ad ops

Results 126 - 150 of 285Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Sep 22, 2014
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate. In this lab evaluation, NetApp commissioned Demartek to evaluate the effectiveness of Flash Pool with different types and numbers of hard disk drives using an online transaction processing (OLTP) database workload, and to evaluate the performance of Flash Pool in a clustered Data ONTAP environment during a cluster storage node failover scenario. In the report, you’ll dis cover how Demartek test engineers documented a 283% gain in IOPS and a reduction in latency by a factor of 66x after incorporating NetApp Flash Pool technology.
Tags : 
flash pool, fas storage systems, ssd, online transaction processing, cluster storage
    
NetApp
Published By: MobileIron     Published Date: Mar 02, 2018
Enable Business Transformation with MobileIron EMM
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : 
endpoint, management, business, workforce, desktop, device, mobile
    
MobileIron
Published By: IBM     Published Date: Aug 30, 2017
DevOps (short for development and operations), like most new approaches, is only a buzzword for many people. Everyone talks about it, but not everyone knows what it is. In broad terms, DevOps is an approach based on lean and agile principles in which business owners and the development, operations, and quality assurance departments collaborate to deliver software in a continuous manner that enables the business to more quickly seize market opportunities and reduce the time to include customer feedback. Indeed, enterprise applications are so diverse and composed of multiple technologies, databases, end-user devices, and so on, that only a DevOps approach will be successful when dealing with these complexities. Opinions differ on how to use it, however. Some people say that DevOps is for practitioners only; others say that it revolves around the cloud. IBM takes a broad and holistic view and sees DevOps as a business-driven software delivery approach  — an approach that takes a new or en
Tags : 
devops, ibm, quality assurance, end-user devices, customer engagement
    
IBM
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Today's internet-dependent business landscape demands frequent system changes, higher throughput and increased reliability. If your new features and fixes do not hit the digital market quickly, user experience, customer retention and revenue all take a hit. DNS however, is a tool that can be used to both mitigate problems and optimize the performance and delivery of these systems. Read the latest O'Reilly book to understand how the DevOps approach combined with the fundamentals of DNS can: • Use DNS as a means of distribution, deployment and high-availability • Mitigate failure and minimize risk • Improve system reliability and management Get the O'Reilly Book! "
Tags : 
    
Oracle + Dyn
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec
Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin
Published By: Red Hat     Published Date: Jan 02, 2018
Once upon a time, several generations ago (in technology years), IT departments were internal departments, focused on maintaining infrastructure and services within the company. Some companies may have had external-facing services, particularly web services, but this was still generally a narrow and restricted area. IT wasn’t a revenue-generating or strategic department; it was a supporting environment viewed as a cost center. One of the outcomes of an infrastructure-focused environment is that developers lost a sense of what their code was doing. Release cycles were long, and changes were slow. A developer would work on something and throw the code into testing or operations, and it would be released months later. Because of that long lead time, engineers lost the joy of being a developer—of creating something and seeing it work in real life. One of the great, powerful changes with digital transformation and related cultural and technology changes like DevOps is that it reintroduce
Tags : 
    
Red Hat
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: Amazon Web Services     Published Date: Feb 01, 2018
Machine learning is proving its power across virtually every industry in ways that add actionable insight and efficiency. But one can look at the rise of this transformative paradigm with a more focused lens to see AI technologies as a business tool of the highest order, one that improves processes and inspires new models. AI, in other words, has a big role to play on the balance sheet. Two leading brands in very different spaces — Capital One in financial services, John Deere in agriculture — are seeing efforts that stretch back decades come to fruition with the launch of cloud-based AI platforms. Capital One is developing digital products and experiences using machine learning to help millions of customers with their financial lives; John Deere’s Precision Agriculture solution helps farmers gain precise information about their machines and crops. In both instances, AI and a cloud platform combine to enable transformation.
Tags : 
digital, technologies, optimization, amazon
    
Amazon Web Services
Published By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon® 7 offers full-featured support for hosted applications and shared desktop sessions, expanding the capabilities of the leading virtual desktop infrastructure (VDI) platform. Tightly integrated with Microsoft Remote Desktop Services (RDS), Horizon can deliver hosted applications and desktop sessions, virtual desktops, and VMware ThinApp® virtualized applications, all supported on the devices end users want to use. This white paper provides guidance for adding support for hosted applications and desktop sessions to your VMware Horizon infrastructure. Whether the goal is to integrate an existing RDS environment for combined management with VMware Horizon virtual desktops or deploy hosted applications and desktop sessions for the first time, VMware Horizon provides the technology required and a simple path forward.
Tags : 
hosted, applications, horizon 7, virtual desktop, infrastructure, microsoft, remote, services
    
VMware Citrix
Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
    
Cybric
Published By: Cybric     Published Date: Oct 30, 2017
Committed to advancing brain research, The Dana Foundation needed to transition to the cloud to drive efficiency and more effectively manage risk. With this shift, Dana moved from waterfall development to DevOps but still needed to maintain its strict security posture. In this case study Jim Rutt, CIO of The Dana Foundation, discusses his use of the CYBRIC continuous application security platform to move to DevOps, embedding security earlier in the development process and gaining full security visibility across the SDLC.
Tags : 
cybersecurity, cyber security, cio, application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cloud security, transformation
    
Cybric
Published By: Tricentis     Published Date: Mar 13, 2018
Despite all your planning, the release made it to market with some significant bugs, and your company has had to run damage control. Now you’re getting questions about what went wrong, and before you know it, the blame game is in full force, with your developers and testers pointing fingers at one another. So what happened? Whose fault was it really? And what can you do better next time? The truth of the matter is, at a time when the stakes for software development are higher than ever (and only continuing to rise), the blame game simply isn’t going to cut it. And if you’re operating in a true DevOps environment, the finger pointing should never even happen in the first place.
Tags : 
    
Tricentis
Published By: Tricentis     Published Date: Mar 13, 2018
Hitting your go-to-market timelines depends on quality testing completion and approval. Whether your organization still employs a waterfall model or has adopted the DevOps or agile methodology, testing has the final say in acceptance for software launch. Metrics shared between testing and other stakeholders can reduce bottlenecks and help your team reliably hit delivery dates with exceptional quality.
Tags : 
    
Tricentis
Published By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
    
Citrix
Published By: Cherwell Software     Published Date: Jun 21, 2018
Since the term was first coined in 2009, “DevOps” has rapidly taken the world by storm. And while the DevOps movement initially took root among and the view that it will be replaced with a new trend, the last few years have seen widespread use of DevOps methodologies among more traditional enterprise organizations for whom technology is critical to maintaining competitive advantage
Tags : 
itsm, guide, devops
    
Cherwell Software
Published By: Herman Miller     Published Date: Oct 04, 2018
As workplace researcher Robert Propst observed in A Facility Based on Change, “Not only must we accept change, we must adjust to accelerated growth.” If your office doesn’t reflect who you are now and who you hope to become in the future, accelerated growth can feel especially painful. Whoever you are, you can’t escape change. But we think that workplaces can actually be catalysts for growth without all the growing pains. Whether you’re trying to spark innovative thinking or encourage people to work together more efficiently, you can reach your goals with a workplace tailored to your unique needs. We’ve been capturing workplace data and transforming it into growth-enhancing insight since Propst began studying the connections between people, work, and the workplace nearly 50 years ago. This legacy of workplace research—in combination with the research we do today—informs Living Office®, a research-based placemaking approach that ignites powerful workplace transformations. With Living Of
Tags : 
    
Herman Miller
Published By: Puppet     Published Date: Nov 08, 2016
Information technology is racing ahead with a Moore’s law-like inexorability and compounding rate. While it’s impossible to know what’s next, it's possible to get out of reactive mode and get ahead of the game. And that doesn’t mean simply focusing on practices like DevOps or technologies like cloud adoption and container stack selection.
Tags : 
    
Puppet
Published By: Jamf     Published Date: Nov 05, 2018
Let’s take a look at the “who needs access to what and when” scenario that often leaves schools wondering what to do with the apps once a student graduates or drops a class, or how to get new students the resources they need the minute they turn on their device. If you’ve ever wanted a tutorial on best practices for app management, download this e-book for guidance on quickly going from app purchase to deployment.
Tags : 
    
Jamf
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Anaplan     Published Date: Sep 07, 2018
Viele Menschen arbeiten gern mit Spreadsheets, beispielsweise zur Verwaltung ihrer persönlichen Finanzen. Aber in einem professionellen Umfeld, in dem mehrere Personen Zugriff auf Daten benötigen, um die zu aktualisieren und zu ändern, gelangen Spreadsheets schnell an ihre Grenzen. Trotz aller Unzulänglichkeiten und Probleme werden Spreadsheets jedoch nach wie vor für die Planung und Analyse in Unternehmen eingesetzt. Das mag daran liegen, dass ihre massive Verbreitung auf Desktops und Laptops den Eindruck vermittelt, es würde sich um eine kostengünstige Option handeln. Wenn Sie Ihre Daten besser im Griff haben möchten und die Planung und Analyse nicht mehr mit Spreadsheets durchführen möchten, ist Anaplan die richtige Alternative: Die Plattform bietet ihnen nämlich nicht nur die intuitive Bedienung und Nutzerfreundlichkeit von Spreadsheets, sondern auch die Sicherheit und Skalierbarkeit einer Enterprise-Lösung
Tags : 
    
Anaplan
Published By: Ahead     Published Date: Jun 05, 2019
Digital transformation will fail without a commitment to automation - what AHEAD refers to as Relentless Automation. With the advent of public cloud and all of its promise, along with the ripple effect from the DevOps mantra of “automate everywhere”, technology teams must spin up new infrastructure, maintain configurations, and set up and tear down environments much faster than ever before. Of course, no one should automate for the sake of automating, or to simply be ahead of the curve. But while not every activity warrants automation - whether due to the complexity and nuance of the task, or its infrequent occurrence - Relentless Automation means identifying those tasks and processes where the benefits of automation outweigh both its upfront and recurring costs. Thankfully, the business benefits of standardizing and automating IT work are easy to spot: > Freeing up staff for higher value work > Reduction in errors and process variability > More auditability and accountability, helping
Tags : 
    
Ahead
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.