red hat enterprise

Results 1 - 25 of 282Sort Results By: Published Date | Title | Company Name
By: Juniper Networks     Published Date: Sep 26, 2019
"Enterprises throughout the world are rapidly digitizing their operations and adopting a multicloud environment. Unfortunately, legacy WAN architecture models often do not provide the scale, flexibility or agility required to support this transition. Enter SD-WAN. No single platform will be able to deliver every piece in the jigsaw for every type of enterprise and every application-specific set of requirements. The key is to select vendor partners whose platforms are sufficiently open, modular and comprehensive in their functionality and components that they will be able to adapt to enterprises’ increasingly varied, flexible and exacting networking and compute requirements going forward. Only by doing so will they secure the ability to stay ahead in a multicloud future."
Tags : 
     Juniper Networks
By: Tricentis     Published Date: Aug 19, 2019
Think back just 5 years ago. In 2014… • The seminal DevOps book—Gene Kim’s The Phoenix Project—was one year old • Gartner predicted that 25% of Global 2000 enterprises would adopt DevOps to some extent by 20161 • "Continuous Testing” just started appearing in industry publications and conferences2 • Many of today’s popular test frameworks were brand new—or not yet released • The term “microservices” was just entering our lexicon • QC/UFT and ALM were still sold by HP (not even HPE yet) • Only 30% of enterprise software testing was performed fully “in house”3 • There was no GDPR restricting the use of production data for software testing • Packaged apps were typically updated on an annual or semi-annual basis and modern platforms like SAP S/4HANA and Salesforce Lightning hadn’t even been announced Times have changed—a lot. If the way that you’re testing hasn’t already transformed dramatically, it will soon. And the pace and scope of disruption will continue to escalate throughout the fo
Tags : 
     Tricentis
By: Workday APAC     Published Date: Oct 07, 2019
"Following a study of hundreds of organisations about how they scale agile, this Harvard Business Review article outlines what they’ve learned, and how to scale agile effectively. They studied small firms that run their entire business with agile methods, already agile larger companies that are becoming even more agile as they’ve grown, and organisations that are making the transition from traditional hierarchies to more agile enterprises. Download the article to discover how these organisations have scaled agile effectively. "
Tags : 
     Workday APAC
By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
IBM and Red Hat provide a range of technology and services that can support their customers’ IT and development needs. IBM commissioned Forrester Consulting to conduct an emerging Total Economic Impact™ (TEI) technology assessment study to examine the ways in which customers utilize solutions by both companies in tandem and the impacts achieved as a result. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of solutions using both IBM and Red Hat offerings on their organizations. Forrester interviewed five organizations that use IBM and Red Hat offerings together. These interviewees are focused on modernizing infrastructure and applications to resolve legacy architecture challenges and meet quickly changing market needs. These companies adopted a wide range of solutions from IBM (including IBM Power, IBM Z, IBM Cloud Paks, middleware, and professional services) and Red Hat (including Red Hat Enterprise Linux, OpenShift, JBoss, a
Tags : 
     Group M_IBM Q4'19
By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills. Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
     MicroStrategy
By: Five9     Published Date: Oct 29, 2019
It’s become abundantly clear that the cloud is no longer the future— but the new normal. Enterprises rely on cloud computing for web-based meetings, email, file sharing, and more every day to reduce costs and administrative burdens while enhancing productivity. With the wealth of benefits to be gained by moving to the cloud—including speed of deployment, cost-efficiencies, and easy scaling—it’s no wonder the shift toward all things virtual has been so pervasive and swift. What’s more, as the cloud has matured, the potential drawbacks that once made enterprises hesitant to make the move are disappearing. Security is now robust, application integration happens with ease, and reliability is a given, not a question mark. So now that the cloud has become not just viable, but essential, to stay competitive in a rapidly changing world, it’s time to explore how the cloud can significantly improve your contact center operations and customer experiences. This paper will provide one compelling
Tags : 
     Five9
By: MuleSoft     Published Date: Oct 10, 2019
API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing $400m or more, senior IT decision-makers are right to be concerned about API security. In this whitepaper, you'll learn: The top API security concerns for today's enterprises. How IT leaders can protect identity, integrity, and confidentiality of information without risking availability. The top three qualifications you need to keep your APIs secure.
Tags : 
     MuleSoft
By: ASG Software Solutions     Published Date: Jul 20, 2009
Managing service delivery in todayís complex and dynamic business environments demands new and different approaches from IT. The explosive growth and the rate of change of information has brought particularly daunting challenges for IT that have contributed to incredibly complex underlying infrastructures. To get a true picture of all of the components necessary to support an IT or Business Service, you must access and bring together data that resides in disparate data silos throughout the enterprise.
Tags : asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
     ASG Software Solutions
By: HPE & Intel®     Published Date: Oct 10, 2016
What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations?
Tags : database, hpe, intel, data, oracle database, database management, database development, database security
     HPE & Intel®
By: Cisco     Published Date: May 24, 2019
Mobile Global Workforce is predicted to surge to 1.87 billion by 2022. Be prepared for the wireless expansion with Mobility Express. Cisco’s Mobility Express* is designed for small businesses that want a controllerless solution with Wi-Fi management functions embedded in the Cisco Aironet® access point itself. Offering SMB’s Cisco’s industry-leading enterprise capabilities at a fraction of the enterprise cost.
Tags : 
     Cisco
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
     Cisco EMEA
By: Automation Anywhere APAC     Published Date: May 17, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
     Automation Anywhere APAC
By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
     Cisco
By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Unternehmen in jedem Sektor hängen zunehmend von Anwendungen ab, die alles vom BackEnd-Betrieb bis zur Bereitstellung neuer Produkte, Services und Kundenerlebnisse steuern. Aus diesem Grund sind die Systemverfügbarkeit der Infrastruktur und die Vermeidung ungeplanter Ausfallzeiten wichtiger denn je. Aktuelle Studien zeigen, dass die durchschnittlichen Kosten für eine Stunde Ausfallzeit etwa eine halbe Million US-Dollar betragen1 – mit steigender Tendenz angesichts der zunehmenden Digitalisierung in allen Branchen. Über viel zu lange Zeit konnte höchste Speicherverfügbarkeit nur durch teure On-Site-Serviceverträge mit stark redundanten Hardwaremodellen erreicht werden. Seit seiner Gründung hat Nimble, ein Unternehmen von Hewlett Packard Enterprise, das ehrgeizige Ziel verfolgt, die ausgetretenen Pfade zu verlassen und nicht nur für höhere Verfügbarkeit seiner Produkte zu sorgen, sondern sie auch im Laufe der Zeit ständig zu verbessern.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
You’re likely fast-tracking hybrid cloud to increase agility and reduce cost. But it’s a challenge to define the right mix of private cloud, public cloud, and traditional IT that best drives your enterprise strategy. HPE has the right hybrid cloud expertise, technologies, and partners to get you there faster.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations? Oracle databases play a critical role in many enterprises. They’re the engines that drive critical online transaction (OLTP) and online analytical (OLAP) processing applications, the lifeblood of the business. These databases also create a unique challenge for IT leaders charged with improving productivity and driving new revenue opportunities while simultaneously reducing costs.
Tags : cost reduction, oracle database, it operation, online transaction, online analytics
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
     Cisco EMEA
By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot
     Lenovo UK
By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
     VMware AirWatch
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
     Hewlett Packard  Enterprise
By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit
     Oracle
By: Oracle     Published Date: Oct 20, 2017
What do these market-defining trends have in common? · Analytics for all · Analytics as competitive differentiator · Internet of Things · Artificial intelligence/Machine learning/Cognitive computing · Real-time analytics/event management They all rely on data – timely, accurate data delivered within an insightful context – to deliver value. The question is: who in the enterprise is most qualified and prepared to help deliver on the vision and values of the data-driven enterprise? It’s going to take a special type of professional to deliver that value to enterprises. Organizations are seeking professionals to step forward and take the lead, provide guidance and lend expertise to move into the brave new world of digital. The move to digital and all that it entails – sophisticated data analytics, online customer engagement and digital process efficiency – requires, above all, the skills and knowledge associated with handling data and turning it into insights. The move to digital i
Tags : 
     Oracle
By: Oracle CX     Published Date: Oct 19, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
Oracle has just announced a new microprocessor, and the servers and engineered system that are powered by it. The SPARC M8 processor fits in the palm of your hand, but it contains the result of years of co-engineering of hardware and software together to run enterprise applications with unprecedented speed and security. The SPARC M8 chip contains 32 of today’s most powerful cores for running Oracle Database and Java applications. Benchmarking data shows that the performance of these cores reaches twice the performance of Intel’s x86 cores. This is the result of exhaustive work on designing smart execution units and threading architecture, and on balancing metrics such as core count, memory and IO bandwidth. It also required millions of hours in testing chip design and operating system software on real workloads for database and Java. Having faster cores means increasing application capability while keeping the core count and software investment under control. In other words, a boost
Tags : 
     Oracle CX
By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
     Preempt
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.