enterprise application

Results 1 - 25 of 1010Sort Results By: Published Date | Title | Company Name
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
How Fiber Powers Growth – An Expert Q&A Guide provided by Spectrum Enterprise. Businesses today need bandwidth capacity to handle complex applications and ever-increasing data. See how technology experts rely on fiber to increase productivity and provide stronger growth opportunities.
Tags : 
    
Spectrum Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
Now there's an innovative new way to move enterprise applications to the public cloud while actually reducing risks and trade-offs. It's called multi-cloud storage, and it's an insanely simple, reliable, secure way to deploy your enterprise apps in the cloud and also move them between clouds and on-premises infrastructure, with no vendor lock-in. Multi-cloud storage allows you to simplify your infrastructure, meet your service-level agreements, and save a bundle.
Tags : 
hpe, multicloud, storage, private cloud, public cloud, digital
    
Hewlett Packard Enterprise
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Transforming IT to meet the emerging requirements of a rapidly advancing digital economy is a priority for most companies today. Market economies and quickly evolving digital interactions are driving new and increasing demands on IT infrastructure for organizations of all kinds – from small businesses to enterprises to public institutions. IT requirements to support a variety of digital use paradigms (personal devices, IoT, VMs, VDI) are changing quickly, and organizations need to respond in order to be competitive in this evolving digital world. The latest generation of PowerEdge servers powered by Intel® Xeon® Platinum processors can deliver differentiated business agility over older-generation infrastructure. IDC asserted that updating servers can help businesses deploy applications up to 22 percent faster and improve application performance up to 29 percent over outdated infrastructure. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Transforming IT to meet the emerging requirements of a rapidly advancing digital economy is a priority for most companies today. Market economies and quickly evolving digital interactions are driving new and increasing demands on IT infrastructure for organizations of all kinds – from small businesses to enterprises to public institutions. IT requirements to support a variety of digital use paradigms (personal devices, IoT, VMs, VDI) are changing quickly, and organizations need to respond in order to be competitive in this evolving digital world. The latest generation of PowerEdge servers powered by Intel® Xeon® Platinum processors can deliver differentiated business agility over older-generation infrastructure. IDC asserted that updating servers can help businesses deploy applications up to 22 percent faster and improve application performance up to 29 percent over outdated infrastructure. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: Avi Networks     Published Date: Mar 07, 2018
A new ZK Research study reveals significant shifts in application delivery practices as enterprises are automating or adopting cloud-native applications. In the process of modernizing their infrastructure, enterprises are addressing on-demand scalability requirements, improving management, and lowering costs. This study discusses: - Enterprise preferences for their next load balancers - Capabilities that are most sought after by network teams - How businesses are preparing for hybrid and multi-cloud environments Download Legacy Hardware-Based ADCs: Are Companies Holding Back?
Tags : 
    
Avi Networks
Published By: Workday     Published Date: Jan 16, 2018
Most enterprise software systems rely on legacy architectures that can’t keep pace with the transactional and analytical demands of modern organizations. Workday applications, by contrast, are built using modern techniques and technologies that deliver a fast, highly insightful, contextual, and actionable experience. In this video, Petros Dermetzis, Workday executive vice president of development, provides a comprehensive overview of Workday’s innovative technologies. With a little history about the evolution of enterprise architectures thrown in, Dermetzis explains how Workday, by using object technology and in-memory technology, delivers applications that help organizations make smarter decisions based on real-time data.
Tags : 
evp, development, technology, workday, innovation, applications
    
Workday
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Anaplan     Published Date: Mar 29, 2018
The concept of integrated business planning — closing gaps in an organization’s various planning functions and aligning operations and strategy with its financial performance — has existed in various forms for decades. What has changed is creation of planning platforms that can handle the fluidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
afp, ibp, business, organizations, enterprise, data, systems
    
Anaplan
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies
Published By: Pitney Bowes     Published Date: Apr 20, 2009
This Executive White Paper, sponsored by Pitney Bowes Marketing Solutions, a provider of web-based marketing automation solutions, examines the competitive advantages offered by marketing automation portals and the potential impact of these types of portals on marketing campaigns deployed in complex, rapidly evolving markets.
Tags : 
pitney bowes, automated portals, marketing solutions, web-based marketing, competitive advantage, portal, channel marketing, sustainable, enterprise marketing, crm systems, crm, roi, partner, secure online marketing, marketing funds management, dashboard, list management applications, urls, seo, turnkey
    
Pitney Bowes
Published By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : 
infrastructure, devops, agile, hpe, it transformation, enterprise
    
HPE APAC
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprises—but with fewer technical and budget resources to draw from. That’s why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Most enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago—through VPNs, proxies, and remote desktops—but new and growing realities are forcing enterprises to take a different path. Read this whitepaper to learn five reasons why enterprises need a new access model.
Tags : 
enterprise, remote access, vpn, proxies, model
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
These are no longer capitally strained organizations building an application on a one-off basis, with the cloud this is enterprise transition, this is enterprise applications being shifted to the cloud, new applications being developed in the cloud, and this requires a completely new way of building and consuming IT services for the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations? Oracle databases play a critical role in many enterprises. They’re the engines that drive critical online transaction (OLTP) and online analytical (OLAP) processing applications, the lifeblood of the business. These databases also create a unique challenge for IT leaders charged with improving productivity and driving new revenue opportunities while simultaneously reducing costs.
Tags : 
cost reduction, oracle database, it operation, online transaction, online analytics
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : 
commvault, snapshot management, replication, array based snapshots, data protection solutions, gui driven, intellisnap, no scripting, increase rpos, networking, security, storage
    
Commvault
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Productivity gains are related to the rapid adoption and optimization of applications and software. HP helps small and midsize businesses increase the productivity of their application investments through the use of the HP ProLiant Gen9 servers.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Mobility, social media, analytics and the cloud are revolutionizing how data is accessed, used, and secured for small to midsize businesses. With data security threats are on the rise, keep your business running with Hewlett Packard Enterprise.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.