open source

Results 101 - 125 of 236Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Aug 17, 2017
Communications service providers are looking for alternative deployment models that will help them support fast-growing network demand. Moving to a virtualized EPC (vEPC) solution can help service providers achieve more cost-e?ective scaling by using standard high-volume servers in place of purpose-built systems. System integrators, software vendors, and platform providers rely on Intel® technologies to deliver the performance and scalability required for vEPC solutions. Intel is also participating in the development of open standards, contributing to the open source community, developing reference architectures, engaging with industry participants, and collaborating on trials that can help facilitate the evolution to vEPC solutions and accelerate network transformation by use of network functions virtualization.
Tags : 
    
Intel
Published By: Red Hat     Published Date: Nov 08, 2017
With help from Red Hat Consulting, Aviva Asia Pte. Ltd. created and launched a new application based on Red Hat JBoss Middleware within a tight six-month time frame. With this new solution, Aviva has reduced costs by replacing proprietary licensing fees with Red Hat’s flexible, cost-effective subscription pricing model. In addition, hosting the new application locally on-premise has improved response times for end users, helping Aviva bring new services to market faster..
Tags : 
system migration, proprietary imaging, bond management workflow system, enterprise solutions, open source technology
    
Red Hat
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
MongoDB is an open-source, document database designed with both scalability and developer agility in mind. MongoDB bridges the gap between key-value stores, which are fast and scalable, and relational databases, which have rich functionality. Instead of storing data in rows and columns as one would with a relational database, MongoDB stores JSON documents with dynamic schemas. Customers should consider three primary factors when evaluating databases: technological fit, cost, and topline implications. MongoDB's flexible and scalable data model, robust feature set, and high-performance, high-availability architecture make it suitable for a wide range of database use cases. Given that in many cases relational databases may also be a technological fit, it is helpful to consider the relative costs of each solution when evaluating which database to adopt.
Tags : 
total, cost, ownership, comparison, mongodb, oracle
    
AstuteIT_ABM_EMEA
Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
Published By: Oracle     Published Date: Oct 20, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle
Published By: Microsoft Azure     Published Date: Apr 05, 2018
If you’re running a mixed operating system environment, you already know that choice is key. Whether on Microsoft Windows Server or Linux, in virtual machines or containers, enterprises are expanding their deployment options. By bringing Microsoft SQL Server to Linux, Microsoft continues to embrace open source solutions.
Tags : 
    
Microsoft Azure
Published By: IBM APAC     Published Date: Mar 19, 2018
IDC Analyst Report: A New Breed of Servers for Digital Transformation Most organizations today are on a digital transformation journey and a server infrastructure is a critical component of that journey. Read the IDC Analyst Report “A New Breed of Servers for Digital Transformation" to find out: • A roadmap for servers in three stages - from running simple stateless web applications to adopting open source DBMSs to cloud to predictive modeling • How you can take advantage of OpenPOWER-based infrastructure from a price/performance perspective • Ways to lower your IT spend and increase your workloads with minimal investment
Tags : 
    
IBM APAC
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, jennifer bayuk, bear stearns, ciso, application security best practices
    
HP - Enterprise
Published By: Red Hat, Inc.     Published Date: Jul 12, 2012
Recently, enterprises have seen enormous gains in scalability, flexibility, and affordability as they migrated from proprietary, monolithic server architectures to architectures that are virtualized, open source, standardized, and commoditized.
Tags : 
scalability, flexibility, affordability, performance, ease-of-use, reduced acqisition costs, reduced maintenance costs, red hat storage server, cloud, cloud computing, public cloud, private cloud, open cloud, data center, amazon web serivices, aws, unified file, unified object, n-way local synchronous replication, elastic volume management
    
Red Hat, Inc.
Published By: SDL Web Content Management Solutions     Published Date: Jul 26, 2010
It's hard to believe, but some enterprises still use custom-coded Web content management (WCM)solutions. However, consumer demands have forced firms to shift from just managing and publishing Web sites to the daunting complexities of multichannel customer engagement, and it has becomeuntenable to build and maintain the required tools. With few exceptions, any firm with a custom-coded WCM platform should begin transitioning to a commercial or open source solution. For some firms,open source products offer the attractions of custom-coding with lesser software development and maintenance burdens.
Tags : 
wcm, web content management, multichannel, sdl, custom code, engagement
    
SDL Web Content Management Solutions
Published By: Klocwork     Published Date: May 11, 2011
This technical white paper looks at the issues of developing for multicore and multiprocessor environments in detail, explains how static analysis can be used to address them, and walks through two examples of these issues in prominent open source projects.
Tags : 
klocwork, software development cycle, multiprocessor, open source, processor architecture
    
Klocwork
Published By: Ascentis     Published Date: Sep 29, 2010
Unleash the power of online enrollment with self-service and make your HR team more responsive and accurate. Learn how Web-based enrollment: . Preserves data accuracy . Increases employee satisfaction . Transfers benefits selections AUTOMATICALLY to insurance carriers
Tags : 
ascentis, open enrollment, automation, accuracy, self-service, human resources, errors, hris, insurance, benefits
    
Ascentis
Published By: Ascentis     Published Date: Oct 19, 2010
Most HR departments spend up to five hours of every day with tedious data-related administrative issues and reactionary tasks. The right HRIS software will automate your critical processes and free your time to be more accelerated, responsive and strategic. Learn how HRIS technology will help you to: . Eradicate benefit errors . Manage attendance . Automate compliance
Tags : 
ascentis, open enrollment, automation, accuracy, self-service, human resources, errors, hris, insurance, benefits
    
Ascentis
Published By: Ascentis     Published Date: Sep 28, 2010
HRIS solutions designed for very large organizations can be costly to set up and maintain, and often require the services of an army of consultants to keep them operational. Systems designed for very small organizations concentrate on either HR functions such as attendance and compensation, or on benefits management, but usually lack the ability to integrate the two areas. To be a practical investment choice for a mid-tier organization, a satisfactory HRIS solution must have its HR and benefits functions highly integrated. It must be agile so it can easily be kept aligned with the constant change in compliance laws, and it must be robust and secure, built on a tried and true platform foundation.
Tags : 
ascentis, open enrollment, benefits, automation, accuracy, self-service, human resources, errors, hris, insurance, hipaa, e-sign act, automated
    
Ascentis
Published By: Fujitsu     Published Date: Dec 22, 2015
This whitepaper reveals how Ceph can be summed up as an open source software solution conceived and built to deliver hyper-scale performance and almost limitless expandability.
Tags : 
ceph, storage, software, big data, data, scalability, storage infrastructure, software solution, architecture, software defined storage, data storage
    
Fujitsu
Published By: Fujitsu     Published Date: Dec 22, 2015
This whitepaper reveals the benefits of software defined storage, and hyper-scale data management in particular.
Tags : 
software defined storage, storage, data management, hyper-scale sds, sds, data storage
    
Fujitsu
Published By: Red Hat     Published Date: May 17, 2012
Virtualization is typically the foundation for and path to the cloud, but by itself can result in virtual machine sprawl and new silos. Red Hat CloudForms, can be used to automate an IT infrastructure, but it's important to set policies up-front.
Tags : 
cloud, cloud computing, private, public, hybrid, risks, benefits, infrastructure, iaas, private infrastructure, red hat, infrastructure-as-a-service, virtualization, open source, networking
    
Red Hat
Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba, sox, cobit, iso, hipaa, fisma, database activity monitoring, database vulnerability manage, database activity monitoring
    
McAfee
Published By: Datastax     Published Date: Apr 04, 2017
As the big data ecosystem continues to expand, new technologies are addressing the requirements for managing, processing, analyzing, and storing data to help companies benefit from the rich sources of information flowing into their organizations. From NoSQL databases to open source projects to commercial products offered on-premises and in the cloud, the future of big data is being driven by innovative new approaches across the data management lifecycle. The most pressing areas include real-time data processing, interactive analysis, data integration, data governance, and security. Download this report for a better understanding of the current landscape, emerging best practices and real-world successes.
Tags : 
evolution, big data, technology, datastax, nosql
    
Datastax
Published By: SDL Web Content Management Solutions     Published Date: Jul 26, 2010
It's hard to believe, but some enterprises still use custom-coded Web content management (WCM)solutions. However, consumer demands have forced firms to shift from just managing and publishing Web sites to the daunting complexities of multichannel customer engagement, and it has becomeuntenable to build and maintain the required tools. With few exceptions, any firm with a custom-coded WCM platform should begin transitioning to a commercial or open source solution. For some firms,open source products offer the attractions of custom-coding with lesser software development and maintenance burdens.
Tags : 
wcm, web content management, multichannel, sdl, custom code, engagement
    
SDL Web Content Management Solutions
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The foregoing use cases—all with varying levels of complexity—are an overview of the creative development opportunities afforded by OpenDXL. We hope these have inspired you to start your own OpenDXL project. Bookmark and explore these pages for core resources.
Tags : 
opendxl, integrate, orchestrate, expedite, security, operations
    
McAfee EMEA
Published By: Mocana     Published Date: Jun 18, 2010
Until recently, designing or building a wireless device meant cobbling together whatever security implementations you could find, often with open source and other code that is usually too big and too slow for device environments.
Tags : 
mocana, nano wireless security, wpa2, device developer, open source code
    
Mocana
Published By: Mocana     Published Date: Jun 22, 2010
Mocana's NanoSSL is a comprehensive SSL solution designed for efficiency and high performance in embedded and resource-constrained environments. Download the NanoSSL whitepaper and receive a free trial.
Tags : 
mocana, nano ssl, device environment, tls, security services, certificate management, open source
    
Mocana
Published By: EMC Corporation     Published Date: Dec 01, 2014
The following paper opens with the evolution of the Software-Defined Data Center and the challenges of heterogeneous storage silos in making the SDDC a reality. It continues by introducing EMC ViPR Software-Defined Storage and details how it enables enterprise IT departments and service providers to transform physical storage arrays into pools of virtual shared storage resources enable the delivery of innovative data services across arrays.
Tags : 
data center, software-defined storage, enterprise it departments, virtual shared storage
    
EMC Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com