amazon

Results 51 - 75 of 379Sort Results By: Published Date | Title | Company Name

An Introduction to Red Hat Storage Server Architecture

Published By: Red Hat, Inc.     Published Date: Jul 12, 2012
Recently, enterprises have seen enormous gains in scalability, flexibility, and affordability as they migrated from proprietary, monolithic server architectures to architectures that are virtualized, open source, standardized, and commoditized.
Tags : 
scalability, flexibility, affordability, performance, ease-of-use, reduced acqisition costs, reduced maintenance costs, red hat storage server, cloud, cloud computing, public cloud, private cloud, open cloud, data center, amazon web serivices, aws, unified file, unified object, n-way local synchronous replication, elastic volume management
    
Red Hat, Inc.

Appcito CAFE Enables ViralMint to Turn Potential Disaster into Success

Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services, enterprise applications, cloud computing
    
Appcito

Artificial Intelligence in the Enterprise: The AI Race is on

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance

AT&T NetBond for Cloud with Amazon Web Services (AWS)

Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS

Aufbau eines Data Lake auf AWS

Published By: Amazon Web Services     Published Date: Jul 25, 2018
Organisationen müssen heute mit immer größeren Datenmengen zurechtkommen, die aus mehr Datenquellen stammen und mehr Datentypen enthalten als jemals zuvor. Angesichts massiver, heterogener Datenmengen stellen viele Organisationen fest, dass sie eine Datenspeicher- und Analyselösung benötigen, die höhere Geschwindigkeit und mehr Flexibilität als ältere Systeme bietet, um rechtzeitig geschäftliche Erkenntnisse liefern zu können. Ein Data Lake ist eine neue und zunehmend populäre Möglichkeit zur Speicherung und Analyse von Daten, die viele dieser Herausforderungen meistert, indem sie es einer Organisation ermöglicht, alle Daten in einem zentralen Repository zu speichern. Da Daten in ihrem ursprünglichen Format gespeichert werden können, besteht kein Bedarf, sie vor der Übernahme in ein vordefiniertes Schema zu konvertieren, wodurch Sie die Möglichkeit erhalten, all Ihre Daten, sowohl strukturiert als auch unstrukturiert, mit minimaler Vorlaufzeit zu speichern.
Tags : 
    
Amazon Web Services

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Automate Data Analytics with Panoply and Amazon Web Services

Published By: AWS     Published Date: Oct 04, 2019
Speakers include: Stephen Mayne, Solutions Architect, Amazon Web Services, Inc.( AWS), Jason Harris, Evangelist, Panoply, and Audren de Valbray, Data and Insights Director, Motorsport Network.
Tags : 
    
AWS

Automated Security at the Speed of DevOps

Published By: AWS     Published Date: Oct 07, 2019
Software development has evolved from rigid waterfall methodologies to more streamlined approaches, like Agile and more recently DevOps. This evolution has taken place in large part to shorten development life cycles and meet increased business demands. Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes, which break down silos between development and operations, allowing organizations to create better software faster. As organizations implement DevOps on Amazon Web Services (AWS), they need to understand the security implications. The AWS Shared Responsibility Model makes clear that AWS secures what’s “on the cloud,” while the customer is responsible for securing their assets “in the cloud.” When AWS customers go about securing their DevOps environments, they need to do so in a way that provides robust protection without limiting developer agility.
Tags : 
    
AWS

AWS Cross-region Disaster Recovery Plan

Published By: CloudEndure     Published Date: Mar 23, 2016
While a public cloud provides an easy and scalable way to manage and deploy your app or website, you also need to have a contingency plan for business continuity and disaster recovery. Often overlooked on Amazon Web Services (AWS), an extremely effective cloud disaster recovery (DR) strategy is to spread the application stack across regions versus availability zones. This eBook provides a guide for planning and implementing a robust cross-region cloud disaster recovery (CDR) plan for business continuity and critical application uptime on AWS-based applications.
Tags : 
cloudendure, aws, cloud disaster recovery plan, disaster recovery, cloud, cloud computing
    
CloudEndure

AWS eBook

Published By: Trend Micro     Published Date: May 03, 2018
This whitepaper looks to address the Top 3 challenges your team faces when building in the cloud and what it means for your business. Although the capabilities and cost of select SecOps solutions have kept pace with the widespread adoption of the Amazon Web Services (AWS) Cloud, many organizations try to protect their expanding cloud workloads without the proper support.
Tags : 
    
Trend Micro

AWS Security and Networking - Filtering Cloud Network Traffic and Preventing Threats

Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services

AWS Security and Networking - Load Balancing

Published By: Amazon Web Services     Published Date: Apr 11, 2018
Elastic Load Balancing distributes incoming application traffic across multiple EC2 instances, in multiple geographic areas. This increases the fault tolerance of your applications. Load Balancing
Tags : 
    
Amazon Web Services

AWS Security and Networking - VPN and Secure Web Gateway

Published By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
    
Amazon Web Services

AWS Security and Networking Configuration and Vulnerability Analysis

Published By: Amazon Web Services     Published Date: Apr 11, 2018
Effectively monitoring and managing cloud infrastructure configuration changes and performing on-going vulnerability analyses through forensics, troubleshooting, audits, and automation are key activities to help secure your AWS environment.
Tags : 
    
Amazon Web Services

AWS Security Fitness Guide: 11 Exercises to Get CloudFit

Published By: Evident.io     Published Date: Sep 13, 2017
Defending your cloud environment from menacing threats requires conditioning and ongoing commitment. Using best practices and identifying issues before they explode into costly problems are critical to long-term cloud fitness. Automating the process of monitoring and reporting is crucial to ensuring that your cloud is in the best shape it can be. With the "AWS Security Fitness Guide," you’ll learn the 11 exercises that are critical keeping your organization’s data and systems secure in Amazon Web Services (AWS).
Tags : 
    
Evident.io

Ávoris Improves SAP Performance by over 50% with Linke and AWS

Published By: AWS     Published Date: Oct 30, 2018
Businesses that want to drive new value from critical SAP workloads are looking at Amazon Web Services (AWS) due to its breadth and depth of services and rapid pace of innovation. As they pursue this initiative, organizations commonly seek an experienced partner to reliably migrate critical SAP workloads and integrate them with AWS services to take full advantage of the potential cost and operational efficiencies. Linke, an AWS Partner Network (APN) Premier Consulting Partner focused on running SAP on AWS, can help you achieve these initiatives. Transform your SAP landscapes with streamlined migration practices and technology proven to accelerate the deployment of new SAP landscapes by 80% and reduce operational costs 70% compared to on-premises. Register for our upcoming webinar to learn how Linke helped Ávoris, a leading tourism business in Spain, migrate their SAP landscape to AWS in just three months, enabling drastic improvements to performance, reliability, and scale."
Tags : 
sap, performance, aws, linke, avoris
    
AWS

Backup and Recovery on Amazon Web Services (AWS)

Published By: AWS     Published Date: May 18, 2018
This eBook will take you through the benefits of using APN Partner solutions and AWS storage services to create an efficient, reliable, and secure backup and recovery solution that can grow with your business. It also explores how organizations can pay for storage per gigabyte and only for what they use. Also included is information on how customers are leveraging object storage services on Amazon Web Services (AWS) like Amazon Simple Storage Service (Amazon S3) and Amazon Glacier. Download this eBook to learn how customers like Oath, IDT, and King County are deploying backup and recovery solutions with our featured APN partners.
Tags : 
    
AWS

Benchmarking Web Server & Database VMs on Public Cloud

Published By: Internap     Published Date: Nov 11, 2015
This benchmark analysis examines the relative performance of major VM components including virtual cores, memory, block storage, and internal network for Internap AgileCLOUD and Amazon Web Services (AWS) ECS/EBS.
Tags : 
internap, virtual machine, public cloud, servers, server hardware, storage virtualization, sales automation, cloud computing
    
Internap

Best Practices - Surplus to Requirements

Published By: Amazon     Published Date: Mar 20, 2013
In the third installment of our Best Practices series, we talk to retailers about the various strategies they use to deal with excess stock.
Tags : 
surplus, amazon webstore, surplus stock, discounts, webstore, amazon, retail buying, business technology
    
Amazon

Best Practices for Securing Workloads in Amazon Web Services

Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload, aws, data centers, enterprise, cloud, infrastructure, it management, enterprise applications
    
Evident.io

Breaking the Cloud Security Barrier with Amazon Web Services

Published By: Crownpeak     Published Date: Mar 05, 2015
The cloud market is moving forward as reflected in both the evolving perspectives voiced by IT decision-makers and by the business success of cloud service providers. On perspectives, Stratecast’s recurring annual surveys reveal that public cloud adoption has now reached a much-awaited tipping point with a percentage of the 2014 survey respondents stating that they currently use public cloud Infrastructure as a Service (IaaS), and another percentage stating they will too within the next months. On cloud service providers, the business results of Amazon Web Services (AWS), now in its eighth year and still rapidly growing, make a similar statement. This report describes how AWS is breaking the “cloud not secure enough” adoption barrier and, in the process, injecting innovation into the competitive dynamics of the security market.
Tags : 
cloud security, crownpeak, security market, competitive dynamics, security, it management, data center
    
Crownpeak

Build a Holistic Data Management Strategy for Life Sciences

Published By: AWS     Published Date: Nov 08, 2018
In this webinar, you’ll learn how Reltio and IQVIA provide holistic data management solutions for traditional pharma, as well as for emerging biotech and consumer health companies, on Amazon Web Services (AWS).
Tags : 
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.