All White Papers

Resources available: 1023

Case Study: Extending DR Protection for Apps W/O Fixed Costs/Fees

Find out how the city of Asheville, NC won the Global City on a Cloud Grand Prize from Amazon AWS for Best Practices by deploying CloudVelox for automated pilot light DR. Benefits included cost reduction, enhanced agility and protection for unprotected apps.

Pilot Light DR for Amazon Web Services

Pilot light disaster recovery is a perfect use case for the cloud. With cloud-based DR, companies avoid costly capital expenses and staffing costs are minimized as the responsibility for maintaining a dedicated disaster recovery site belongs to the cloud service provider. Monthly payments are based on the...

6TB Oracle Ecommerce Stack Deployed on AWS in 7 Days

A Fortune 1000 company was told that it would take more than 6 months to deploy their ecommerce stack on AWS. CloudVelocity deployed the stack in under 7 days. Use cases included agile DR and agile DevTest on IaaS.

The Network Administrator's Guide to Routers & Switches

Today's networks are facing trends like mobility, virtualization and cloud computing making today's network administrators rethink their router and switch designs. IT pros must not only choose the right products but understand current design trends, best practices and the top protocols to help make...

Top Network Optimization Projects for 2014

Network-related initiatives are on the rise, and for good reason. Network optimization delivers improvements across the entire organization -- regardless of size. In small- and medium-sized organizations, upgrade plans primarily focus on efforts to refresh or improve routers and switches, enabling IT shops...

Networking Trends in 2014

Planning for a smoothly operating network requires more than simply maintaining solid operational skills. Change in technology is constant. Whether it's within or outside the data center, it impacts the enterprise network. Five key areas to monitor include bring-your-own-device (BYOD) programs, network...

802.11ac Non-Disruptive Migration Strategies

Emerging 802.11ac standard promises a significant boost in performance to support ubiquitous mobility.

Surescripts Case Study- Securing Keys and Certificates

Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its healthcare customers, and automate and streamline their processes to reduce the risk of trust based attacks.

Ponemon 2014 SSH Security Vulnerability Report

Secure shell (SSH) keys are among the fundamental security controls enterprises rely on to protect data and ensure trust. According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations vulnerable to attacks.

Use the Mobile App Mix to Choose an Enterprise App Store Strategy

In this research report Gartner outlines how organizations can optimally secure, distribute, and manage mobile applications for employees and contracted workers. The report highlights how leading Mobile Application Management platforms deliver strong and rapid value in distributing public and custom apps to...

©1994-2014 Infoworld, Inc.