vision

Results 251 - 275 of 956Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Feb 19, 2015
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate. In this lab evaluation, NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In the report, you’ll dis cover how Demartek test engineers documented a 283% gain in IOPS and a reduction in latency by a factor of 66x after incorporating NetApp Flash Pool technology.
Tags : 
    
NetApp
Published By: IBM     Published Date: Oct 12, 2015
Read this report from Gartner to learn why IBM is named a Leader in Case Management and is well positioned in ability to execute and completeness of vision.
Tags : 
ibm, gartner, case management, synergy, magic quadrant
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
The data integration tool market was worth approximately $2.8 billion in constant currency at the end of 2015, an increase of 10.5% from the end of 2014. The discipline of data integration comprises the practices, architectural techniques and tools that ingest, transform, combine and provision data across the spectrum of information types in the enterprise and beyond — to meet the data consumption requirements of all applications and business processes. The biggest changes in the market from 2015 are the increased demand for data virtualization, the growing use of data integration tools to combine "data lakes" with existing integration solutions, and the overall expectation that data integration will become cloud- and on-premises-agnostic.
Tags : 
data integration, data security, data optimization, data virtualization, database security, data analytics, data innovation
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration
    
CA WA 2
Published By: CA WA 2     Published Date: Oct 01, 2008
CA's vision is to unify and simplify the management of enterprise-wide IT. The rapidly growing use of virtualization and clustering in enterprise infrastructures provides a rich environment for increasing complexity. Unlike physically bounded infrastructures, the logical entities in virtualized and clustered environments are not visually apparent. Nevertheless, one needs to know what resources one has and if one is using those resources to their fullest capacity.
Tags : 
virtual, virtualization, network management, ca wa, ca wa 2
    
CA WA 2
Published By: BMC Control M     Published Date: Jul 16, 2009
Gartner has positioned BMC CONTROL-M in the Leaders Quadrant of their "2009 Magic Quadrant for Job Scheduling." The report assesses the ability to execute and completeness of vision of key vendors in the marketplace. Read a full copy today, courtesy of BMC Software.
Tags : 
quadrant, magic quadrant, job scheduling, bmc control-m, workload, automation broker, gartner, data, job, itwab, it workload automation broker
    
BMC Control M
Published By: SailPoint     Published Date: Feb 08, 2011
This paper introduces a next generation of provisioning solution that offer a more strategic and sustainable approach.
Tags : 
sailpoint, legacy provisioning solution, user lifecycle management, governance, compliance, identity management
    
SailPoint
Published By: Citrix Systems     Published Date: Jul 28, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
    
Citrix Systems
Published By: Teradata     Published Date: Jun 12, 2013
Nationwide Mutual Insurance Company operates in a very competitive industry, so it must constantly prepare to meet new challenges as well as build on past successes, maximizing ever asset including its information. In fact, Nationwide's vision - the recognition of its information as a strategic asset - has proved to be a key factor in the company's success. Download this paper to learn more.
Tags : 
big data, big data analytics, customer relationships, customer knowledge store
    
Teradata
Published By: RSA Security     Published Date: Oct 24, 2013
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : 
rsa, emc, enterprise strategy, big data, security, security analytics
    
RSA Security
Published By: Smarsh     Published Date: Dec 07, 2016
Text messaging is simple, concise and compatible with virtually every mobile device, operating system and wireless carrier, making it very appealing to financial advisors and their customers. However, if used for business communications, texts can create tremendous risk. Less than a third of financial firms have a text supervision solution in place according to the Smarsh 2016 Electronic Communications Compliance Survey, the largest compliance gap facing financial firms today. Text messaging can’t be ignored by firms any longer.
Tags : 
    
Smarsh
Published By: NetApp     Published Date: Sep 22, 2014
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate. In this lab evaluation, NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In the report, you’ll dis cover how Demartek test engineers documented a 283% gain in IOPS and a reduction in latency by a factor of 66x after incorporating NetApp Flash Pool technology.
Tags : 
flash pool, fas storage systems, ssd, online transaction processing, cluster storage
    
NetApp
Published By: CenturyLink     Published Date: Jan 02, 2015
Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market in Europe. This is a new evolution of a mature market, with a wide variety of vendor offerings and capabilities, so infrastructure managers must choose with care.
Tags : 
gartner, magic quadrant, compute infrastructure, storage resources, network resources, strategic providers
    
CenturyLink
Published By: Aternity     Published Date: Mar 15, 2016
IT and Line of Business (LOB) management need precise, comprehensive metrics describing real end user experience, before and after going “virtual”, in order to support strategic desktop virtualization and consolidation decisions.
Tags : 
application virtualization, monitoring, strategic applications, best practices, network provisioning, network infrastructure, end user experience, business intelligence
    
Aternity
Published By: athenahealth     Published Date: Jun 08, 2015
This white paper will tell you how to implement a successful patient engagement strategy using these 5 elements: 1) Define your organization’s vision for patient engagement. 2) Create a culture of engagement. 3) Employ the right technology and services. 4) Empower patients to become collaborators in their care. 5) Chart progress and be ready to change and adapt.
Tags : 
patient engagement strategy, engagement culture, patient care, population health
    
athenahealth
Published By: MuleSoft     Published Date: Apr 13, 2016
This whitepaper proposes a new approach to integration - API-led connectivity - that extends traditional service oriented approaches to reflect today’s connectivity needs. We’ll outline the core of this approach and implementation challenges and discuss how IT leaders can realize this vision in their own organizations.
Tags : 
information technology, application integration, business management, best practices, business intelligence
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 01, 2016
Gartner Magic Quadrant for Full Lifecycle API Management Read this complimentary copy of the 2016 Gartner Magic Quadrant for Full Lifecycle API Management, and find out why MuleSoft was named a Leader based on completeness of vision and the ability to execute. Read on to learn: Expert perspectives on API management Critical analysis of key differentiators Latest developments in integration technology Industry benchmarks and trends
Tags : 
api, api management, api lifecycle, api strategy
    
MuleSoft
Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.