Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

application environment

Results 126 - 150 of 381Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 21, 2017
Lured by opportunities to speed innovation, reduce costs and enhance agility, many business executives are opting to move their organization’s applications into public cloud environments. Whether or not organizations realize these advantages to the fullest extent possible will in part be dictated by the monitoring capabilities in place. This paper offers a detailed look at the monitoring challenges cloud environments can pose, and it examines the key approaches = organizations need to take to foster maximum service levels, efficiency and agility in the cloud.
Tags : 
    
CA Technologies
Published By: Polycom     Published Date: Aug 17, 2017
"Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. This guide describes the important collaboration features and benefits of Polycom voice solutions and explains how they can be used in different meeting environments. Want to know more? Download our guide! "
Tags : 
polycom, business phone, video conferencing
    
Polycom
Published By: Dell     Published Date: Aug 17, 2017
Today, technology is all about enabling business. Organizations of many types and sizes are developing, upgrading or replacing mobile applications to reflect changes in the workplace. Across industries, employees are working more while mobile, using multiple devices. When they return to the office, they are capitalizing on more flexible work environments and approaches to work. Many organizations are facilitating this anytime, anywhere work with mobility initiatives that provide mobile devices or allow employees to use their own. They are also modifying workspace designs, creating mobile workstations and mobile “hot spots” to enable workers to easily connect to enterprise systems when they return to the office. Enabling employees to work better can help organizations boost productivity and improve customer service. The real challenge is to continue supporting new ways of working, now and in the future, without compromising security.
Tags : 
security, workforce productivity, flexible work environments, secure employee systems, advanced
    
Dell
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
    
SecureAuth
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Jul 26, 2017
Extending DevOps to mainframe applications and teams is essential towards the agility and velocity that enterprises require to remain innovative in today’s turbulent digital business environment. Talking Points: • For enterprises with mainframes, trying to achieve the benefits of Digital Transformation without dealing with existing mainframe assets is a fool’s errand. • Breaking down silos and moving to DevOps is central to what it means to undergo Digital Transformation. • Including the mainframe in modern software development approaches can improve quality overall, reduce test cycles and deployment timeframes, and ensure mainframe-based applications support the end-to-end performance requirements that today’s customers demand.
Tags : 
    
CA Technologies
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Read this whitepaper by Forrester Research to gain perspective on the trends shaping development and operations strategies. Learn how progressive companies are handling application development and operations in a DevOps environment faster and at lower costs
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: IBM     Published Date: Jun 21, 2017
There are many types of databases and data analysis tools to choose from when building your application. Should you use a relational database? How about a key-value store? Maybe a document database? Is a graph database the right ft? What about polyglot persistence and the need for advanced analytics? If you feel a bit overwhelmed, don’t worry. This guide lays out the various database options and analytic solutions available to meet your app’s unique needs. You’ll see how data can move across databases and development languages, so you can work in your favorite environment without the friction and productivity loss of the past.
Tags : 
data analysis, key value, document database, analytics
    
IBM
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies
Published By: Datastax     Published Date: Apr 04, 2017
Enterprises today continue to differentiate themselves with cloud applications – any application that needs to be always-on, distributed, scalable, real-time, and contextual. With DataStax Enterprise, DataStax delivers comprehensive data management with a unique always-on architecture that accelerates the ability of enterprises, government agencies, and systems integrators to power the exploding number of cloud applications. DataStax Enterprise (DSE) powers these cloud applications that require data distribution across data centers and clouds, by using a secure, operationally simple platform. At its core, DSE offers the industry’s best distribution of Apache Cassandra™. This paper provides a summary of the features and functionality of DataStax Enterprise that make it the best choice for companies that are looking to leverage the promise of Apache Cassandra™ for production environments.
Tags : 
distribution, apache cassandra, cloud, datastax
    
Datastax
Published By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : 
data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility
    
McAfee
Published By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you can’t escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: • Adopt and scale containers faster. • Move existing services to containers. • Eliminate the friction between development, QA, and production environments.
Tags : 
    
Puppet
Published By: Dynatrace     Published Date: Mar 06, 2017
Dynatrace application performance monitoring simplifies your complex application environment, helping you and your team perform better. You'll learn how you can take a different approach to APM with an AI-powered, automated full-stack solution that gives you operational insights out of the box.
Tags : 
dynatrace, apm, automation, global distribution, microservices, saas
    
Dynatrace
Published By: Dynatrace     Published Date: Mar 06, 2017
This new report outlines how today's hyper-scaled, complex application environment has pushed IT Operations to a tipping point, and why a new approach is critical. It outlines why it is not adequate anymore to simply attempt to enable IT better, why you need to start using automation and AI (artificial intelligence), and steps you can take immediately to begin doing that.
Tags : 
it operations, dynatrace, itoa, automation
    
Dynatrace
Published By: VMware     Published Date: Feb 24, 2017
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware AirWatch Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with VMware AirWatch, as well as conduct a Q&A session.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Feb 21, 2017
This white paper provides guidance for adding support for hosted applications and desktop sessions to your VMware Horizon infrastructure. Whether the goal is to integrate an existing RDS environment for combined management with VMware Horizon with View™ virtual desktops or deploy hosted applications or desktop sessions for the first time, Horizon provides the technology required and a simple path forward.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Feb 21, 2017
By implementing the VMware App Volumes™ application management solution, OGL built a multitenant VDI environment that delivers an extensive range of applications to customers in real time, with full application functionality on any device, while also reducing OpEx and CapEx. Download this case study to learn how OGL Computer addressed these issues and more with VMware App Volumes: • Scale VDI service for more customers and applications. • Reduce expenses of Citrix VDI solution delivery. • Deliver and manage applications dynamically, in real time. • Give users desktop access on any Internet-connected device.
Tags : 
    
VMware AirWatch
Published By: IBM     Published Date: Jan 27, 2017
For more and more organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. In fact, hybrid cloud is the new norm for IT. IDC says more than 80% of enterprise IT organizations will commit to hybrid cloud by 20171, and 70% of IT decision-makers say they will always have a mix of traditional IT and cloud architectures.2 With important applications and workloads architected across both on-premises and hybrid, public and private cloud environments, business and IT stakeholders must be able to access data with equal efficiency, reliability and speed—regardless of physical location, infrastructure type or time frame.
Tags : 
    
IBM
Published By: Quantum     Published Date: Jan 24, 2017
Is your organization ready to take the plunge into in-house video production? The benefits can be substantial, but making the move requires some preparation. The IT infrastructure you use for enterprise applications might not be able to meet the rigorous requirements of video production. And you might not want video production teams to use resources from your existing infrastructure, since doing so could affect the performance of other applications. Whether you’re just getting started with in-house video or ramping up production, consider these five best practices for building an IT environment optimized for video work. The right approach to IT is essential for developing efficient collaborative workflows and maximizing the value of your video content.
Tags : 
corporate video, corporate communications, video storage, enterprise video, enterprise storage, media production, video production, video marketing
    
Quantum
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.