distributed it

Results 251 - 275 of 324Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : 
ibm, security management, mainframe cloud, information management, security, data, networking, wireless
    
IBM
Published By: IBM     Published Date: Jul 19, 2016
IBM Platform LSF family provides a complete set of workload management capabilities for demanding, distributed HPC environments. In this video, we will learn how a genomics workflow can be managed in a multi-architecture, hybrid-cloud environment with the IBM Platform LSF family. Featuring IBM Platform Application Center and IBM Process Manager, learn how these add-on products can help to drive productivity through easy-to-use interfaces for managing complex computational workflow.
Tags : 
ibm, analytics, ibm platform, lsf, ibm platform application center, software development, enterprise applications, data management
    
IBM
Published By: Arbor Networks     Published Date: Sep 29, 2012
This newsletter is intended to educate and inform enterprise network and data center operators about the problem of distributed denial of service (DDoS).
Tags : 
ddos, distributed denial of service, data center, malware, security threats, database servers, dns, access control, anti virus, database security, infrastructure
    
Arbor Networks
Published By: Cisco     Published Date: Jul 11, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: IBM     Published Date: Oct 16, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
ibm, encryption, hybrid-cloud, data protection
    
IBM
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology, network security, application security, security management
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats, threat vectors, service platforms, mitigation, network architecture, network management, network security, application security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive, architecture, network, application, cia triad, confidentiality, integrity, network management, network security, application security, high availability
    
F5 Networks Inc
Published By: IGLOO Software     Published Date: Jan 06, 2010
This case study describes how a business social software solution provides the researchers, students and institutions of PolicyNet with the ability to seek out, share insights and collaborate with their counterparts down the hallway, across the street and around the world.
Tags : 
igloo software, online community researcher, policynet, academic distribution, public policy, business social software
    
IGLOO Software
Published By: GoToMeeting     Published Date: Jul 08, 2011
Distributed workers - just like their on-site counterparts - need to collaborate with coworkers, partners and customers to stay productive. But in today's global business climate, frequent travel is no longer a viable option. This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the challenges of a global market, virtual teams and an ever-changing business climate.
Tags : 
citrix gotomeeting, business collaboration, cloud computing, saas technologies, business climate, productivity, competitive edge, geographic reach, remote access, remote network management, groupware workflow, project management, collaboration
    
GoToMeeting
Published By: GoToMeeting     Published Date: Oct 11, 2011
Building a team culture can be challenging - particularly if members of your team are distributed around the globe. Teamwork ensues when the team feels stable, is focused, able to envision the work required to achieve it and collaborate in an ego-less structure of contribution. This new white paper explores how to build a team culture regardless of where team members are located.
Tags : 
citrix, marketing, teamwork, employees, team culture, working environment, business intelligence, business management, employee performance, productivity, project management
    
GoToMeeting
Published By: GoToMeeting     Published Date: Oct 11, 2011
Distributed work programs are one of the most effective ways of achieving badly-needed operational savings. To be effective, however, you need to know which practices and tools are most effective for managing remote staff. This new white paper addresses three fundamental management questions, explores key challenges of managing remote workers and provides best practices for setting up a successful remote work program.
Tags : 
citrix, technology, business. remote work program, management, employee, employee performance, productivity, project management
    
GoToMeeting
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: Aerohive Networks     Published Date: Aug 22, 2014
Cloud networking introduces a new way to deploy, operate, & manage distributed enterprise networks. It delivers network capabilities via a cloud infrastructure with minimal capital investment or IT resources. This paper provides details on cloud networking, the state of the cloud market & its benefits.
Tags : 
cloud networking, enterprise, it resources, deploy, operate, mange, infrastructure, networking, cloud computing
    
Aerohive Networks
Published By: Polycom     Published Date: Aug 16, 2017
"WR believes that huddle rooms should be an integral part of every organization’s meeting room and collaboration strategy for several reasons including: - the addition of millennials to the work environment - the enhanced interest (and in some cases use) of open work spaces and telecommuting - the increased need to support large numbers of collaborative and distributed work teams But most companies remain stymied about how to deal with these spaces. This study, sponsored by Polycom, is intended to raise awareness of the value and importance of these misunderstood, mismanaged, and often under-appreciated meeting spaces."
Tags : 
polycom, huddle room, wainhouse report, work environment, video collaboration
    
Polycom
Published By: Polycom     Published Date: Nov 30, 2017
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: • Guidance on selecting devices for different workspaces • Information on the newest collaboration features and benefits • Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom
Published By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.
Tags : 
cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network, bandwidth management, infrastructure, web service security, application performance management, web services, web service management, data center design and management
    
cPacket Networks
Published By: Pluribus Networks     Published Date: Sep 25, 2014
Software Defined Networking (SDN) allows organizations to deliver networking with the same level of flexibility and agility as virtualization has allowed them to deliver other parts of their infrastructure. This free webinar will examine current networking architectures at a high level.
Tags : 
pluribus, pluribus networks, sdn, software defined networking, distributed networking, distributed computing, network virtualization, rack switching, small business networks, storage virtualization, server virtualization, data center design and management, virtualization
    
Pluribus Networks
Published By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : 
nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management, business network, network security, fibre channel, infrastructure, internetworking hardware, wide area networks, network attached storage, internet security, wlan, server virtualization, data center design and management
    
NEC
Published By: Basho     Published Date: Apr 07, 2015
bet365 is one of the world’s leading online gambling groups with over 14 million customers in two hundred countries. Recently, bet365 chose Riak, the NoSQL distributed database to ensure scalability and reliability for their site. Get a better understanding of how to choose the right database solution directly from Dan Macklin, Head of Research and Development at bet365. Join us for this On Demand webinar to learn about: • bet365's evaluation process • The business and technical challenges addressed • Triumphs achieved by migrating to Riak • Lessons learned and Dan Macklin's advice for anyyone evaluating their database requirements Download to watch this On-Demand webinar to learn why Riak chose bet365.
Tags : 
basho, riak, database infrastructure, bet365, unstructured data, it management, data management
    
Basho
Published By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data, service operations system, networking, security, it management, wireless, data management
    
Basho
Published By: Riverbed     Published Date: Jun 02, 2015
The transition to a hybrid environment has created challenges in optimizing application performance because the primary compute location has shifted and become distributed. Learn to ease these challenges adapt to transitions.
Tags : 
hybrid network, cloud infrastructure, increase reliability, reduce costs, hybrid networking, infrastructure, migration, network performance management, remote access, remote network management, security management, wireless infrastructure, wlan, application integration, desktop management, cloud computing
    
Riverbed
Published By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management, best practices, business activity monitoring, business analytics
    
IBM
Published By: Arbor Networks     Published Date: Mar 07, 2011
Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.
Tags : 
ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot, anti virus, ddos, internet security, intrusion prevention, data protection
    
Arbor Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.