protocol

Results 1 - 25 of 258Sort Results By: Published Date | Title | Company Name
By: RedPoint     Published Date: Sep 22, 2014
The emergence of YARN for the Hadoop 2.0 platform has opened the door to new tools and applications that promise to allow more companies to reap the benefits of big data in ways never before possible with outcomes possibly never imagined. By separating the problem of cluster resource management from the data processing function, YARN offers a world beyond MapReduce: less encumbered by complex programming protocols, faster, and at a lower cost. Some of the topics discussed in this paper include: • Why is YARN important for realizing the power of Hadoop for data integration, quality and management? • Benchmark results of MapReduce vs. Pig vs. visual “data flow” design tools • The 3 key features of YARN that solve the complex problems that prohibit businesses from gaining maximum benefit from Hadoop. Download this paper to learn why the power of Hadoop 2.0 lies in enabling applications to run inside Hadoop, without the constraints of MapReduce.
Tags : 
     RedPoint
By: IBC365     Published Date: Aug 08, 2019
FTP was developed in 1971, and a lot has changed in the decades since it was first created. Though the protocol has seen improvement over the years, there are some fundamental drawbacks to relying on this old technology for transferring today’s large media files.
Tags : 
     IBC365
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network
     Virtela Communications, Inc.
By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
     Juniper Networks
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Today’s data centers are expected to deploy, manage, and report on different tiers of business applications, databases, virtual workloads, home directories, and file sharing simultaneously. They also need to co-locate multiple systems while sharing power and energy. This is true for large as well as small environments. The trend in modern IT is to consolidate as much as possible to minimize cost and maximize efficiency of data centers and branch offices. HPE 3PAR StoreServ is highly efficient, flash-optimized storage engineered for the true convergence of block, file, and object access to help consolidate diverse workloads efficiently. HPE 3PAR OS and converged controllers incorporate multiprotocol support into the heart of the system architecture
Tags : 
     Hewlett Packard Enterprise
By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
     Preempt
By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
     Teradata
By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
     DigiCert
By: Riverbed     Published Date: Jul 17, 2013
Riverbed Cascade is a new type of tool that incorporates traffic monitoring, packet capture and protocol analysis to provide an application-aware view of the network. Download this white paper from NetMedia to learn how Riverbed Cascade can help to solve your IT performance challenges.
Tags : network performance, management, performance management, riverbed cascade, riverbed
     Riverbed
By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging
     GE Healthcare
By: GE Healthcare     Published Date: Jun 11, 2015
Radiological Associates of Long Island implemented Universal Viewer to give radiologists PACS reading tools and advanced features across the enterprise and anywhere Internet access is available.
Tags : enterprise imaging, advanced visualization, universal viewer, centricity pacs, radiology imaging solutions, diagnostic medical imaging, radiology, medical imaging
     GE Healthcare
By: Aerohive     Published Date: Oct 23, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
     Aerohive
By: Akamai     Published Date: Mar 08, 2017
This whitepaper discusses why speed, or throughput, is so critical for today’s Internet users, provides a historical perspective on the Internet’s TCP protocol underpinning and describes how the FastTCP protocol addresses the needs of today’s Internet.
Tags : online video, online video quality, speed, internet, reliability
     Akamai
By: JBoss Developer     Published Date: Oct 21, 2016
This competitive review between Red Hat and TIBCO integration technologies has presented multiple differences between the products. A notable difference is that only Red Hat JBoss Fuse is a 100% open source product. Red Hat is committed to leveraging existing open source projects and using open standards whenever possible for both product implementation and integration communication. This includes Camel, the de-facto integration standard included with Red Hat JBoss Fuse. Red Hat’s open source commitment extends to Active MQ, the upstream messaging technology used with JBoss A-MQ and included with Red Hat JBoss Fuse. Another difference is that Red Hat JBoss Fuse clustering is based on the upstream Fabric8 community project and offers much more functionality than TIBCO clustering options.
Tags : cloud, technology, competitive advantage, queuing protocol, open source
     JBoss Developer
By: NetApp and VMware     Published Date: Jan 09, 2012
This document provides guidance on how to design and architect a scalable Microsoft applications mixed workload solution.
Tags : unified storage, virtual, infrastructure, leverage, protocol, application, solution, backup
     NetApp and VMware
By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : ca technologies, cnp, emv, otp, 3dsecure
     CA Technologies
By: Pure Storage     Published Date: Nov 02, 2017
The tremendous growth of unstructured data is creating huge opportunities for organizations. But it is also creating significant challenges for the storage infrastructure. Many application environments that have the potential to maximize unstructured data have been restricted by the limitations of legacy storage systems. For the past several years—at least—users have expressed a need for storage solutions that can deliver extreme performance along with simple manageability, density, high availability and cost efficiency.
Tags : high performance, tco, multi protocol, management simplicity, the blade, elasticity software, performance, capacity
     Pure Storage
By: Workday     Published Date: Jul 19, 2017
The shift to SaaS is gaining momentum and there are clear business benefits that can be derived. To optimise success, transformation strategies need to encompass all elements of people, processes, technology and organisational design. Adopting SaaS technologies drives significant change to the way organisations operate – from business processes to support model design and company culture. The implications of cloud adoption and technical challenges such as integrations, data migration and configuration must be fully understood and addressed from the outset.
Tags : finance technology, communication processes, protocols, interaction management, relations, technology, cloud
     Workday
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
     F5 Networks Singapore Pte Ltd
By: Oracle     Published Date: Nov 30, 2017
The DNS is an often-overlooked protocol. Historically, many companies believed they could either run their own DNS service in-house or simply use a bundled option provided by their hosting or CDN provider. However, with the rise in DDoS attacks and continued migration to the cloud, the mission-critical nature of the DNS has become quite apparent to companies around the world. As a result, many are searching for a managed DNS provider.
Tags : dns, email delivery, global ip, network, connectivity, isp, service provider
     Oracle
By: Oracle     Published Date: Nov 30, 2017
DNS speed and reliability are fundamental to the performance of your website and essential to your business. Contact Dyn today to learn how a supplemental DNS service can help you optimize DNS performance and improve user experiences. We can help you determine which multi- DNS option is best for your business and assist with planning and service integration efforts.
Tags : dns, service, management, traffic, vendors, delegation, protocol, traffic
     Oracle
By: Oracle Dyn     Published Date: Dec 06, 2017
DNS speed and reliability are fundamental to the performance of your website and essential to your business. Contact Dyn today to learn how a supplemental DNS service can help you optimize DNS performance and improve user experiences. We can help you determine which multi- DNS option is best for your business and assist with planning and service integration efforts.
Tags : dns, service, management, traffic, vendors, delegation, protocol, traffic
     Oracle Dyn
By: Oracle Dyn     Published Date: Dec 06, 2017
The DNS is an often-overlooked protocol. Historically, many companies believed they could either run their own DNS service in-house or simply use a bundled option provided by their hosting or CDN provider. However, with the rise in DDoS attacks and continued migration to the cloud, the mission-critical nature of the DNS has become quite apparent to companies around the world. As a result, many are searching for a managed DNS provider.
Tags : dns, vendors, dns, ddos, attack, cyber security
     Oracle Dyn
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com