Architecture LayerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Architecture Layer returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Service Oriented Architecture (SOA)
 •   Enterprise Systems Management
 •   Data Center Management
 •   Network Security
 •   Application Security
 •   Application Integration
 •   Wireless Security
 •   Network Management
 •   Security Policies

Related Searches
 •   Architecture Delivery
 •   Architecture Disk
 •   Architecture Layer Distribution
 •   Architecture Layer Hardware
 •   Architecture Layer New York
 •   Net Based Architecture Layer
 •   On-Line Architecture
 •   Proposals Architecture Layer
 •   Sheet Architecture
 •   Statement Architecture Layer
Advertisement

ALL RESULTS
1 - 25 of 433 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

The Foundation of High-Value Business Intelligence: A Description of the WebFOCUS 7.1 Architecture by Information Builders

June 2006 - (Free Research)
Good architecture for information systems is as important as good engineering is for automobiles and with good architecture, applications can be scaled up with less hardware. 
(WHITE PAPER) READ ABSTRACT |

Design, Deploy, and Manage a DDoS Protection Architecture by F5 Networks

November 2013 - (Free Research)
An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS. 
(WHITE PAPER) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

When Availability Matters: Change Control for SaaS Providers by Tenzing Managed IT Services

December 2010 - (Free Research)
This paper examines that to build an effective change management framework and achieve high availability numbers for an SaaS application requires maturing IT processes along established best practices and investing in quality change management tools. 
(WHITE PAPER) READ ABSTRACT |

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges by F5 Networks

August 2007 - (Free Research)
Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey. 
(WHITE PAPER) READ ABSTRACT |

Billing System Perspective: Convergence in Telecommunication by Comarch Telecommunications

June 2008 - (Free Research)
To achieve all modern telecommunication requirements it was necessary to change service delivery architectures as well as billing systems architectures. This paper examines the a billing solution that delivers on all of today's service providers needs. 
(WHITE PAPER) READ ABSTRACT |

Database Middleware: Struggling with Performance? by Progress DataDirect

February 2011 - (Free Research)
Drivers are an important component of database middleware, but they don’t work in isolation. They’re part of a multi-layered architecture that handles the communication between a database application and the database management software. Learn how these layers influence performance and how to optimize efficiency for data requests and responses. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Lowering the Cost of Manufacturing Test by National Instruments

May 2001 - (Free Research)
NI platform offers high test throughput, increased productivity, and a lower cost of ownership than traditional disjoint systems or turnkey solutions based on proprietary architectures. 
(WHITE PAPER)

Layered Tech expands to new markets and improves ROI with CA 3Tera AppLogic by CA Technologies.

March 2011 - (Free Research)
This case study explains how Layered Tech’s implementation of CA 3Tera AppLogic helped it improve ROI and enabled Layered Tech to service a new market of premium customers without increasing costs. 
(CASE STUDY) READ ABSTRACT |

Application Brief: Virtual Firewall and Secure Access Gateway by Vyatta Inc.

April 2011 - (Free Research)
Vyatta delivers the only multi-layer virtual network security solution that maintains compliance and enables instant migration of complex, layered firewall architectures from the physical network into any virtual data center, without compromises. 
(APPLICATION NOTE) READ ABSTRACT |

Data Abstraction Best Practices by Composite Software

March 2011 - (Free Research)
Data abstraction overcomes data structure incompatibility by transforming data from its native structure and syntax into reusable views and data services. But some data abstraction approaches work better than others. Composite data virtualization is an optimal way to implement an abstraction layer at enterprise scale. 
(WHITE PAPER) READ ABSTRACT |

eBook: Oracle Application Integration and SOA - In the Customer's Words by Oracle Corporation UK Ltd

October 2012 - (Free Research)
Read this e-book to hear exclusively from Oracle SOA Suite customers about how the platform is helping them improve agility, lower TCO, increase performance and scalability, speed time to market, justify the ROI of SOA, and more. 
(EBOOK) READ ABSTRACT |

Secure Cloud Access Reference Architecture & Use Model by Intel

March 2011 - (Free Research)
This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection). 
(WEBCAST) READ ABSTRACT |

Enterprise API Management: Reference Architectures For Delivering Enterprise APIs for Web & Mobile by Vordel now part of Axway

July 2012 - (Free Research)
Read this white paper to learn about the various drivers of application program interface (API) management and find three recommendations for reference architectures that fit the most common API use cases. 
(WHITE PAPER) READ ABSTRACT |

CW+ Open Group: Supporting requirements management in TOGAF by ComputerWeekly.com

October 2010 - (Free Research)
This White Paper discusses methodology and language support for requirements management in TOGAF. 
(WHITE PAPER) READ ABSTRACT |

Intel Cloud Builders Reference Architecture: Trusted Compute Pools with Parallels by Intel

December 2011 - (Free Research)
Establishing a trusted platform on the physical server layer of a cloud environment can be very challenging, but it’s not impossible. This brief video discusses how trusted computing pools can allow you to manage your cloud more efficiently and more securely. 
(VIDEOCAST)

XML Threat Model for REST, SOA and Web 2.0 by Intel

September 2011 - (Free Research)
This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL]. 
(WHITE PAPER) READ ABSTRACT |

Common Models in SOA: Tackling the Data Integration Problem by Progress

December 2008 - (Free Research)
You're probably familiar with the use of common formats in integration. These common representations, or in some cases mutually agreed upon formats, are often found in B2B transactions. To see how a common model can simplify SOA development, let's examine the standards at the foundation of SOA and ESB to understand what they include and... 
(WHITE PAPER) READ ABSTRACT |

Extending SDN Architectures with F5’s L4–7 Application and Gateway Services by F5 Networks

November 2013 - (Free Research)
This exclusive resource discusses a solution that can help you to deliver applications using SDN architectures that are both directly programmable and that can be programmatically configured with open APIs. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – July/August 2013 by SearchSecurity.com

August 2013 - (Free Research)
This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management. 
(EZINE) READ ABSTRACT |

PCI-Compliant Cloud Reference Architecture by HyTrust

March 2011 - (Free Research)
This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Best of Breed Virtualization Scenarios and Hyper-V Features by Dell and Microsoft

November 2010 - (Free Research)
In this transcript, senior enterprise IT architect Nelson Ruest breaks down the seven different layers of the server virtualization architecture, and explains the role the hypervisor plays in the success of that infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Best of Breed Virtualization Scenarios and Hyper-V Features by Dell and Microsoft

March 2009 - (Free Research)
In this transcript, senior enterprise IT architect Nelson Ruest breaks down the seven different layers of the server virtualization architecture, and explains the role the hypervisor plays in the success of that infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Semantic Dialogues by Progress

August 2009 - (Free Research)
The Semantic Dialogues tells the story of how National Networks, a fictional telecommunications service provider, pursued and achieved data interoperability within their SOA. 
(EBOOK) READ ABSTRACT |

1 - 25 of 433 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts