ad ops

Results 276 - 300 of 303Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps – seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Financial Services industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps – seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Healthcare industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Muito se fala sobre DevOps, uma metodologia que reúne função antes distintas de desenvolvimento de software (Dev), de produção e operações (Ops) em um processo comum, integrado e contínuo. DevOps quebra as barreiras entre o desenvolvimento, a produção e as operações. Utiliza pessoas, processos e tecnologia para estimular a colaboração e a inovação nos processos de desenvolvimento e liberação de software. O o desenvolvimento, a produção e as operações deveriam sempre fazer parte de um processo integrado, mas isso nem sempre é tão fácil como parece. Você pode se perder no que chamamos de “Dysfunction Junction”. Leia este eBooklet e conheça os obstáculos de DevOps, como evitá-los e os primeiros passos para chegar lá.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
To stand out in the application economy, businesses must add digital dimensions to the experiences they provide for customers, employees and partners. Such a “digital transformation” requires new thinking around IT—specifically, its capabilities and goals, and how the various teams must collaborate to deliver on business objectives. For many organizations, the best way to navigate the digital transformation is with DevOps. In this ebook, you’ll learn more about the challenges digital transformation has created and how DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations, can be used to capitalize on opportunities and create competitive differentiation in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
The research shows DevOps delivers 18% faster time-to-market and 19% better app quality/performance. The application economy is motivating leaders to make critical changes across IT and the business, one of the most significant being the adoption of DevOps. For enterprise IT organizations who need to accelerate delivery of apps and provide customers with higher-quality software, faster, DevOps–with its focus on collaboration across IT domains from development to delivery–is increasingly the answer.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps – seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Entertainment industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps – seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Financial Services industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps – seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Healthcare industry.
Tags : 
    
CA Technologies
Published By: NetApp     Published Date: Mar 05, 2018
Discover how you can transform your data into a strategic asset. Read this white paper to learn how NetApp can help you thrive in a hybrid cloud world. Learn how our solutions enable you to gain insight into your hybrid cloud, protect and secure your data wherever it lives, and achieve new levels of agility with DevOps and cloud analytics.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
To stay ahead of the evolving publishing industry, Scholastic realized they needed to adopt a microservices architecture leveraging containers after they migrated to Amazon Web Services (AWS). The team chose Red Hat OpenShift for the extensive support and level of innovation they were able to provide. With OpenShift on AWS, Scholastic was able to implement a DevOps model to create a new set of online-based services to maintain competitive advantage in a rapidly shifting publishing world. Join the upcoming webinar to learn how Scholastic maximized flexibility and improved their CI/CD pipeline by utilizing a microservices architecture running in containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 03, 2019
To stay ahead of the evolving publishing industry, Scholastic realized they needed to adopt a microservices architecture leveraging containers after they migrated to Amazon Web Services (AWS). The team chose Red Hat OpenShift for the extensive support and level of innovation they were able to provide. With OpenShift on AWS, Scholastic was able to implement a DevOps model to create a new set of online-based services to maintain competitive advantage in a rapidly shifting publishing world. Join the upcoming webinar to learn how Scholastic maximized flexibility and improved their CI/CD pipeline by utilizing a microservices architecture running in containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Jul 19, 2017
• Digital transformation is essential in the modern software factory, and mainframes are mission-essential elements in many industries, including, finance, transportation, insurance and others • The industry is adopting agile and DevOps practices throughout IT to increase business agility • Explore the potential for DevOps in your organization, told from a mainframer’s point of view
Tags : 
    
CA Technologies
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security, enterprise applications
    
Veracode
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Modern app delivery for an adaptive, optimized network To succeed in today’s cloud-first world, you need to manage and deploy modern applications in parallel with legacy applications. But traditional application delivery controller (ADC) solutions can’t bridge the gap between these two environments. See and hear how you can streamline the delivery of apps, desktops and data into a unified, fully integrated digital workspace experience. Download this brief to find out how you can: • Get one platform for traditional and modern application delivery • Support hybrid and multi-cloud environments • Convert and migrate legacy apps to microservices application architectures
Tags : 
    
Citrix ShareFile
Published By: Datastax     Published Date: Aug 07, 2018
Nobody likes being bogged down in operations, least of all database administrators who have enough to worry about already. The new DataStax Enterprise (DSE) has made it especially easy to be a DBA. With features like NodeSync, Advanced Replication, and OpsCenter, DSE is Apache Cassandra™ made simple. Read this white paper to learn how DSE simplifies your operations.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
Nobody likes being bogged down in operations, least of all database administrators who have enough to worry about already. The new DataStax Enterprise (DSE) has made it especially easy to be a DBA. With features like NodeSync, Advanced Replication, and OpsCenter, DSE is Apache Cassandra™ made simple. Read this white paper to learn how DSE simplifies your operations.
Tags : 
    
Datastax
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Tenable     Published Date: Feb 05, 2018
12 Steps for Addressing Container Security Containers are an integral tool for most DevOps. While containers themselves do not have inherent security issues, they are often deployed unsecurely, causing security issues around vulnerabilities, visibility, compromise and compliance. How can the DevOps team looking for increased agility work with more closely with the security team looking for reduced risk? Download this Gartner report to: - Understand the unique security challenges posed by containers - Learn how security and risk management leaders concerned with cloud and emerging technologies can engage with and enable secure DevOps - Take 12 steps that will help you adopt containers with a level of acceptable, manageable risk that approaches the use of virtual or physical machines
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.