cloud based

Results 226 - 250 of 1041Sort Results By: Published Date | Title | Company Name
By: Schneider Electric     Published Date: Feb 06, 2018
The growth and importance of edge and cloud-based applications are driving the data center industry to rethink the optimum level of redundancy of physical infrastructure equipment. Read our recommendations for evaluating resiliency needs in White Paper 256: "Why Cloud Computing is Requiring Us to Rethink Resiliency at the Edge."
Tags : edge computing, data center, cloud computing, cloud based applications
     Schneider Electric
By: Oracle     Published Date: Nov 30, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : dns, performance, reliability, network, global, anycast, customer, satisfaction
     Oracle
By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : dns, provider, global, anycast, network, customer, pop, business
     Oracle
By: Oracle Dyn     Published Date: Dec 06, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : dns, performance, reliability, network, global, anycast, customer, satisfaction
     Oracle Dyn
By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : dns, provider, global, anycast, network, customer, pop, business
     Oracle Dyn
By: Mimecast     Published Date: Jun 28, 2019
There is a major shift happening in the world of enterprise IT systems. Many organizations are trading on-premises systems for cloud-based solutions, a move that brings virtually limitless scalability, storage and accessibility – usually at a lower cost and with reduced complexity. Global adoption of cloud enterprise productivity platforms hit an all-time high of 81% in 2018, up from 24% in 2014.* If you’re a longtime Microsoft customer, a logical first step in making the journey from on-premises to the cloud is to move your email to Microsoft Office 365™. You aren’t alone. Office 365 is Microsoft’s fastest-growing business, ever. According to Gartner, 84% of IT decision makers indicated that they are currently using or planning to use Office 365 in the next six months.
Tags : 
     Mimecast
By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
     SecureAuth
By: Larsen & Toubro Infotech(LTI)     Published Date: Feb 18, 2019
The largest national multiline insurance had built a repository of Insurance policies (P&C and Life Insurance) on Microfilm and Microfiche in early 90’s, as a preservation strategy. They were grappling with issues as this technology became outdated over time: • Risk of losing their only source of data for Insurance policies and corresponding communication, need to improve data availability and speed of claims evaluation • Compliance issues, need of a WORM (write once read many) storage compliant with FINRA regulations, where data should be encrypted when at rest • Total cost for digitization compared to 10-12 years of support left to maintain insurance policies was not very encouraging • Required a low cost, cloud-based, FINRA-compliant document management solution which could provide quick access to stored data Download complete case study to know how LTI’s e-Office sDownload full case study to know how LTI’s e-Office solution enabled 50% TCO for Largest national Multiline Insurance.
Tags : 
     Larsen & Toubro Infotech(LTI)
By: Equinix EMEA     Published Date: Mar 21, 2019
The Digital Edge Playbook for Payments and Commerce outlines how industry leaders are transforming their digital edge to leverage an ecosystem-based value chain for real-time insights and a frictionless experience. Our simple, three-step strategy offers proven best practices on how to re-architect your presence, integrate cloud and SaaS capabilities and enable new offerings based on interconnected collaboration. Download this whitepaper today to find out more.
Tags : 
     Equinix EMEA
By: Sophos     Published Date: Oct 07, 2015
This paper looks at BYOD security challenges posed by employees working beyond the company's secure perimeter, exposes the main BYOD security risks and proposes transitioning to a cloud-based security service.
Tags : security, byod security, bring your own device security, byod security challenges
     Sophos
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
     Carbonite
By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
     Carbonite
By: Workday Netherlands     Published Date: Feb 04, 2019
Medium enterprises met een krap budget kunnen hun HR-software naar nieuwe hoogten tillen met moderne cloud-based technologie. Dankzij innovaties in cloud-based technologie is er nu een alternatief dat kleinere bedrijven kunnen gebruiken om groei te handhaven en concurrerend te blijven. Download de whitepaper om te zien hoe.
Tags : workforce-technologie, digitale strategie
     Workday Netherlands
By: Workday Netherlands     Published Date: Feb 04, 2019
Ontdek de strategieën die bedrijven gebruiken om veranderingen de baas te blijven. Lees het door Workday gesponsorde Harvard Business Review Analytic Services-rapport. Leer hoe organisaties één cloud-based systeem voor finance en HR gebruiken om beslissingen te nemen op basis van data, samenwerking tussen C-level executives te ondersteunen en planningsmethoden met meer inzicht, nauwkeurigheid en snelheid te bieden.
Tags : financiën, workforce-technologie, digitale strategie
     Workday Netherlands
By: Oracle     Published Date: Sep 06, 2016
This survey presents the attitudes towards and future plans for the adoption of cloud-based supply chain management (SCM) solutions.
Tags : cloud computing, cloud, supply chain management solutions, scm, oracle
     Oracle
By: IBM     Published Date: May 16, 2016
Our objective in this Checklist Report is to share best practices that will position the reader to take advantage of a cloud-based data warehousing solution.
Tags : ibm, tdwi, checklist report, data warehousing, cloud, analytics, analytic architecture, warehousing
     IBM
By: IBM     Published Date: Mar 30, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : cloud security, electronic security, health care, security risk management, user authentication, cloud technology
     IBM
By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
What is IBM Blueworks Live? An intuitive, cloud-based business process modeling tool that generates industry-standard BPMN 2.0 layouts, documentation and output allowing you to:
Tags : 
     Group M_IBM Q3'19
By: Schneider Electric     Published Date: Jan 26, 2018
The first event in the Partnering with Certainy Webinar Series, "Customer Demands at the Edge." Trends like IoT are driving customer experience expectations in a way that demands resiliency in local edge environments. As a result, we’re seeing a rise of edge computing (compute power coming out of the cloud and into the access layer). Customer demands manifest themselves differently based on things like company size and segment. For example, a retail customer’s business imperatives might look different from a doctor’s office. But one thing remains constant: A standardized, redundant, and repeatable physical infrastructure can protect the availability of these now-critical access-layer IT assets. APC by Schneider Electric has: The solutions you need to deliver a standardized, redundant, & repeatable infrastructure to your customers The tools you need to configure them, The alliances & certifications you trust & rely on, The program to make it profitable. Fill out your information and click "Register" to watch the kick off our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Always On, Always Connected.” This webinar originally aired on October 5th, 2017.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Apr 20, 2018
Provide stable data center and network services across a multi-building, multi-campus school district.
Tags : data closets, cloud management, remote visibility, it staff, data center
     Schneider Electric
By: Cisco     Published Date: Jul 01, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure
     Cisco
By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure
     Cisco
By: Box     Published Date: Mar 14, 2012
Read how organizations are realizing massive productivity gains by transitioning their content management solutions to cloud-based models.
Tags : cloud, enterprise, collaboration, productivity, transition, management, content management, virtual
     Box
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com