"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cases

Results 76 - 100 of 487Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Aug 26, 2016
The technical and financial advantages of solid state drives are driving a rapid transition from hard disk-drive (HDD) and hybrid-flash array (HFA) storage systems to all-flash arrays (AFAs). The white paper identifies some of the key considerations for evaluating all-flash storage infrastructure for three major uses cases: standalone applications, virtualized applications, and next-generation cloud services.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetIQ     Published Date: Jun 11, 2012
Learn about SIEM and Log Management use cases, differences, best practices and common mistakes. Receive Your Complimentary White Paper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications, access control, application security, business continuity, virtualization, infrastructure
    
NetIQ
Published By: WebiMax     Published Date: Oct 29, 2014
In most use cases involving flash storage deployments, the business environment changes, driving a need for higher-performance storage. However, the case of Epic Systems Corporation software is the opposite—the storage requirements haven’t changed recently, but the options for addressing them have. Epic, a privately-held company founded in 1979 and based in Verona,Wisconsin, makes applications for medical groups, hospitals and other healthcare organizations. Epic software typically exhibits high frequency,random storage accesses with stringent latency requirements. IBM has been working with Epic to develop host-side and storage-side solutions to meet these requirements. Extensive testing has demonstrated that the combination of IBM® POWER8™ servers and IBM FlashSystem™ storage more than meets the performance levels Epic recommends for the backend storage supporting its software implementations—at a cost point multiple times lower than other storage alternatives.
Tags : 
webimax, ibm, flashsystem storage, epic systems corporation, epic requirements, performance levels, it management, storage
    
WebiMax
Published By: Dell EMC     Published Date: Nov 02, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : 
emc, afa, enterprise, hdd, array, storage, data center
    
Dell EMC
Published By: BMC Software     Published Date: Jul 22, 2015
Watch this on-demand webinar to see how BMC TrueSight IT Data Analytics speeds the time to understand and resolve issues as well as other practical use cases.
Tags : 
data analytics, bmc truesight it data analytics, practical use, manual log analysis, monitoring, log data
    
BMC Software
Published By: JBoss Developer     Published Date: Feb 05, 2016
As Oracle Java Composite Application Platform Suite (CAPS) nears the end of its life cycle, healthcare organizations are switching to Red Hat JBoss Fuse to prepare for future business needs. Red Hat JBoss Fuse represents existing use cases on a more flexible, standards-compliant platform. With over 100 different connectors, Red Hat JBoss Fuse offers extensive integration coverage to optimize data flow — both to internal users and to external healthcare partners — on-premise, on mobile devices, or in the cloud.
Tags : 
jboss, redhat, oracle, java, java composite application platform, fuse, integration, data optimization, data management, content integration, information management
    
JBoss Developer
Published By: Lenovo and Intel     Published Date: May 17, 2016
This white paper from IDC provides a key resource for detailing the use cases for Hyperconverged, offering an overview of the landscape and a deep-dive into the use case for NutanixTM + Lenovo as a leader in the marketplace. Start building your business case for hyperconverged today!
Tags : 
lenovo, nutanix, hyperconverge, idc
    
Lenovo and Intel
Published By: Red Hat     Published Date: Jun 23, 2016
CA Technologies, a software company servicing the majority of the Global Fortune 500, wanted to help its internal development teams get its world-class apps to market faster. By using OpenShift Enterprise by Red Hat, CA Technologies was able to provide a Platform-as-a-Service (PaaS) for its internal teams to more quickly build and deploy Software-as-a Service (SaaS) applications for its external customers. Development times dropped from months to weeks in most cases. In addition, the new system offers maximum scalability by automatically spinning up or spinning down servers based on user load.
Tags : 
technology, best practices, global fortune 500, development, productivity, database development, software outsourcing, software testing, web development
    
Red Hat
Published By: CA Technologies     Published Date: Aug 21, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Limelight Networks     Published Date: Feb 21, 2018
Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). In some cases, using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But how do you know if a multi-CDN strategy is right for your business? This free Guide will help!
Tags : 
    
Limelight Networks
Published By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
    
VMware
Published By: Cognizant     Published Date: Oct 23, 2018
Incorporating artificial intelligence into your business systems and processes is a journey unlike any other digital technology implementation. There is no utility AI. Every company must chart its own path to success. This white paper offers insights and recommendations to help organizations identify use cases, pilot and learn from them, and then repeat the process so AI becomes a key element in the organization’s continuous improvement.
Tags : 
cognizant, artificial intelligence
    
Cognizant
Published By: CA Technologies     Published Date: Aug 24, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: Riverbed     Published Date: May 24, 2012
The combination of Riverbed WAN optimization and web content optimization solutions ultimately have the same end goal of improving user performance, the techniques employed serve different use cases.
Tags : 
steelhead appliances, stingray aptimizer, microsoft sharepoint, wan, wbo, web content optimization, data center
    
Riverbed
Published By: IBM     Published Date: Oct 03, 2012
This white paper from IBM showcases five organizations that are strategically integrating emerging social software and tools with their existing investments and seeing measurable results in return on investment.
Tags : 
social business, ibm social software, global workforce, collaboration, social technology, online experience, web experience, content delivery, customer experience management
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, security management, mobile computing, wireless security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, security management, mobile computing, wireless security
    
CA Technologies
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Hewlett-Packard (HP) is unique in this EMA Radar in its ability to combine two threads – a single analytic overlay as embodied in its Service Health Analyzer (SHA) product, and a broader suite solution optimized for HP to participate in all three use cases here with maximum functional impact. This is not entirely a black-and-white situation, as SHA does leverage and currently largely depends on integration with HP Business Service Management 9.1, which is itself a suite. But SHA can assimilate other third-party sources, checks out brilliantly in early-phase deployments in terms of time-to-value and analytic power, and is the lead reason for HP’s strong Value Leader showing in technical performance management.
Tags : 
ema radar, performance analytics, apa, service health analyzer, analytical applications, business intelligence, data integration
    
HP - Enterprise
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
In this Magic Quadrant, Gartner examines the role of SSL VPNs in remote access and the state of the market. Read this report to learn how to evaluate the suitability of SSL VPNs in a range of remote-access use cases.
Tags : 
ssl vpn, virtual private networks, magic quadrant, remote access, virtualization, cloud computing
    
F5 Networks Inc
Published By: CA Technologies     Published Date: Jun 04, 2015
Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: Brocade     Published Date: May 02, 2016
By 2020, the Software-Defined Data Center will be a requirement for 75% of the Global 2000’ according to Gartner. But is the SDDC right for you? The key to success is to plan big but start small. This Gartner report will help you understand the value of SDDC, identify the best use cases, and mitigate deployment risks.
Tags : 
    
Brocade
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory