work environment

Results 126 - 150 of 646Sort Results By: Published Date | Title | Company Name

Discover the latest research from Gartner to craft workspaces that will enhance employee experience

Published By: EMS     Published Date: May 21, 2018
Explore the latest research on how you can optimize your employee experience and drive greater collaboration in your workplace.
Tags : 
top trends, workspace, workplace, optimization, modern, employee, experience, flexible
    
EMS

Bridging to the Cloud: The Right Database Makes The Difference

Published By: IBM     Published Date: Jan 27, 2017
For more and more organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. In fact, hybrid cloud is the new norm for IT. IDC says more than 80% of enterprise IT organizations will commit to hybrid cloud by 20171, and 70% of IT decision-makers say they will always have a mix of traditional IT and cloud architectures.2 With important applications and workloads architected across both on-premises and hybrid, public and private cloud environments, business and IT stakeholders must be able to access data with equal efficiency, reliability and speed—regardless of physical location, infrastructure type or time frame.
Tags : 
    
IBM

Adaptive Media Delivery

Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience – but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai

Security at the Speed of Your Network

Published By: Gigamon     Published Date: Feb 20, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon

Securosis Report: Scaling Network Security

Published By: Gigamon     Published Date: Feb 20, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon

ESG Brief: The Importance of a Common Distributed Data Services Layer

Published By: Gigamon     Published Date: Feb 20, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon

How Obrela Keeps Your Business in Business

Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment
Tags : 
obrela, hp arcsight, siem, security information, event management solution, security industries, anti virus, application security
    
HP - Enterprise

Are Your Smart Phones Tough Enough for Work?

Published By: Intermec     Published Date: Jun 20, 2013
Millions of new smart phones continue to ship every month, and many of them find their way into businesses to help workers do their jobs in innovative new ways. However, many of these same phones will be replaced within a year because they are not durable enough to work reliably in new enterprise work environments. In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
Tags : 
smart phones, durability, enterprise applications, ruggedness, reliability, mobile workers, wireless hardware, wireless infrastructure
    
Intermec

Taking Advantage of NetApp Flash for SAN: Learn When and Why to Migrate Your Workloads

Published By: NetApp     Published Date: Sep 26, 2018
Get practical advice from IT professionals on how to successfully deploy all-flash arrays for Oracle, SAP and SQL Server workloads in a SAN environment. You'll explore topics such as transaction processing speed, storage management, future requirements planning, workload migration and more.
Tags : 
netapp, flash, san, workload, netapp
    
NetApp

How to Architect “Zero Trust” Network Segmentation in Industrial Control Systems

Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks

Modernizing Data Protection for the Digital Business

Published By: Veritas     Published Date: Jan 04, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
    
Veritas

Introduction to the Active Everywhere Database

Published By: Datastax     Published Date: Dec 27, 2018
Today’s data volume, variety, and velocity has made relational database nearly obsolete for handling certain types of workloads. But it’s also put incredible strain on regular NoSQL databases. The key is to find one that can deliver the infinite scale and high availability required to support high volume, web-scale applications in clustered environments. This white paper details the capabilities and uses case of an Active Everywhere database
Tags : 
    
Datastax

Understanding and Improving Performance in Network Functions Virtualization Environments

Published By: Intel     Published Date: May 15, 2017
This white paper from Intel and VMware introduces key NFV infrastructure (NFVI) performance concepts and issues, giving CSPs the tools they need to better understand and manage overall performance as they deploy NFV in their networks.
Tags : 
intel, vmware, nfv infrastructure, nfvi, network functions virtualization, architecture
    
Intel

Understanding and Improving Performance in Network Functions Virtualization Environments (Japanese)

Published By: Intel     Published Date: May 17, 2017
The network functions virtualization (NFV) revolution – where software-based services running in virtualized environments on Intel® architecture servers replace purpose built appliances – has taken communications service providers by storm.
Tags : 
intel, vmware, nfv infrastructure, nfvi, network functions virtualization, architecture, infrastructure, network architecture
    
Intel

The Real SaaS Manifesto Defining The True Benefits Of Software-As-A-Service

Published By: Workday     Published Date: Jul 19, 2017
Multi-tenancy is a key feature of Workday and enables multiple customers to share one physical instance of the Workday system in a highly secure environment. Multi-tenancy is enabled through the Workday Object Management Server (OMS). Workday OMS allows servers to host multiple customer tenants simultaneously and builds “security walls” between each of the tenants. Thanks to Workday OMS, there is no way for any worker in one tenant to access the information of another tenant. Workday delivers its software using a continuous development model. Builds are rolled out weekly that contain new features, bug fixes, or performance improvements. Twice a year, Workday takes all the features put into preview and releases them to production for all customers. Workday customers are never landlocked on an old release, and all customers can utilize new features for the products they purchased as soon as they are live.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
Workday

Understanding the Velostrata technology for mass migrations into Google Cloud Platform

Published By: Google     Published Date: Aug 05, 2019
Moving existing enterprise workloads to the cloud has always been challenging as companies struggle to adapt and migrate applications to run in a cloud environment. IT managers must understand application dependencies, change drivers and networking configurations, and learn new management interfaces. This white paper will provide a deeper understanding of Migrate for Compute Engine's technology for mass migrations into GCP unique technology and architecture, and will explore how these capabilities improve current mass migration practices.
Tags : 
cloud applications, cloud as a service, velostrata, migration, google cloud
    
Google

Future-proof your packaging systems

Published By: Schneider Electric     Published Date: May 04, 2018
The challenges facing industrial companies grow more daunting by the day. Globalization, energy markets that change in real time, variations in materials and prices, aging of the industrial workforce, inability to attract the next generation of Talent, and difficult regulatory pressures have all contributed to an extremely stressful industrial business environment. Fortunately, the right automation system can now offer cutting-edge packaging solutions for meeting at least three of these challenges.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation
    
Schneider Electric

The Essential Guide to Machine Data: Infrastructure Machine Data

Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
    
Splunk

A Beginner’s Guide to collectd

Published By: Splunk     Published Date: Aug 17, 2018
With the growing need to effectively monitor your infrastructure, metrics have emerged as a way to gain insight to the trends and problems within your IT environment. collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside another tool, such as Splunk, to help identify trends, issues and relationships you may not be able to observe otherwise. This e-book gives you a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment. Download your complimentary copy of “A Beginner’s Guide to collectd” to learn how to: *Get and configure collectd *Analyze collectd data *Use Splunk and collectd together to analyze large amounts of infrastructure data
Tags : 
    
Splunk

Security at the Speed of Your Network

Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon

NEW: Securosis Report: Scaling Network Security

Published By: Gigamon     Published Date: Dec 13, 2018
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon

Security at the Speed of Your Network

Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon

ESG Brief The Importance of a Common Distributed Data Services Layer

Published By: Gigamon     Published Date: Mar 26, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon

Security at the Speed of Your Network

Published By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
    
Gigamon

ESG Brief The Importance of a Common Distributed Data Services Layer

Published By: Gigamon     Published Date: Jun 10, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.