ComputerWeekly.com Research Library

Powered by Bitpipe.com

Amazon Web Services Research

  • Big Data in the Real World Using the Power of Amazon Redshift

    Sponsored by: Matillion

    In this webcast, learn the key benefits of moving to a cloud-based columnar database like Amazon Redshift. Explore the real-life implications of these benefits as well with a customer case study.

  • QSO New PI/Cloud Infrastructure Survey (AWS)

    Sponsored by: TechTarget

    Access an exclusive guide, Effective Approaches to AWS Cloud Monitoring, to explore key third-party vendors, what they offer, and how they can help you address issues that may be preventing your organization from getting the desired performance from AWS. Simply participate in our brief Cloud Infrastructure Research Program to claim your free copy!

  • Modern Infrastructure E-zine: Storage for a Containerized World

    Sponsored by: SearchDataCenter.com

    The hype around containers may have reached a fever pitch, but enterprise's weighing how many eggs to put in that basket should consider how well (or how poorly) containers meet their data storage needs before they take things any further. This exclusive issue of the Modern Infrastructure E-Zine takes a look at storage for a containerized world.

  • Infographic: Run Your S3 Apps Anytime & Anywhere

    Sponsored by: Cloudian

    This infographic highlights a software-defined, object-based hybrid cloud storage platform that is compatible with AWS's S3 applications. Access now to see how your data center can benefit from this cost-effective cloud storage solution.

  • Object Storage: S3 API Advanced Features

    Sponsored by: Cloudian

    In this article, learn how object storage vendors can successfully implement AWS's API features using techniques such as tiering, synchronous replication, deduplication, and compression. See how you can improve your data protection, management, and efficiency with a properly functioning API.

  • Object Storage: S3 API and Security

    Sponsored by: Cloudian

    This brief article dives into the security features of AWS's online object storage web service, focusing on controlling access to data. Read on and discover how the security features can support your complex application integrations and enable you to deliver value-add functionality that isn't directly included in AWS.

  • Object Storage: Standardizing on the S3 API

    Sponsored by: Cloudian

    This brief article highlights AWS's online object storage web service and its application programming interface (API). Read on to see how you can simplify your data storage and retrieval with this API.

  • Secure Data in the Cloud with AWS Identity and Access Management

    Sponsored by: Radiant Logic, Inc.

    Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.

  • Using Splunk to Manage AWS: Gaining Transparency into Cloud Computing

    Sponsored by: Splunk

    This webcast explores how FINRA, the Financial Industry Regulatory Authority, adopted a cloud services platform with an identity access management feature along with a data management platform to improve the security of their data. Watch now to find out how they were able to reduce costs of their infrastructure.

  • Autodesk Saves Time and CapEx Cost with Splunk on AWS

    Sponsored by: Splunk

    This case study details the benefits Autodesk saw when deploying its software using the Splunk operational intelligence platform on Amazon Web Services.

  • Copying Data from RDS into Amazon Redshift using Matillion ETL for Redshift

    Sponsored by: Matillion

    Access this resource to learn how Matillion ETL for Redshift can expediently ingest data from Amazon RDS, and get a first-hand experience with this tool by downloading a 14-day free trial.

  • Ensure You're Secure

    Sponsored by: SearchAWS

    Securing AWS requires a cooperative effort. Amazon will safeguard the infrastructure, but users need to be vigilant about protecting applications and data in the cloud.

  • Is Hyperconverged Cost-Competitive with the Cloud?

    Sponsored by: SimpliVity

    In this report, analysts disprove the assumption that cloud is the cheapest storage solution based on a TCO model comparing hyperconverged infrastructure and cloud solutions. Access now to uncover how hyperconverged can bring down your storage costs by simplifying the design process, lowering operating complexity, and more.

  • PaaS Landscape a Dense Jungle of Options

    Sponsored by: SearchCloudApplications

    PaaS development can give developers everything they need to test and deploy applications. The challenge is to choose the PaaS platform that offers the best fit.

  • Best Practices for Securing AWS Instances

    Sponsored by: CloudPassage

    In this webcast, security pros will explore the security challenges AWS computing presents and offer 7 best practices to secure your cloud environments faster. Watch now to learn more.

  • Successfully Integrating DevOps Teams Within Your Organization

    Sponsored by: evident.io

    Access this exclusive e-guide to discover expert recommendations for building a proactive DevOps team within your organization and how you can successfully integrate security with DevOps.

  • Best Practices to Protecting AWS Cloud Resources

    Sponsored by: evident.io

    Access this exclusive e-guide from the experts at SearchAWS.com to explore solutions that effectively secure apps and data in the AWS cloud. You'll also examine three network security measures that enterprises should follow when designing an AWS environment.

  • Best Practices for Securing Workloads in Amazon Web Services

    Sponsored by: evident.io

    Access this informative resource to explore best practices for securely deploying enterprise workloads in AWS. You'll also learn how these tips can apply to securing workloads in other IaaS strategies.

  • Continuous Security and Reliability in Iterative Development

    Sponsored by: evident.io

    Access this white paper to understand the new approaches to security required in a continuous deployment environment.

  • Cloud Security – The Unavoidable Topic

    Sponsored by: evident.io

    This white paper details a cloud infrastructure security platform for AWS. Read on to explore a SWOT analysis of this platform to learn the features and benefits it offers, as well as how it compares to other cloud security tools on the market.

  • Amazon Web Services: An Overview

    Sponsored by: Global Knowledge

    This white paper provides a good understanding of AWS, how it works, and how your company can get started. Read on to learn more.

  • How to Measure and Cut AWS Costs

    Sponsored by: SearchAWS

    This expert e-guide explores different cost management tools for Amazon Web Services (AWS) so that you can track, manage, and cut costs effectively.

  • The Best Plan to Avoid the Worst Outcome

    Sponsored by: SearchAWS

    A disaster recovery plan in AWS requires a close look at availability zones, load balancing, secondary sites and testing.

  • Your Role in AWS Security

    Sponsored by: SearchAWS

    This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.

  • Tapping into the Growing AWS Ecosystem

    Sponsored by: SearchAWS

    This expert handbook explores the various types of businesses that comprise the Amazon network of partners, including the differences between standard and advanced levels. Read on to learn about several cloud architects use of software development kits (SDKs) and examine the approaches a business might take when engaging an AWS integrator.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.