network

Results 1 - 25 of 4874Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 13, 2013
FlexPod Select with Hadoop delivers enterprise class Hadoop with validated, pre-configured components for fast deployment, higher reliability and smoother integration with existing applications and infrastructure.  These technical reference architectures optimize storage, networking, and servers with Cloudera and Hortonworks distributions of Hadoop. Leverage FlexPod Select with Hadoop to help store, manage, process and perform advanced analytics on your multi-structured data.   Tuning parameters, optimization techniques among other Hadoop cluster guidelines  are provided.
Tags : flexpod with hadoop, enterprise data, storage infrastructure, massive amounts of data
     NetApp
By: IBM     Published Date: Sep 16, 2015
6 criteria for evaluating a high-performance cloud services providers Engineering, scientific, analytics, big data and research workloads place extraordinary demands on technical and high-performance computing (HPC) infrastructure. Supporting these workloads can be especially challenging for organizations that have unpredictable spikes in resource demand, or need access to additional compute or storage resources for a project or to support a growing business. Software Defined Infrastructure (SDI) enables organizations to deliver HPC services in the most efficient way possible, optimizing resource utilization to accelerate time to results and reduce costs. SDI is the foundation for a fully integrated environment, optimizing compute, storage and networking infrastructure to quickly adapt to changing business requirements, and dynamically managing workloads and data, transforming a s
Tags : 
     IBM
By: Data Direct Networks     Published Date: Apr 08, 2014
DataDirect Networks (DDN), the largest privately-held provider of high-performance storage, has a large and growing presence in HPC markets. HPC users identify DDN as their storage provider more than any other storage-focused company, with twice the mentions of EMC, and more the twice the mentions of NetApp, Hitachi Data Systems, or Panasas.(5) DDN’s strength in HPC is anchored by its Storage Fusion Architecture (SFA), winner of the HPCwire Editor’s Choice Award for “Best HPC Storage Product or Technology” in each of the past three years. The DDN SFA12KX combines SATA, SAS, and solid-state disks (SSDs) for an environment that can be tailored to a balance of throughput and capacity
Tags : 
     Data Direct Networks
By: Intel     Published Date: Aug 06, 2014
Powering Big Data Workloads with Intel® Enterprise Edition for Lustre* software The Intel® portfolio for high-performance computing provides the following technology solutions: • Compute - The Intel® Xeon processor E7 family provides a leap forward for every discipline that depends on HPC, with industry-leading performance and improved performance per watt. Add Intel® Xeon Phi coprocessors to your clusters and workstations to increase performance for highly parallel applications and code segments. Each coprocessor can add over a teraflops of performance and is compatible with software written for the Intel® Xeon processor E7 family. You don’t need to rewrite code or master new development tools. • Storage - High performance, highly scalable storage solutions with Intel® Lustre and Intel® Xeon Processor E7 based storage systems for centralized storage. Reliable and responsive local storage with Intel® Solid State Drives. • Networking - Intel® True Scale Fabric and Networking technologies – Built for HPC to deliver fast message rates and low latency. • Software and Tools: A broad range of software and tools to optimize and parallelize your software and clusters. Further, Intel Enterprise Edition for Lustre software is backed by Intel, the recognized technical support providers for Lustre, and includes 24/7 service level agreement (SLA) coverage.
Tags : 
     Intel
By: BitStew     Published Date: May 26, 2016
The heaviest lift for an industrial enterprise is data integration, the Achilles’ heel of the Industrial Internet of Things (IIoT). Companies are now recognizing the enormous challenge involved in supporting Big Data strategies that can handle the data that is generated by information systems, operational systems and the extensive networks of old and new sensors. To compound these issues, business leaders are expecting data to be captured, analyzed and used in a near real-time to optimize business processes, drive efficiency and improve profitability. However, integrating this vast amount of dissimilar data into a unified data strategy can be overwhelming for even the largest organizations. Download this white paper, by Bit Stew’s Mike Varney, to learn why a big data solution will not get the job done. Learn how to leverage machine intelligence with a purpose-built IIoT platform to solve the data integration problem.
Tags : 
     BitStew
By: Cisco EMEA     Published Date: Jun 19, 2019
Invest in a network that can grow over time, so you can add features and functionality. Make sure your switches and routers are easy to install, use, and manage.
Tags : 
     Cisco EMEA
By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : technology, mapping, location data
     HERE Technologies
By: Cisco EMEA     Published Date: Mar 26, 2019
Learn about routing, switching, security, wireless and IP telephones
Tags : 
     Cisco EMEA
By: Emarsys - APAC     Published Date: Jun 12, 2019
Omnichannel isn’t just another buzzword you can ignore. In fact, today’s most successful marketing strategies all take an omnichannel track that puts customers at the center of a diverse network of interactions and engagements. In this white paper, you’ll learn: • How email can serve as the foundation of your omnichannel strategy • How Artificial intelligence marketing (AIM) can make it possible to not only achieve true 1:1 personalization, but also scale it • How to apply a step-by-step roadmap to your brand’s pursuit of omnichannel excellence
Tags : 
     Emarsys - APAC
By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Need to deliver secure customer experiences and high application performance? View our new infographic, “Digital Transformation: Seeing Through the Clouds to the Journey Ahead” to learn how to get the breadth and depth of network and application visibility needed to effectively monitor and secure your digital applications.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper. 
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now. 
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability.  NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
     Gigamon
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
According to the 2018 Global DNS Performance Benchmark Report, the state of DNS resiliency among enterprises and top SaaS providers is poor, with 60% relying on a single source for their authoritative nameservers. In this article, we’ll explore the necessity of having a secondary DNS service.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployed—it’s deployed on a frequent basis.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
     F5 Networks Singapore Pte Ltd
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com