configuration

Results 1 - 25 of 484Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Nov 27, 2018
The world is moving at lightning speed from legacy enterprise software to SOA, SaaS integration, and APIs, compelled by the power of convention over configuration and the promise of agility and operational efficiency. Yet most businesses face a widening divergence between the IT infrastructure demanded by emerging business needs and the infrastructure they’ve built up over generations. The result? Many organizations find it difficult to modernize their legacy systems in a way that enables them to create an IT strategy that supports the quick adoption of newer technologies such as cloud, big data, IoT, and mobile. This is where APIs come in. Discover how to make legacy a competitive advantage: Leverage APIs and API-led connectivity to future-proof your IT infrastructure Expose legacy systems using Anypoint Platform in a straightforward way Connect legacy systems quickly, without disruption Build on a platform that can extend legacy to SaaS and APIs Learn how MuleSoft customers like S
Tags : 
    
MuleSoft
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"CrowdStrike® Falcon Discover™on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more. Watch our on-demand webinar. You’ll see how CrowdStrike Falcon Discover can help your security analysts implement more effective triage and response actions; set up strong baseline security policies for your team; and more. Along with these topics, the webinar covers: Learning about the shared responsibility model: Find out moreabout how this model helps everyone stay more secure and what steps you should take. Learning best practices for CrowdStrike Falcon Discover: Choose the right baseline configuration and environmental guidelines for your team."
Tags : 
    
AWS - ROI DNA
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
    
Akamai Technologies
Published By: Amazon Web Services     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
Amazon Web Services
Published By: ServiceNow     Published Date: Oct 22, 2018
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
cmdb, deployment, management, servicenow
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 22, 2018
Achieving complete visibility into your infrastructure requires reliable configuration data. With a solid plan, you can have a healthy CMDB and provide a foundation for implementing automated discovery. Learn the 4 stages to achieve complete visibility of your infrastructure with reliable data in your CMDB.
Tags : 
cmdb, servicenow, discovery, infrastructure, data, visibility
    
ServiceNow
Published By: Markforged     Published Date: Sep 14, 2018
Try Markforged's cloud-based 3D printing software today and see how you can turn your 3D CAD designs into high-strength, composite 3D printed parts for tooling and fixtures, functional prototyping, and custom, end-use production applications. After signing up here, you'll receive your activation email.
Tags : 
markforged, 3d printing, printing software, fiber, fiber configuration
    
Markforged
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Lenovo and Intel     Published Date: Sep 12, 2018
IT teams today are under pressure to build on-premises environments that mimic the agility and flexibility of public cloud services. It’s a challenge for IT teams to choose the right technology to invest in for servicing on-premises workloads. With high automation and minimal configuration or management, composable infrastructure fast tracks IT modernization by aligning IT delivery and operations, giving seamless access to dynamic, automated resources that can react in real-time.
Tags : 
    
Lenovo and Intel
Published By: IBM     Published Date: Sep 06, 2018
How BigFix can automate endpoint management to decrease security risk surfaces, manage configurational drift, and maintain compliance.
Tags : 
    
IBM
Published By: Lenovo and Intel     Published Date: Sep 04, 2018
IT teams today are under pressure to build on-premises environments that mimic the agility and flexibility of public cloud services. It’s a challenge for IT teams to choose the right technology to invest in for servicing on-premises workloads. With high automation and minimal configuration or management, composable infrastructure fast tracks IT modernization by aligning IT delivery and operations, giving seamless access to dynamic, automated resources that can react in real-time. In this white paper, learn how composable infrastructure, powered by the Intel® Xeon® Platinum processor, can deliver the cloud-level efficiency and flexibility required for competitive business differentiation.
Tags : 
    
Lenovo and Intel
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
6-Nines is a standard benefit of being our customer. That’s why this is a cost-nothing, do-nothing different guarantee. • Applicable on all models and configurations • Automatic on new arrays and on existing arrays with a support renewal • Guaranteed for as long as the product is supported HPE InfoSight monitors your uptime and if you experience less than 99.9999% availability, we’ll work with you to resolve the issue and provide support credit(s) at no cost
Tags : 
    
Hewlett Packard Enterprise
Published By: Datastax     Published Date: Aug 15, 2018
it’s crucial to make the right choices when setting up your DSE cloud infrastructure. But how can you know which instance types will give you the best cost-to-benefit ratio, both now and as your business grows? That’s where benchmarking helps. For our paper, we conducted DSE stress tests on an array of hardware configurations, and we simulated various real-world workflows, all to see which EC2 instance types deliver the best performance at the lowest costs.
Tags : 
    
Datastax
Published By: Alight Solutions     Published Date: Aug 09, 2018
Download this webinar to learn more about how to prepare for your company's upcoming Workday release! During this webinar, Alight's panel of Workday experts will focus on the steps we recommend you take during each phase of your testing schedule, highlighting specific considerations for: • Configuration, including a focus on Payroll and Financial Management • Integrations and reports • Test management
Tags : 
    
Alight Solutions
Published By: Dell     Published Date: Aug 08, 2018
: Both public and private organizations acknowledge that managing the PC life cycle becomes more complicated and expensive as the variety of PC devices and employee workstyles increase. In order to be fully productive, different groups of employees have different needs in terms of end-user device hardware, software, and configuration. Dell and Intel® commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by leveraging Intel® vPro and Dell’s ProDeploy Plus and ProSupport Plus services.
Tags : 
    
Dell
Published By: IBM     Published Date: Aug 08, 2018
An IBM Cloud configuration completed a big data analytics workload in less time and with greater throughput than an AWS solution
Tags : 
    
IBM
Published By: Datastax     Published Date: Aug 07, 2018
it’s crucial to make the right choices when setting up your DSE cloud infrastructure. But how can you know which instance types will give you the best cost-to-benefit ratio, both now and as your business grows? That’s where benchmarking helps. For our paper, we conducted DSE stress tests on an array of hardware configurations, and we simulated various real-world workflows, all to see which EC2 instance types deliver the best performance at the lowest costs.
Tags : 
    
Datastax
Published By: Alight Solutions     Published Date: Aug 01, 2018
Download this webinar to learn more about how to prepare for your company's upcoming Workday release! During this webinar, Alight's panel of Workday experts will focus on the steps we recommend you take during each phase of your testing schedule, highlighting specific considerations for: • Configuration, including a focus on Payroll and Financial Management • Integrations and reports • Test management
Tags : 
    
Alight Solutions
Published By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"The Enterprise Strategy Group put HPE SimpliVity hyperconverged infrastructure through its paces in a series of hands-on performance and stress tests simulating real-world configurations and load conditions. Read this report to learn how an HPE SimpliVity infrastructure: Ran nine workloads simultaneously, with an average response time across all applications of 3.9ms Showed little to no performance impact as a virtual controller, drive, and node were systematically failed on a two-node cluster."
Tags : 
hyperconverged, infrastructure, simplivity
    
Hewlett Packard Enterprise
Published By: Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
Cylance
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Application release automation (ARA) tools enable best practices in deploying and promoting applicationrelated artifacts, properties, configurations and even data across an application lifecycle in a safe, predictable and repeatable manner. Gartner reports that using an ARA tool is key to enabling DevOps and achieving continuous delivery. Wikipedia also defines five dimensions of scalability that can apply to ARA tools: • Administrative scalability • Functional scalability • Geographic scalability • Load scalability • Generational scalability This white paper will explain how each of these criteria is relevant when choosing an ARA product that is capable of scaling along with the growth of your enterprise.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Some SAP systems can take up to 10 days to complete a SAP system copy. That’s 10 days of unproductive time. Why? SAP does not provide the necessary tools out-of-the-box to automate and handle the process efficiently. This means you must use highly skilled SAP BASIS staff to manage the process. Manual steps, along with hundreds of configuration settings, can take days to complete—and like many organizations, you have also experienced too many delays, causing non-production systems to be unavailable, which stalls development, testing and training activities. Opportunity So you’ve concluded your SAP system copy process is hindering innovation and productivity. You’re considering automating the process to ensure system copies are available for all environments on time, every time. Benefits What are the key capabilities you actually need to address SAP system copy inefficiency once and for all?
Tags : 
    
CA Technologies_Business_Automation
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: CA Technologies EMEA     Published Date: May 24, 2018
L’outil de création d’API, CA Live API Creator, crée des back-ends applicatifs exposant des API REST/JSON à l’échelle de l’entreprise pour l’accès aux données et aux applications existantes. Cet outil permet aux développeurs de créer de nouvelles API REST rassemblant les données de différentes sources, par simple configuration. Ils peuvent étendre ces dernières en mettant en place des règles métier déclaratives, un traitement des événements via JavaScript et de la sécurité basée sur les rôles.Le modèle déclaratif de CA Live API Creator permet également de disposer de systèmes très évolutifs et fiables. Ses services optimisés sont plus efficaces et moins fragiles que les services codés manuellement par des développeurs et des architectes qualifiés
Tags : 
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.