open source

Results 76 - 100 of 236Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 17, 2016
This IDC Business Value Executive Brief leverages IDC's research into the value of cloud-based application development and integration solutions, including solutions such as IBM WebSphere Application Server (WAS) on cloud.
Tags : 
ibm, middleware, cloud ibm, middleware, application infrastructure, open source application servers, enterprise applications, business technology
    
IBM
Published By: Redhat     Published Date: Sep 15, 2015
This whitepaper reveals the benefits of open source software for IT organisations.
Tags : 
open source integration software, open source software, benefits of open source software, enterprise it, technology integration, redhat, integration products
    
Redhat
Published By: Redhat     Published Date: Sep 15, 2015
This infographic reveals how open source middleware can help reduce your app development infrastructure costs, improve your developers’ annual app production and reduce cost to manage apps after deployment.
Tags : 
middleware, open source middleware, red hat, enterprise
    
Redhat
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service, security
    
CA Technologies
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation
Published By: Kofax     Published Date: Oct 20, 2011
In this report, we look at the drivers for ECM investment, the adoption of collaborative technologies, use of outsourcing, user priorities, views of the future as regards cloud and open source, and spend intentions for the next 12 months.
Tags : 
kofax, business, finance, ecm, investment, report, technology
    
Kofax
Published By: Red Hat     Published Date: Sep 25, 2014
Enterprises are increasingly adopting Linux as a secure, reliable and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions. In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is based on the Linux open-source kernel, has become widely deployed by medium-sized and large businesses, by enterprises in their data centers, and in private and public cloud infrastructures. RHEL is distributed and supported by Red Hat Inc., the world’s largest provider of open-source software solutions, accounting for 74.7% of worldwide Linux operating system (OS) revenue. As a development and deployment platform, RHEL offers an efficient, scalable and robust operating environment with certified security and flexible deployment options in physical and virtualized environments.
Tags : 
enterprise solutions, open-source software, it management, storage, data center
    
Red Hat
Published By: Red Hat     Published Date: Mar 11, 2016
Innovative and agile IT, as both a strategy and a means of delivering new applications, requires a fundamental shift in processes, applications, and infrastructure. This web book sheds light on the cloud infrastructure and tools required to support agile IT methods and applications and demonstrates why open source technology is the best way to achieve the full benefits of this new, rapid mode of IT service delivery.
Tags : 
    
Red Hat
Published By: ServiceNow     Published Date: Mar 24, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use the Web apps they use at home. Integration remains difficult, because it's sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
future it, service automation, it workload, integration, data centers, mobile devices, software-as-a-service, web apps, it management, enterprise applications
    
ServiceNow
Published By: IBM     Published Date: Jul 05, 2016
This e-book highlights the benefits of Hadoop across several industries and explores how IBM® Biglnsights for Apache™ Hadoop® combines open source Hadoop with enterprise-grade management and analytic capabilities.
Tags : 
ibm, analytics, big data, hadoop, enterprise, ibm biginsights, apache, enterprise management, knowledge management, enterprise applications, data management, data science, data storage, data visualization
    
IBM
Published By: IBM     Published Date: Oct 27, 2016
IBM Analytics for Apache Spark for Bluemix is an open-source cluster computing framework with in-memory processing to speed analytic applications up to 100 times faster compared to other technologies on the market today. Optimized for extremely fast and large scale data processing-you can easily perform big data analysis from one application.
Tags : 
ibm, apache spark, bluemix, analytics, enterprise applications, business technology, data science
    
IBM
Published By: IBM     Published Date: Nov 30, 2016
You’ve taken the first step and already know that a document- oriented database is the right database for your application. From here, you still have to decide where and how you’ll deploy the software and its associated infrastructure. These decisions lead to additional considerations around administrative overhead, technical support, open-source options, data sovereignty and security, and more. This paper aims to outline the deployment options available when you select IBM® Cloudant® as your JSON store.
Tags : 
ibm, cloud, cloudant managed service, cloudant local, apache couchdb, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
You’ve taken the first step and already know that a document- oriented database is the right database for your application. From here, you still have to decide where and how you’ll deploy the software and its associated infrastructure. These decisions lead to additional considerations around administrative overhead, technical support, open-source options, data sovereignty and security, and more. This paper aims to outline the deployment options available when you select IBM® Cloudant® as your JSON store.
Tags : 
ibm, cloud, analytics, cloudant managed service, cloudant local, apache couchdb, databases, enterprise applications, data science, data storage
    
IBM
Published By: IBM     Published Date: May 22, 2017
Only a handful of industries have been transformed by the digital age the way banking has. Internet and mobile banking, digital wallets, and a raft of new and innovative products have redefined “the bank” from a local, brick-and-mortar branch to an anytime-anywhere process. The new banking environment has opened opportunities for national, regional, and community banks alike, which are no longer constrained to serve only customers located in the areas where they maintain a physical branch presence. But it has also brought challenges associated with collecting, processing, analyzing, storing, and protecting vast amounts of new data, from multiple locations and sources.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
IBM
Published By: Datastax     Published Date: Aug 03, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
Today’s companies require serious POWER at the data layer if they’re going to thrive in the Right-Now Economy. That’s why DataStax upped the ante with the latest version of its flagship product: DataStax Enterprise (DSE) 6. DSE 6 offers double the performance of DataStax Enterprise 5.1 and has now been independently verified as being at least twice as fast as open source Apache Cassandra. Read this white paper to learn all about DSE 6 performance improvements.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
Today’s companies require serious POWER at the data layer if they’re going to thrive in the Right-Now Economy. That’s why DataStax upped the ante with the latest version of its flagship product: DataStax Enterprise (DSE) 6. DSE 6 offers double the performance of DataStax Enterprise 5.1 and has now been independently verified as being at least twice as fast as open source Apache Cassandra. Read this white paper to learn all about DSE 6 performance improvements.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
    
Datastax
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Today, as IT departments struggle to design and implement solutions capable of managing exponential data growth with strict requirements for application scale and performance, many of them are turning to in-memory data grids (IMDGs).
Tags : 
it departments, data growth, managing data growth, application scale, application performance, in-memory data grids, imdgs, big data, data volume, data velocity, data variability, data management, data collection, data processing, data scaling, data storage systems, data access, data solutions, data challenges, management tooling
    
Red Hat, Inc.
Published By: Red Hat     Published Date: Dec 22, 2010
Join us live starting at 7 a.m. EST on Jan. 26, 2011. The event will be on-demand worldwide the months following. The Red Hat Virtual Experience is a complimentary global online forum of Red Hat experts, partners, customers, and the open source community.
Tags : 
red hat virtual experience, cloud computing, virtualization, collaboration
    
Red Hat
Published By: NextGen     Published Date: Jan 29, 2015
Recognize these six misconceptions that can harm your success. Don’t be “fuzzy” about interoperability and sharing data. Misinformation abounds. Get the straight scoop and the right start to your interoperability plan. Robust interoperability is critical to sustain and grow your organization. It’s the top priority of the Office of the National Coordinator of Health Information Technology (ONC). It should be a high priority for you too.
Tags : 
mirth, interoperability, hit, data, sharing, himss, healthcare, practitioners, insurers, billing/scheduling, systems, health, information, exchanges, ehr, hl7, open source, aco, onc
    
NextGen
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching, open source vulnerabilities, owasp, cloud security, gartner research report, threat forensics, advanced persistent threat, security
    
Waratek
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com