• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

architectures

Results 301 - 325 of 325Sort Results By: Published Date | Title | Company Name
By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile, sybase, wireless, network architecture, mobile data systems, mobile workers, wireless application software, wireless infrastructure
    
Sybase
By: Quocirca     Published Date: Dec 04, 2006
Service Oriented Architectures (SOAs) will provide greater flexibility for those utilizing them, but will also bring greater issues for data and functional connectivity.  This paper contrasts and compares the capabilities of a point-to-point and an enterprise service bus approach.
Tags : 
soa, connectivity, service-oriented architecture, service oriented architecture, data management, enterprise, quocirca, it management, knowledge management, web service management, collaboration
    
Quocirca
By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking, security, wireless, bluetooth, gps
    
Quocirca
By: WiChorus     Published Date: Oct 12, 2007
Wireless technologies are migrating from complex hierarchical voice-oriented architectures to flatter, low latency, all-IP based designs – reducing cost and complexity for service providers while efficiently supporting real time IP services. Coupled with this trend is the migration to higher performance OFDMA air links with MIMO and AAS, providing much greater bandwidth with improved interference characteristics.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus, wireless, wifi, wireless communications, wireless infrastructure, wireless service providers
    
WiChorus
By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : 
soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance, ejb, user interface, infrastructure, return on investment, service oriented architecture, web service management
    
Oracle Corp.
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
By: BMC Control M     Published Date: Jul 22, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : 
wla, ema, bmc control-m, soa
    
BMC Control M
By: Focus     Published Date: Aug 04, 2011
Download this white paper, sponsored by Juniper Networks, to read an interview with IDC's Vice President of Enterprise Communications and Datacenter Networks about the future of network architectures.
Tags : 
data center, data center design, information technology, juniper, networking, traffic spikes, virtualization, infrastructure, network architecture, data center design and management
    
Focus
By: IBM     Published Date: Jul 25, 2012
IBM PureSystems offers highly integrated solutions that can help you deploy and tune applications for cloud architectures with ease. Read the research report to take a deeper look at PureFlex Systems within the PureSystems family and learn how PureFlex Systems can help you streamline management and accelerate client time-to-value with a new integrated and modular system/subsystem.
Tags : 
technology, cloud computing, cloud architecture, storage, management, storage management, ibm puresystems, ibm, storage virtualization
    
IBM
By: Riverbed     Published Date: Nov 08, 2012
Many enterprises are shifting from desktop applications to web and mobile apps, they have started a tidal wave of dynamic content that will overwhelm traditional architectures. A tidal wave of dynamic web content is coming - how will you respond?
Tags : 
web content management, real time information, mobile apps, web content optimization, content integration, content management system
    
Riverbed
By: CDW     Published Date: Sep 10, 2014
Leading organizations dont think of data protection in traditional back-office termsand thats no accident. They think and act like service providers, and in doing so transform data protection operations from mere cost centers to business enablers. Traditional data protection architectures cant meet todays challenges of massive growth, application performance, and data availability. And they aren't designed for services-oriented business models.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW
By: Sponsored by HP and Intel Xeon processors     Published Date: Feb 19, 2013
In this paper, Evaluator Group highlights the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components with a particular focus on the important role that storage plays and more.
Tags : 
evolving datacenter architecture, technologies, cloud ready it, it management, data management
    
Sponsored by HP and Intel Xeon processors
By: Cisco     Published Date: Sep 16, 2015
Modern manufacturers are adopting new plant architectures that enable a portfolio of enhanced and new capabilities.
Tags : 
manufacturing, architectures, supply chain, responsiveness, application integration, business intelligence
    
Cisco
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : 
clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla, ha cluster, high availability, load balancer, mission-critical transfers, active/passive, edi, it management, content management system, information management, secure content management
    
Globalscape
By: VMware AirWatch     Published Date: Oct 02, 2015
Les postes de travail et applications Windows sont des lments vitaux pour lentreprise encore aujourdhui, malgr ladoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail nont pas su voluer au fil des ans. Lheure de la transformation du poste de travail a sonn.
Tags : 
byod, emm, mobility, mobile computing, mobile data systems, mobile workers, enterprise software
    
VMware AirWatch
By: Avi Networks     Published Date: May 10, 2019
Modern data centers run a combination of cloud-native applications and microservices architectures alongside traditional applications. Networking teams are under pressure to deliver services and resolve application issues quickly while lowering costs for application services. Your IT operations demand agile, cost-effective load balancing solutions.
Tags : 
    
Avi Networks
By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamais Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
By: Lenovo and Nutanix     Published Date: Oct 17, 2016
Software-defined infrastructure is no longer the future. It is now. In this hyperconvergence overview, we provide a quick overview of what hyperconvergence is and how data center architectures benefit. You will also see some systems, software examples, and recommendations to get you on your way!
Tags : 
hyperconvergence, it infrastructure, storage computing, network storage, data efficiency
    
Lenovo and Nutanix
By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
By: Juniper Networks     Published Date: Jun 22, 2017
Junipers security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Junipers security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as they do not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
By: Dell EMC Storage     Published Date: Nov 28, 2018
As enterprises undergo digital transformation, storage infrastructure modernization is a key focus. With new storage technologies and architectures available, CIOs have more opportunity than ever to match storage platforms with workload requirements and consolidate workloads where appropriate. This white paper focuses on evolving storage requirements in the midrange market, as enterprises look to improve efficiencies in how they handle enterprise workloads. It also discusses key midrange enterprise storage capabilities CIOs should consider as they modernize infrastructure.
Tags : 
    
Dell EMC Storage
By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence, automation, Internet of Things, blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The outside-in digital transformation of the past decade is giving way to the inside-out potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise.
Tags : 
    
Group M_IBM Q2'19
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter