scale applications

Results 1 - 25 of 76Sort Results By: Published Date | Title | Company Name
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Oracle CX     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
    
Dell EMC & Intel
Published By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and PGi CTO David Guthrie discusses how the cloud computing platform helped his company scale up immediately by getting his applications running efficiently in a matter of days, rather than months.
Tags : 
ca technologies, cloud computing, applications, computing platform, technology
    
CA Technologies
Published By: IBM     Published Date: Nov 28, 2011
Download this IBM white paper from Web Buyer's Guide to learn the next generation solutions for application servers.
Tags : 
solutions, applications, hybrid, computing, scaled-out, web-based applications
    
IBM
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: JBoss Developer     Published Date: Feb 05, 2016
IDC analyzed the business value that six surveyed organizations are realizing through their use of Red Hat integration products based on interviews conducted from April to June 2014. Interviewees were from companies ranging in size from just hundreds of employees to several hundred thousand employees, with a mean employee base of just under 92,000. Companies interviewed included representatives from the telecommunications, IT, shipment and logistics, and document management industries. These organizations are headquartered in the United States, the United Kingdom, and Norway and several of them operate on a global scale. These organizations use JBoss Fuse for integration and development of business-critical internal and customer-facing applications
Tags : 
jboss, red hat, idc, integration, jboss fuse, data management, business technology
    
JBoss Developer
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
This paper introduces five architectural principles guiding the development of the next generation data center (NGDC). It describes key market influences leading a fundamental enterprise IT transformation and the technological trends that support it. The five principles are: scale-out, guaranteed performance, automated management, data assurance, and global efficiencies. Cloud infrastructure delivery models such as IaaS, private clouds, and software-defined data centers (SDDC) are foundations for the NGDC. In an era where IT is expected to ensure productiongrade support with a plethoric flow of new applications and data, these models demonstrate how to eliminate bottlenecks, increase self-service, and move the business forward. The NGDC applies a software-defined everything (SDx) discipline in a traditional, hardware-centric business to gain business advantage.
Tags : 
    
SolidFire_NetApp
Published By: JBoss Developer     Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
Tags : 
microservices, architecture, java, paas, soa
    
JBoss Developer
Published By: VMWare EMEA     Published Date: Oct 23, 2017
Today, applications facilitate commerce on a global scale. They play a key role in delivering products and services to customers, a role that directly affects the success of the business. Companies that rapidly deploy, update, and manage business applications have a competitive advantage. To maintain this fast pace, many organizations have adopted a hybrid cloud—a combination of private and public clouds—to become more agile. But true agility isn’t easy
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Pure Storage     Published Date: Oct 09, 2017
Cloud computing and all-flash storage are two of the most important innovations driving next-generation IT initiatives. While it may seem at first that these are parallel trends, in reality they are inextricably intertwined. Without the benefits of all-flash storage —driving new levels of performance, agility and management simplicity — enterprises would not be able to modernize their infrastructures to deliver cloud services. It is no coincidence that the largest hyperscale cloud providers rely on all-flash storage solutions as their storage foundation. Pure Storage all-flash storage arrays provide enterprise customers with a safe, secure and smooth path to the all-flash cloud. You can take the journey in stages, starting small with a single application or two, and then adding more applications through consolidation and virtualization. You can also implement multiple stages at once.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Pure Storage
Published By: VMware AirWatch     Published Date: Feb 21, 2017
By implementing the VMware App Volumes™ application management solution, OGL built a multitenant VDI environment that delivers an extensive range of applications to customers in real time, with full application functionality on any device, while also reducing OpEx and CapEx. Download this case study to learn how OGL Computer addressed these issues and more with VMware App Volumes: • Scale VDI service for more customers and applications. • Reduce expenses of Citrix VDI solution delivery. • Deliver and manage applications dynamically, in real time. • Give users desktop access on any Internet-connected device.
Tags : 
    
VMware AirWatch
Published By: Pure Storage     Published Date: Mar 15, 2018
The all-flash array (AFA) market has undergone significant maturation over the past two years. A high percentage of customers have already committed to an "all flash for primary storage" strategy, and every customer interviewed for this study was among those. In 2017, AFAs will drive over 80% of all primary storage revenue. All of the established storage vendors have entered this space, and there are several start-ups with over $100 million in revenue. With this level of market maturation, multiple segments have developed within the primary flash array space. There are systems targeted for dedicated application deployment, there are systems specifically for web-scale applications, and there are systems intended for dense mixed workload consolidation. These latter systems are driving most of the AFA revenue, and they aspire to become the primary storage platforms of record for enterprises of all sizes. This study evaluates the suitability of 10 vendors' AFA platforms for dense mixed ent
Tags : 
    
Pure Storage
Published By: F5 Networks Inc     Published Date: Jan 25, 2018
With digital transformation reshaping the modern enterprise, applications represent a new class of assets and an important source of differentiation. The ever-more-competitive digital economy requires that your applications be delivered with unprecedented speed, scale, and agility, which is why more and more organizations are turning to the cloud. This explosive growth of apps hosted in the cloud creates a world of opportunities—and a whole new set of challenges for organizations that must now deploy and manage a vast portfolio of applications in multi-cloud environments. Automation and orchestration systems can help streamline and standardize IT processes across traditional data centers, private clouds, and public clouds. But with rapid innovation come concerns about security and delivering a consistent experience across environments.
Tags : 
application delivery, digital transformation, cloud technology, application, multi-cloud enviornment
    
F5 Networks Inc
Published By: Datastax     Published Date: May 14, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Red Hat     Published Date: Jan 02, 2018
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications.
Tags : 
    
Red Hat
Published By: SpyCloud     Published Date: Mar 30, 2018
Because of widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative business for cybercriminals. Organized crime rings are performing ATO attacks at a massive scale by leveraging botnet-infected armies to attempt credential-stuffing attacks against various web and mobile applications. Cyber criminals exploit compromised accounts for financial gain by pilfering financial or personally identifiable information (PII) directly or by selling access to these accounts on underground markets. Download our report to understand: The Underground economy driving these attacks The tools criminals are using to automate ATO Remediation Strategies to prevent ATO in your organization
Tags : 
    
SpyCloud
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Sage     Published Date: Mar 07, 2018
There comes a time in a company’s growth when applications that used to work well can no longer keep up with complexities of scale. This white paper describes 3 warning signs that indicate your disconnected financial applications are holding you back. Also, learn how migrating to a unified cloud solution can improve financial forecasts, enable you to act on more accurate information, increase productivity, and more. Don’t make this mistake. In this eBook, we explain the three warning signs you must watch out for if you want to know when it’s time to move your important customer and financial information to the cloud. Then we’ll show you exactly what managing your most important information with a cloud-based accounting solution means for you and your business. Download it today.
Tags : 
    
Sage
Published By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
    
Citrix
Start   Previous   1 2 3 4    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com