ops

Results 126 - 150 of 885Sort Results By: Published Date | Title | Company Name
By: Prophix     Published Date: May 31, 2016
Prophix develops Corporate Performance Management (CPM) software that companies use primarily to manage processes in the finance department, streamlining budgeting, planning, financial reporting and consolidation, and scorecarding.
Tags : 
prophix, performance management, best practices, software development, business management
    
Prophix
By: Riverbed     Published Date: Jul 17, 2013
International Herald Tribune (IHT) needed to ensure that all of its journalists, regardless of their location, have network access 24x7 to meet their demanding editorial schedule. Read the case study to learn how IHT deployed Riverbed Cascade™ to gain insight into their WAN traffic and a true end-to-end view of the application delivery path from servers to desktops.
Tags : 
herald tribune, iht, network access, riverbed cascade, riverbed, cascade, wan traffic, wan
    
Riverbed
By: Puppet     Published Date: Mar 09, 2017
DevOps cuts deep and wide through industries, company sizes, and technology environments. Yet, DevOps is never done — it’s about continual learning and improvement rather than an end state. Puppet is here to help. We draw on the success stories and lessons learned at organizations that are already driving improved performance and better business outcomes with their DevOps initiatives. This handbook captures five essential phases for mapping out a DevOps journey: 1. Build the business case for DevOps. 2. Address the biggest challenges to DevOps success. 3. Develop a performance-driven team structure. 4. Choose the right Tools and processes. 5. Plan your key implementation phases.
Tags : 
    
Puppet
By: Puppet     Published Date: Mar 09, 2017
There’s a lot of misinformation about DevOps out there — causing some organizations to mistrust the benefits of DevOps practices. It’s time to debunk the common myths, and get on a path to collaborating more effectively and delivering better software, faster. Download the ebook to disprove these common DevOps myths: • Myth 1: There’s no direct customer/business value for adopting DevOps. • Myth 2: There’s no significant ROI in applying DevOps to legacy apps. • Myth 3: There’s not enough time to implement DevOps. • And more!
Tags : 
    
Puppet
By: Puppet     Published Date: Mar 13, 2017
Have you started moving to the cloud? Nearly 70 percent of organizations have at least one application living in the cloud already, and cloud adoption is growing fast. That's because organizations recognize the cloud is a great way to make IT more agile and helpful to the business. Download Cloud-Scale Automation with Puppet, and learn how you can ease the transition to cloud, gaining the agility your organization needs without adding hours of management time or unnecessary risk. You really can use cloud infrastructure as easily as you use on-prem, and keep it as secure as on-prem, too. You’ll learn how to: • Automate your cloud resources and manage infrastructure at scale. • Get started with Puppet on both Linux and Windows machines. • Make Puppet the foundation of your DevOps efforts, regardless of where you choose to deploy.
Tags : 
    
Puppet
By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
    
Tenable
By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
By: Juniper Networks     Published Date: Oct 19, 2015
Datacenters are the factories of the Internet age, just like warehouses, assembly lines, and machine shops were for the industrial age. Over the course of the past several years, riding the wave of modernization, datacenters have become the heart and soul of the financial industry, which each year invests over $480 billion in datacenter infrastructure of hardware, software, networks, and security and services.
Tags : 
juniper, datacenter, threat, ciso, enterprise, data, customer
    
Juniper Networks
By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
By: Skillsoft     Published Date: Apr 23, 2015
This paper explains how embedding 7 key skills within your IT team can keep your organisation’s data safe and its employees productive. From data storage and security to database design and management, these key skills will ensure that your business is able to make the most of new technology as it develops.
Tags : 
fundamental it skills, it staff development, professional it development, skillsoft
    
Skillsoft
By: Skillsoft     Published Date: Apr 23, 2015
In this paper, Judith Leary-Joyce explains why it is important to always be on the lookout for new talent, while also building existing employees’ CVs. From recruitment to development to retention and succession planning, Judith explains just how important learning is to every stage of the talent management lifecycle. So get reading quickly because the talent pipeline never stops moving.
Tags : 
talent recruitment and development, talent management lifecycle, retention of employees, skillsoft
    
Skillsoft
By: IBM APAC     Published Date: Aug 22, 2017
Today’s enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: • Apple iOS and Apple macOS • Google Android • Microsoft Windows
Tags : 
user based context, id management, integration, azure ad, application catalogs, portal, end user store, saas
    
IBM APAC
By: IBM APAC     Published Date: Aug 22, 2017
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
actionable insights, contextual analytics, applications, content, data, identity, threats, connectivity
    
IBM APAC
By: CA Technologies     Published Date: Mar 21, 2014
This study of 1,300 senior IT decision-makers worldwide proves IT leaders recognize they must change how their organizations work to accelerate time to market, improve software quality, speed application development and meet growing customer demand.
Tags : 
devops, software, it automation, visualization, application
    
CA Technologies
By: DellEMC and Intel®     Published Date: Sep 20, 2017
Datenbanken sind oft die treibende Kraft hinter der erfolgskritischen Arbeit von Unternehmen. Sie bilden die Grundlage für Onlineshops, die Speicherung vertraulicher Daten und Kundenmanagementsysteme. Eine Lösung, die umfangreiche Datenbank-Workloads meistert, kann deshalb ein großer Vorteil sein, wenn Unternehmen wachsen. Intel Inside®. Neue Möglichkeiten Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside
    
DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 20, 2017
Datenbanken sind oft die treibende Kraft hinter der erfolgskritischen Arbeit von Unternehmen. Sie bilden die Grundlage für Onlineshops, die Speicherung vertraulicher Daten und Kundenmanagementsysteme. Eine Lösung, die umfangreiche Datenbank-Workloads meistert, kann deshalb ein großer Vorteil sein, wenn Unternehmen wachsen. Intel Inside®. Neue Möglichkeiten Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside
    
DellEMC and  Intel®
By: Dell and VMWare     Published Date: Oct 26, 2017
Datenbanken sind oft die treibende Kraft hinter der erfolgskritischen Arbeit von Unternehmen. Sie bilden die Grundlage für Onlineshops, die Speicherung vertraulicher Daten und Kundenmanagementsysteme. Eine Lösung, die umfangreiche Datenbank-Workloads meistert, kann deshalb ein großer Vorteil sein, wenn Unternehmen wachsen.
Tags : 
    
Dell and VMWare
By: Dell and VMWare     Published Date: Oct 26, 2017
Datenbanken sind oft die treibende Kraft hinter der erfolgskritischen Arbeit von Unternehmen. Sie bilden die Grundlage für Onlineshops, die Speicherung vertraulicher Daten und Kundenmanagementsysteme. Eine Lösung, die umfangreiche Datenbank-Workloads meistert, kann deshalb ein großer Vorteil sein, wenn Unternehmen wachsen.
Tags : 
    
Dell and VMWare
By: Dell and Nutanix     Published Date: Oct 26, 2017
Datenbanken sind oft die treibende Kraft hinter der erfolgskritischen Arbeit von Unternehmen. Sie bilden die Grundlage für Onlineshops, die Speicherung vertraulicher Daten und Kundenmanagementsysteme. Eine Lösung, die umfangreiche Datenbank-Workloads meistert, kann deshalb ein großer Vorteil sein, wenn Unternehmen wachsen.
Tags : 
    
Dell and Nutanix
By: Dell and Nutanix     Published Date: Oct 26, 2017
Datenbanken sind oft die treibende Kraft hinter der erfolgskritischen Arbeit von Unternehmen. Sie bilden die Grundlage für Onlineshops, die Speicherung vertraulicher Daten und Kundenmanagementsysteme. Eine Lösung, die umfangreiche Datenbank-Workloads meistert, kann deshalb ein großer Vorteil sein, wenn Unternehmen wachsen.
Tags : 
    
Dell and Nutanix
By: Dell PC Lifecycle     Published Date: May 18, 2018
Enterprise PC Buying Patterns Are Changing As Buyers Look To Improve Both Security And The Employee Experience At Once As employee mobility increases globally and enterprise investments shift to tablets and laptops, organizations are assessing their ongoing investment in traditional PCs. One thing that remains clear is that enterprise PC buyers still value the security and performance offered by fixed computing solutions. They also say that new form factors like the micro PC help them deliver a better experience to employees, which they value at least as much as security.
Tags : 
    
Dell PC Lifecycle
By: Citrix Online     Published Date: Feb 24, 2011
Last chance to register: learn how to get your desktop virtualization started at at a special eventonline broadcast.
Tags : 
citrix, live event, virtual desktop, desktop virtualization, mobile device, best practice
    
Citrix Online
By: Dell Storage     Published Date: Aug 21, 2012
Newest generation of processors delivers up to 2X FLOPS1 and boosts real-world application performance up to 70 percent2.
Tags : 
dell, intel, xeon, processor e5
    
Dell Storage
By: New Relic     Published Date: Oct 16, 2015
How to measure and track the 5 critical drivers of DevOps success.
Tags : 
    
New Relic
By: Dynatrace     Published Date: Dec 16, 2015
DevOps 1.0 was a great way to get people thinking about the necessary transformation we learned from lean manufacturing in the ‘80s. Now it’s time to evolve to DevOps 2.0
Tags : 
dynatrace, application development, devops, operations
    
Dynatrace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.