014- Government agencies' email volume has outstripped the capabilities of paper-based records management. The "Capstone" process addresses this issue by providing for electronic capture and management of email records. National Archives and Records Administration (NARA) Bulletin 2013-02 outlines the process and provides guidance for agencies considering whether and how to implement it.

4 Ways DNS Can Accelerate Business Growth [ Source: Neustar ]

July 2014- This DNS ebook describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic management and protection from cyber threats.

Ovum Decision Matrix: Selecting an Application Performance Management Solution, 2014-15 [ Source: IBM ]

July 2014- IBM is rated #1 in this Ovum Decision Matrix - Application Performance Management (APM) report. To help IT decision-makers choose the right solution, this Ovum Decision Matrix evaluates and compares 10 of the leading APM solutions in the market.

APM SaaS and Analytics Step Up to Meet the Needs of Modern Applications, Mobile Users, and Hybrid Cloud Architectures [ Source: IBM ]

July 2014- This IDC Technology Spotlight report examines the critical role that SaaS and analytics are playing in the transformation of the APM market. The paper also considers the impact that IBM's recently introduced Performance Management (SaaS) and IT Operations Analytics offerings will have on the APM market.

Automated Life-Cycle Management: A Critical Enabler for Cloud-Ready Datacenters [ Source: IBM ]

July 2014- This whitepaper discusses how IBM's automation and orchestration solutions for cloud can help IT data center operations teams effectively manage increasingly complex, multi-hypervisor computing environments.

Simplifying cloud management and data center automation [ Source: IBM ]

July 2014- This white paper explores the value of standardizing and automating cloud services with a flexible platform, such as IBM Cloud Orchestrator. Learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.

Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America [ Source: Datapipe ]

July 2014- Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market. It represents an evolution of a mature market in which the wide variety of offerings and capabilities means vendors must be chosen carefully.

Next 25