virtual architecture

Results 26 - 50 of 117Sort Results By: Published Date | Title | Company Name
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"
Tags : 
cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle, tomcat, java ee, virtualization, multiple platforms, platform-as-a-service, paas, developer productivity, maven, hudson, production support, production maintenance, cloud architecture
    
Red Hat, Inc.
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This ESG Lab Validation documents the hands-on testing of an HP VirtualSystem for Microsoft solution that leverages the Microsoft Private Cloud Fast Track reference architecture.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management
    
HP - Intel® Xeon® processors
Published By: Intel     Published Date: Aug 17, 2017
Communications service providers are looking for alternative deployment models that will help them support fast-growing network demand. Moving to a virtualized EPC (vEPC) solution can help service providers achieve more cost-e?ective scaling by using standard high-volume servers in place of purpose-built systems. System integrators, software vendors, and platform providers rely on Intel® technologies to deliver the performance and scalability required for vEPC solutions. Intel is also participating in the development of open standards, contributing to the open source community, developing reference architectures, engaging with industry participants, and collaborating on trials that can help facilitate the evolution to vEPC solutions and accelerate network transformation by use of network functions virtualization.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, “big data,” and “cloud,” to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: Aviatrix     Published Date: Jun 11, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Citrix NetScaler     Published Date: May 06, 2013
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience and maintaining the highest levels of employee productivity and customer satisfaction. The challenge of establishing an effective application visibility and control function is only growing, as trends such as mobility, virtualization, and cloud computing fundamentally alter datacenter and application architectures. With NetScaler Insight Center enterprises get: • Unparalleled application visibility and invaluable operational intelligence; • Increased operational efficiency, as troubleshooting and capacity planning efforts are greatly simplified; • An optimized user experience that drives greater employee productivity and customer satisfaction; • Increased assurance that governing SLAs will always be met; and, • Reduced total cost of ownership, based on having a low-cost, low-impact solution—particularly compared to traditional
Tags : 
application visibility, netscaler insight center, optimized user experience, low cost, citrix, knowledge management, enterprise applications
    
Citrix NetScaler
Published By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure™ and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen™, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isn’t effective against a given threat, another will step in to eliminate the threat.
Tags : 
    
Trend Micro
Published By: HP     Published Date: Jul 29, 2008
Join IDC and HP on this webcast about Mission Critical Services. Matt Healey of IDC provides insights on the adoption of consolidation, virtualization and Service Oriented Architecture as aggressive strategies to align IT more closely with business goals.
Tags : 
erp, mission critical, itsm, service management, soa, service-oriented, service oriented
    
HP
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: Burton Group     Published Date: Apr 08, 2008
Increasing power demands and space limitations in the data center have begun to transition server virtualization technologies from luxuries to necessities. Server virtualization provides a path toward server consolidation that results in significant power and space savings, while also offering high availability and system portability. Today, vendors are building hardware and software platforms that can deliver virtualization solutions at near-native performance.
Tags : 
burton group, virtual server, virtual machine, virtualization, server virtualization, virtual architecture, virtualization architecture, virtual
    
Burton Group
Published By: F5 Networks Inc     Published Date: Nov 03, 2009
How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI.
Tags : 
roi, application delivery controllers, virtualization, consolidation, ssl, server offload
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Mar 25, 2009
In this White Paper IDC sees the use of static x86 server configurations is quickly becoming an outdated concept with the introduction of modern solutions based on blade architectures, which can offer both intelligent configuration and management and the ability to perform physical-to-virtual migration to promote uptime and efficient resource usage. When combined with the quickly maturing x86 hypervisor technologies available from a variety of solution providers, the synergy of blade architectures and virtualization offers customers the ability to dramatically increase utilization of their server investments, boost uptime, provide a more resilient and available infrastructure, and roll out new infrastructure and services more quickly.
Tags : 
hp data center, virtualization, x86, hypervisor technologies, it infrastructure, blade architecture, basic virtualization, advanced virtualization, hp c-class bladesystem, unvirtualized, legacy rehosting, virtualized deployment, it benchmarks, total cost of ownership, tco, scalability, cost reductions, system management, it management
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization, data recovery, trojans, worms, viruses, highly available systems, disk staging, failover, replication, server architecture, mainframe technology, hardware abstraction, encapsulation
    
VMware
Published By: Aternity     Published Date: Oct 31, 2012
Download a new whitepaper today to learn how to gain the comprehensive visibility into monitoring Citrix XenDesktops from the end user perspective. You'll read about how other organizations are leveraging End User Experience Monitoring to measure.
Tags : 
citrix, end user experience, virtualization, xendesktops, it infrastructure, it architecture
    
Aternity
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
Layered Tech's engineers created a customized package of virtual private data centers (VPDCs), managed services and disaster recovery solutions that support KANA's clients, large and small. Layered Tech tailored the architecture to meet the highest enterprise security requirements, as well as ensuring that each KANA client can deploy applications that scale to ongoing volume fluctuations.
Tags : 
layered tech, kana, virtual private data center, enterprise security, vpdc, disaster recovery, customer interaction
    
Layered Tech, Inc.
Published By: Citrix Systems     Published Date: Oct 07, 2014
The rapid increases in computing power described by Moore’s Law offer theoretical advantages for IT organizations—but it’s market competition that translates those benefits into real value. As vendors battle for market share, costs are falling for every part of the desktop virtualization architecture. Meanwhile, desktop virtualization technology itself is advancing quickly, providing new ways to enable business mobility and enabling the flexibility that people and organizations need to thrive. This trend is a double win for customers—better solutions at a lower cost—and it’s making the benefits of a service-based approach to IT available to any organization.
Tags : 
value, cost, virtualization, desktop, computing, power, theoretical, advantage, organization, rapid, increase, solution, mobility, wireless
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 17, 2015
Citrix XenApp Outperforms VMware
Tags : 
application virtualization, platform, computing, architecture, productivity
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 17, 2015
Cost factors in every part of the desktop virtualization architecture.
Tags : 
desktop virtualization, app virtualization, flexibility, business mobility, virtualization
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2016
The growing strategic value of desktop virtualization is advancing quickly, providing new ways to enable business mobility and increase the flexibility. Learn how falling cost factors in every part of the desktop virtualization architecture making it more affordable than ever.
Tags : 
citrix, desktop virtualization, desktop architecture, business technology
    
Citrix Systems
Published By: Gridstore     Published Date: Jan 02, 2013
The storage industry is undergoing a transformation. It’s become clear that traditional stor-age architectures no longer suffice.
Tags : 
gridstore, grid architectures, monolithic clustered architectures, esg report, virtualization 2.0
    
Gridstore
Published By: McAfee     Published Date: Feb 06, 2013
The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively, and require a new generation of flexible security architectures.
Tags : 
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
    
McAfee
Published By: Nimble Storage     Published Date: Oct 28, 2013
Understanding the latest developments in storage technology is crucial when planning a virtual server storage architecture, and choosing the wrong storage architecture can dramatically impair your ability to provide application resources and recoverability. This best practices guide will show you how to lay the foundation for an efficient, easy-to-manage storage environment.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint, storage
    
Nimble Storage
Published By: VMware, Inc     Published Date: Dec 05, 2013
For this white paper, IDC performed an in-depth analysis of the business value of VMware View, defined as the expected ROI associated with the use of the solution as a platform for the targeted deployment of a virtual desktop infrastructure.
Tags : 
vmware, vmware view, idc, virtual desktop infrastructure, vdi, targeted deployment, roi, virtual desktop architecture, centralized virtual desktops, networking, security, it management, knowledge management, enterprise applications, storage, data management
    
VMware, Inc
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!