hosted cloud

Results 1 - 25 of 71Sort Results By: Published Date | Title | Company Name
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 11, 2019
One of the largest consumer product goods conglomerates wanted their entire platform to be re-hosted, and also enhance its storage and stability. The LTI-developed Cloud Native app on Azure PaaS also helped drive the business value for sourcing through the integration of S2P transformation. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Rackspace     Published Date: May 28, 2019
Established organizations around the world are grappling with the dawn of the digital transformation (DX) economy as they find themselves disrupted by digital natives. In the digital age, traditional organizations risk being disrupted if they keep the status quo. For resource-constrained IT organizations, cloud services will be the foundation for their DX journey. This IDC InfoBrief takes a closer look at the new infrastructural requirements of transforming organizations and how managed cloud services are enabling their DX journey – with three key industries in the spotlight: • Retail – Retailers are expected to be significantly more mature in their cloud adoption in two years, and the next 12 months will see more deployments of hosted private cloud to support their business goals. • Travel and Hospitality – Enterprises will invest in hosted private cloud and IaaS, and adopt cloud-based applications to gain positive business outcomes from supply chain, enhanced guest experience and p
Tags : 
managed cloud services, digital transformation, retail, travel, hospitality
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
Established organizations around the world are grappling with the dawn of the digital transformation (DX) economy as they find themselves disrupted by digital natives. In the digital age, traditional organizations risk being disrupted if they keep the status quo. For resource-constrained IT organizations, cloud services will be the foundation for their DX journey. This IDC InfoBrief takes a closer look at the new infrastructural requirements of transforming organizations and how managed cloud services are enabling their DX journey – with three key industries in the spotlight: • Retail – Retailers are expected to be significantly more mature in their cloud adoption in two years, and the next 12 months will see more deployments of hosted private cloud to support their business goals. • Travel and Hospitality – Enterprises will invest in hosted private cloud and IaaS, and adopt cloud-based applications to gain positive business outcomes from supply chain, enhanced guest experience and p
Tags : 
    
Rackspace
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
One of the largest consumer product goods conglomerates wanted their entire platform to be re-hosted, and also enhance its storage and stability. The LTI-developed Cloud Native app on Azure PaaS also helped drive the business value for sourcing through the integration of S2P transformation. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Genesys     Published Date: Feb 08, 2019
A recent study from Knowlegde Executive clearly shows that that the deployment of cloud-computing technology in the African contact centre industry is growing with organisations adopting hosted, virtual and Contact-Centre-as-a-Service (CCaaS) solutions. Download at this page the report with all results. Get the full study results to get insights on: The impact on customer and employee engagement The main pain points & challenges The technology service provider check list Find out why over 50% of African contact centres have adopted a cloud model
Tags : 
    
Genesys
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
Group M_IBM Q418
Published By: Microsoft     Published Date: Jul 20, 2018
If you’re like most developers, you spend about two-thirds of your time building and the rest of your time learning. Sometimes your research is proactive, based on personal interest or a desire to maintain your skills, but more likely it’s out of necessity—learning what you need to tackle your next big project. Not long ago, new projects assumed an on-premises or hosted approach, forcing you to spend considerable time on essential requirements like scalability, availability, and security. Today, you still must deliver on those essentials, but the apps you’re building need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and delight users in new ways. Cloud services not only deliver “built-in” scalability and availability, but also provide an unprecedented range of prebuilt functionality for driving innovation into your apps—ready to evaluate for your next project, without your having to worry about physical infrastructure and the related ove
Tags : 
    
Microsoft
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: dinCloud     Published Date: Jun 19, 2018
Despite the clear opportunity for more effective deployment of IT capability and more efficient IT management offered by cloud, most midmarket workloads are still hosted and managed on site. There is a clear trend towards greater use of managed services, and clear business benefit to embracing this hybrid IT model. The question isn’t really “will we move our midmarket business to cloud/hybrid infrastructure?” but rather, “how quickly will we effect this transition, and how will we prioritize workloads and capabilities along the way?”
Tags : 
transition, management, cloud
    
dinCloud
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: F5 Networks Inc     Published Date: Jan 25, 2018
With digital transformation reshaping the modern enterprise, applications represent a new class of assets and an important source of differentiation. The ever-more-competitive digital economy requires that your applications be delivered with unprecedented speed, scale, and agility, which is why more and more organizations are turning to the cloud. This explosive growth of apps hosted in the cloud creates a world of opportunities—and a whole new set of challenges for organizations that must now deploy and manage a vast portfolio of applications in multi-cloud environments. Automation and orchestration systems can help streamline and standardize IT processes across traditional data centers, private clouds, and public clouds. But with rapid innovation come concerns about security and delivering a consistent experience across environments.
Tags : 
application delivery, digital transformation, cloud technology, application, multi-cloud enviornment
    
F5 Networks Inc
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes integrates monitoring and visualization of device health, end-to-end network paths and the performance of your internally hosted and cloud applications in one place. Identify critical dependencies in your internal network and monitor how device health impacts application performance.
Tags : 
thousandeyes, device management, network devices, cloud applications, network monitoring, application performance, monitoring, network performance
    
ThousandEyes
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: IBM     Published Date: Oct 26, 2017
Identity-as-a-service (IDaaS) is the cloud alternative to maintaining identity and access management (IAM) products on-premise. Fully featured IDaaS offers authentication, access control, single sign-on (SSO), provisioning and password management, infrastructure and directory management, reporting, alerting, and monitoring services, and is hosted, managed, and delivered as a cloud-based service.
Tags : 
idaas, identity and access management, data protection, cloud based security, identity management
    
IBM
Published By: IBM APAC     Published Date: Aug 25, 2017
Transitioning from traditional IT to cloud IT is not an all-at-once, big bang effort. Rather, the cloud adoption process should be an agile, incremental process. And the first part of that process is understanding the different cloud models. Contrary to popular belief, cloud isn’t necessarily only public cloud, multi-tenant, and hosted in a vendor’s data center. It can also be private cloud, single-tenant, and/or hosted in a corporate data center. Often the best solution is a hybrid combination of these options. This paper will show you the advantages of hybrid cloud applications and explore the considerations you should make to find an optimal solution for your organization.
Tags : 
cost reduction, cost optimization, business agility, innovation, business models
    
IBM APAC
Published By: Synnex     Published Date: May 30, 2017
Most companies have decided they need the business agility and want the cost savings that come when moving to the cloud. But with the bewildering amount of contradictory information floating around on the Internet, not many really understand exactly what that means or what it entails. Companies considering Microsoft Office 365 as their first step in moving applications to hosted solutions face similar inconsistencies, making it difficult to separate fact from fiction. For example, some businesses incorrectly believe Office 365 is simply a version of Office accessed by a browser. That’s just one of the misconceptions about Office 365 we want to correct, which is why we created this myth-busting guide to help you. When considering Office 365 to power your organization, you need to know the facts. Your business depends on it. Ready to learn which of the top nine Office 365 business cloud myths you may have thought were true—but aren’t? Read on.
Tags : 
office 365, cloud, microsoft, office, cloud migration, skype
    
Synnex
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
iCruise.com, one of the largest sellers of cruises in the US, needed a total communications solution with both hosted phone service and a cloud contact center. Only 8x8 was able to deliver a complete and integrated approach to customer service
Tags : 
customer service, 8x8, integration, icruise.com, communications
    
8x8 Inc.
Published By: Silver Peak     Published Date: Feb 06, 2017
As enterprise IT considers ways to improve WAN functionality and service levels while lowering costs, the interest in SD-WANs has dramatically increased. But not all SD-WANs are created equal. As new applications emerge, whether hosted on premise or in the cloud, demands on WAN throughput, efficiency, and reliability increase. Performance-driven SD-WANs significantly improve application performance and Quality of Service (QoS) making it even easier for enterprises to justify adopting SD-WAN solutions.
Tags : 
sd-wan, networking, it management, network architecture, silver peak
    
Silver Peak
Published By: VMware     Published Date: Nov 04, 2016
In order to keep pace with the business and developer demands inherent with the digital era, enterprise IT has picked up speed and scale by embracing the cloud. As a result of this mix of private on-premises clouds, hosted private clouds, and public cloud services, the modern data center has become a more complex and murky environment to manage. In the VMware eBook “How to Gain Visibility Across Your Multi-Cloud Environment,” we explore the power of the enterprise-ready cloud management platform (CMP) as a single solution for automating the delivery of IT resources, and managing those resources throughout their lifecycle across private and public clouds. Learn how you’ll gain the agility for accelerating IT delivery, the efficiency to improve OpEx and CapEx, the flexibility to leverage private or public cloud resources, and the level of control necessary to meet governance and security requirements.
Tags : 
    
VMware
Start   Previous   1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.