• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

public

Results 1 - 25 of 1103Sort Results By: Published Date | Title | Company Name
By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Anwendungsperformance und Bereitstellung haben sich geändert. Sollten Sie Ihr Netzwerk anpassen? Mit der Cloud ändert sich grundsätzlich die Art, wie IT-Teams Anwendungen bereitstellen und deren Performance managen. Anwendungen werden immer häufiger an Standorten fernab der Nutzer installiert. Bei der Übertragung werden häufig Netzwerke durchquert, die nicht direkt von der IT kontrolliert werden können. Statt in Unternehmensrechenzentren befinden sich viele Anwendungen nun in Public und Hybrid Clouds. Es gibt sogar eine ganz neue Art von Anwendungen: solche, die auf Microservices und Containern basieren.
Tags : 
    
Cisco and NVIDIA Corporation
By: Intel     Published Date: Nov 13, 2019
A modern network typically extends from the core data center out to the edge and across multiple public, private, and hybrid clouds. This reality is changing how networks are architected, deployed, and managed. Modern, future-ready networks must bring the scale, reliability, and efficiency associated with the cloud into the enterprise network. This can be done through server-based network virtualization and orchestrated virtual network functions (VNFs) that allow network infrastructures to deliver innovative services with efficiency and ease
Tags : 
    
Intel
By: Intel     Published Date: Nov 14, 2019
You can migrate live VMs between Intel processor-based servers but migration in a mixed CPU environment requires downtime and administrative hassle A study commissioned by Intel Corp. One of the greatest advantages of adopting a adopting a public, private, or hybrid cloud environment is being able to easily migrate the virtual machines that run your critical business applications—within the data center, across data centers, and between clouds. Routine hardware maintenance, data center expansion, server hardware upgrades, VM consolidation, and other events all require your IT staff to migrate VMs. For years, one powerful tool in your arsenal has been VMware vSphere® vMotion®, which can live migrate VMs from one host to another with zero downtime, provided the servers share the same underlying architecture. The EVC (Enhanced vMotion Compatibility) feature of vMotion makes it possible to live migrate virtual machines even between different generations of CPUs within a given architecture.
Tags : 
    
Intel
By: Google     Published Date: Nov 04, 2019
"Modernizing apps on the cloud isn’t an “all or nothing” decision. Businesses want the option to modernize on-premises or choose multi-cloud solutions that meet their needs. That’s why we created Anthos, a new solution which lets you run your applications, unmodified, on existing on-prem hardware investments or in the public cloud. So that you write once and deploy anywhere. Download “Application modernization and the decoupling of infrastructure, services and teams” to find out more."
Tags : 
cloud as a service, cloud computing, enterprise security, cloud infrastructure, cloud providers
    
Google
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
By: Alert Logic     Published Date: Nov 19, 2019
Every day, more organizations are adopting “cloud-first” strategies, shifting core business processes to public cloud systems and services. And though security concerns have been a barrier to digital transformation and cloud adoption in the past , it’s clear from the latest market projections—which see worldwide spending on public cloud services and infrastructure reaching US$210 billion in 2019 (up 23.8% over 2018) - companies migrating to the cloud from traditional environments are now prioritizing the benefits of the public cloud over any potential security risks to their business by understanding this new cloud security model and making strategic adjustments.
Tags : 
    
Alert Logic
By: Avetta     Published Date: Sep 17, 2019
In the beginning of 2019, a National Safety Council (NSC) study revealed that for the first time in US recorded history, the odds of dying from an opioid overdose (1:96) surpassed those of dying in an auto accident (1:103). As a result, opioid overdoses are now the number one cause of preventable injury deaths in the United States. The growing trend of opioid-related workplace incidents is a major concern for supply chains across the world. In fact, a recent study by Massachusetts Department of Public Health shows higher opioid overdose incidents occurring in industries that have a higher chance of worker-related injury. Among these, construction and manufacturing are the two industries most heavily affected. This whitepaper discusses tips for dealing with the opioid epidemic and gives clarity around OSHA drug testing regulations.
Tags : 
    
Avetta
By: IBM APAC     Published Date: Oct 04, 2019
Companies across the world are adopting a hybrid cloud environment as part of their digital transformation initiative. They need a platform that provides the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. IBM’s LinuxONE is an enterprise-grade Linux server with a unique architecture designed to meet the needs of a vast range of enterprise computing workloads within a multi-cloud environment. Here are just a few reasons why you should consider LinuxONE: • Differentiating your cloud services • Reduced costs • Security everywhere Download the e-book for more details.
Tags : 
    
IBM APAC
By: MicroStrategy     Published Date: Nov 08, 2019
The adoption of cloud BI and analytics is reaching a tipping point. According to the new report from Dresner Advisory Services, there are now more cloud-based deployment options than on-prem offerings available. To learn more about the rising tide of cloud BI, and how sentiment is changing around these offerings, read this new research report based on a 2019 market study. The report covers: A summary of the current cloud BI and analytics landscape An overview of changing user sentiment in the market How organizations are planning to deploy public, private, or hybrid cloud models Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy
By: MicroStrategy     Published Date: Nov 08, 2019
The adoption of cloud BI and analytics is reaching a tipping point. According to the new report from Dresner Advisory Services, there are now more cloud-based deployment options than on-prem offerings available. To learn more about the rising tide of cloud BI, and how sentiment is changing around these offerings, read this new research report based on a 2019 market study. The report covers: A summary of the current cloud BI and analytics landscape An overview of changing user sentiment in the market How organizations are planning to deploy public, private, or hybrid cloud models Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy
By: KPMG     Published Date: Jun 06, 2019
Cities need to rethink public transport systems to meet consumer demand for flexible, on-demand services. By doing this, they can also unclog congested roads, improve safety and reduce carbon emissions. Read this insight to discover: • how patterns of mobility are changing in major cities • what customers want – and the key challenges to meeting their expectations • whether microtransit solutions can be an effective complement to traditional public services • three key levers to pull to develop responsive, demand-driven services.
Tags : 
    
KPMG
By: KPMG     Published Date: Oct 04, 2019
Life is coming at us fast, so our thinking about policy solutions for the future needs to be bigger, bolder and much more imaginative. We have just launched the second edition of Reimagine public policy. 20 truly, disruptive and innovative ideas to help solve today’s policy challenges. Four of them are brand new for this year – Reimagine high streets, digital platforms for life-long learning, workforce and migration. The Reimagine ideas show how to: • Revitalise the Great British High Street • Remove the need for any family to choose between heating and eating • Match hirers and firers to give workers facing redundancy new skills
Tags : 
    
KPMG
By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
    
ttec
By: Masergy     Published Date: Nov 04, 2019
Driven by the need to save money, improve agility, and take rapid advantage of emerging technologies to improve internal collaboration and customer engagement, organizations are quickly adopting Unified Communications-as-a-Service (UCaaS) and Contact Center as a Service (CCaaS). UCaaS and CCaaS enable businesses to deliver a modern communications environment, without large capital investment, and in a manner that provides for rapid scaling, easy expansion into new sites and geographies, and deployment flexibility. Unfortunately, many enterprise networks are not optimized to deliver the performance and reliability required to support cloud-based applications, including UCaaS and CCaaS. As a result, IT leaders are rapidly adopting Software-Defined Wide-Area Network (SD-WAN) technologies. With SD-WAN’s ability to virtualize underlying network services and to build enterprise-grade WANs using both public (Internet) connectivity and private WAN connectivity, IT leaders can leverage it to su
Tags : 
    
Masergy
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This paper examines how cities are using cloud technology to address public challenges, using the framework of the global coalition, Smart Cities Council. This framework promotes three core values for smart cities: livability, providing clean, healthy living conditions without pollution and congestion; workability, providing an enabling infrastructure (energy, transportation, internet connectivity) and high-quality jobs; and sustainability, doing so at no cost to future generations, as the Council puts it. This paper proposes a fourth core value, inclusivity: provisioning services to all city residents regardless of their background.
Tags : 
    
Amazon Web Services APAC
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Government agencies often look to promote new technology for cost-savings and efficiency, but it does not stop there. The second and third-tier effects of technology can be long lasting for citizens, businesses, and economies. When public institutions adopt the cloud, they experience an internal transformation. Inside an organization, cloud usage drives greater accessibility of data and information sharing, increases worker productivity, and improves resource allocation. The external benefit of the cloud is recognized through a government’s ability to put reclaimed time and resources toward serving citizens. This includes provisioning public services, such as occupational-skills training, quicker and more effective service delivery, a pathway to a more productive workforce, and ultimately, a boost to local development. This whitepaper examines the enterprise-level benefits of the cloud, as well as the residual impact on economic development. The U.S. Economic Development Administration
Tags : 
    
Amazon Web Services APAC
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) provides rapid access to flexible and low-cost IT resources. With cloud computing, public sector organizations no longer need to make large upfront investments in hardware, or spend time and money on managing infrastructure. The goal of this whitepaper is to help you gain insight into some of the financial considerations of operating a cloud IT environment and learn how to maximize the overall value of your decision to adopt AWS.
Tags : 
    
Amazon Web Services APAC
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology.
Tags : 
    
Amazon Web Services APAC
By: Menlo Security     Published Date: Nov 11, 2019
"Internet Isolation Provides 100% Protection from Web-based Attacks without Changing the Native User Experience. The breach of 1.5 million patient records—including patient data for the prime minister—at SingHealth, Singapore’s largest group of healthcare institutions, has been called the most serious breach of personal data in the nation’s history. The breach was of great concern and created a chill of fear in many public and private organizations throughout the region and the world. If Singapore, one of the world’s most connected countries, as well as one of the world’s most cybersecure, could have a breach of this magnitude perpetrated against a national institution, why couldn’t this happen to any organization, anywhere? In This White Paper We Will Discuss: - What is the network separation concept? - Who uses network separation? - What is Isolation and how it can separation networks?"
Tags : 
    
Menlo Security
By: Menlo Security     Published Date: Nov 11, 2019
"The “detect and prevent” approach has reached its potential, and attackers have learned how to bypass this defense method. Verizon reports that 2018 was a record year, with 41,686 reported security incidents and 2,013 confirmed cybersecurity breaches. What’s more appalling is that studies have shown that 68 percent of breaches take months or longer to detect. Menlo Security’s Internet Isolation Platform enables the Zero Trust Internet, which takes the guesswork out of security by assuming that all Internet content and websites are malicious. Learn: - How companies are able to separate their enterprise network from the public web while still allowing employees to have seamless access to the Internet. - How you can warn employees that they are on a phishing site when they’ve fallen for a real phishing attack. - How you never have to worry about malware, viruses, or ransomware being downloaded."
Tags : 
    
Menlo Security
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter