Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

application environment

Results 201 - 225 of 381Sort Results By: Published Date | Title | Company Name
Published By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
    
HP Inc.
Published By: Rackspace     Published Date: Jan 19, 2016
Many companies want to take advantage of public cloud features, but aren’t willing to compromise on the performance, security and control that they require for their business applications and data. Public clouds have the potential to introduce performance issues caused by “noisy neighbors,” security concerns associated with placing sensitive data in a shared infrastructure environment, and a lack of control driven by the inability to customize and fine-tune cloud resources to meet the needs of a given application.
Tags : 
rackspace, private cloud, enterprise, application, data, software development
    
Rackspace
Published By: K2     Published Date: Jan 07, 2016
Despite the enormous market share that IBM Lotus Notes has earned since its release in 1989, many organizations are now finding that the combination of IBM Lotus Notes and IBM Lotus Domino no longer meets their needs. Many companies are migrating to other solutions, like Microsoft Office 365 and Microsoft SharePoint, but they find that their business applications are a challenge because their IBM Lotus applications don’t migrate: instead the applications have to be rebuilt in the new environment.
Tags : 
ibm lotus, microsoft office 365, optimizing business apps, microsoft sharepoint, data migration, networking, security, software development
    
K2
Published By: Red Hat     Published Date: Dec 15, 2015
A truly hybrid IT infrastructure should support any and all workload types, letting applications run optimally on their own natural footprints or environments, whether bare-metal servers, scale-up virtualization, Infrastructure-as-a-Service (IaaS), or Platform-as-a-Service (PaaS), from either private or public clouds. It should not be a singular environment that (unsuccessfully) attempts to handle all types of workloads, nor should it consist of separate IT infrastructures that cannot communicate with each other. The Red Hat® portfolio provides the open hybrid IT fabric required to seamlessly enable both traditional (stateful) and new, agile, cloud-native (stateless) workloads.
Tags : 
    
Red Hat
Published By: F5 Networks Inc     Published Date: Dec 11, 2015
An app-centric strategy allows you to maintain control over your cloud applications--providing the same availability, performance, and security services across your hybrid environment.
Tags : 
software-defined networking, sdn, programability, cloud computing, mobility, it solutions, apps, networking
    
F5 Networks Inc
Published By: HP Ecommerce     Published Date: Dec 10, 2015
In today’s user-centric world, applications are increasingly at the heart of how your customers experience your products and services. Consistently good application performance is now essential to business success. This is where the quality of application performance enters the picture. Given the complexities of today’s modern application environments, applications should be tested early, often, and thoroughly in the development cycle using processes and solutions to fit your specific needs. To help your organization meet this objective, this interactive brochure explores an eight-step framework for better application performance. This framework begins with business requirements and culminates in the ongoing optimization of your application performance. With its expansive application software portfolio, HP covers all of the steps in this framework.
Tags : 
    
HP Ecommerce
Published By: Cisco     Published Date: Nov 17, 2015
The pace of change facing Cisco's IT department is accelerating as new applications, particularly from cloud and mobile environments, become key business enablers. Cisco's IT department, which is responsible for 4,067 production applications and inspecting 27TB of data daily, must be able to deploy such applications quickly, securely, and cost-effectively — and then make changes to them or remove them just as quickly and efficiently.
Tags : 
applications, systems integration, cloud, development, cisco, networking, it management
    
Cisco
Published By: CDW     Published Date: Sep 21, 2015
Years of IT infrastructure advancements have helped to drive out vast amounts of costs within the datacenter. Technologies like server and storage virtualization, data deduplication, and flash-based storage systems (to name just a few) have contributed to improvements of utilization rates, performance, and resiliency for most organizations. Unfortunately, organizations still struggle with deeply rooted operational inefficiencies related to IT departments with silos of technology and expertise that lead to higher complexity, limited scalability, and suboptimal levels of agility. The recent tectonic shifts caused by the rise of 3rd Platform applications that focus on social, mobile, cloud, and big data environments have amplified the pains associated with these structural inefficiencies.
Tags : 
quantify, infrastructure, performance, resiliency, data deduplication, datacenter, virtualization, it management
    
CDW
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco
Published By: Unitrends     Published Date: Aug 18, 2015
When it comes to data protection, what matters most? You want the freedom to choose the types of data, applications, and computing platforms you protect. You want to seal off that data from security threats. You need space to house that data—the right space now with room to grow. You want to support older solutions as you evolve your technology environment to modern strategies, at a pace that suits your business. And you need the ability to reach out for that data at a moment’s notice without overstressing your network. In short, you need it all.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server
    
Unitrends
Published By: Adobe     Published Date: Aug 04, 2015
This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.
Tags : 
e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement
    
Adobe
Published By: BMC Software     Published Date: Jul 22, 2015
In this white paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services. • Accelerate mean time to repair (MTTR) while communicating better with stakeholders. • Manage even the most complex hybrid environments more efficiently and effectively. • Understand the impact of proposed changes and potential security risks to guide decision-making.
Tags : 
cloud, hybrid environments, application discovery mapping, application dependency mapping, security risks
    
BMC Software
Published By: Riverbed     Published Date: Jul 21, 2015
IT organizations have been evolving their WAN connectivity strategies to align with new IT cost, resilience, and performance objectives. Hybrid WAN is a growing trend with many organizations and enterprises, enabling them to augment traditional private leased lines or MPLS-based WAN circuits with secured public Internet services to achieve their goals. Riverbed takes a holistic, application-centric approach to solving the challenges of hybrid architectures. Read how SteelHead's hybrid architecture simplifies the laborious aspect of operating in a hybrid WAN environment.
Tags : 
hybrid enterprise, app performance, wan connectivity, hybrid wan, application-centric, it management
    
Riverbed
Published By: IBM     Published Date: Jul 09, 2015
Whether it's a web application or an enterprise cloud application, Websphere Application Server has the right fit-for-purpose cloud environment for your business.
Tags : 
web application, ibm, enterprise cloud application, cloud environment, application server, it management, data center
    
IBM
Published By: CA Technologies     Published Date: Jun 09, 2015
In today’s application economy, everyone is in the software business. Auto makers are putting Wi-Fi hotspots in their cars. Watches are trading gears for motherboards. Even soda fountains have evolved from dumb machines into instrumented devices with touch-screen user interfaces. This digital transformation is changing the way applications are developed, tested, moved through environments and released into production—and it’s putting new demands on IT teams with which they’re struggling to keep up. At a high level, this is because the application delivery systems and processes at many enterprises were put in place when IT only had to push out an annual or semi-annual release. But as market pressures and executive mandates have forced teams to deliver innovations faster and more frequently, a new set of development, testing, automation and customer challenges have appeared—acting as obstacles that stand between you and your digital transformation goals.
Tags : 
    
CA Technologies
Published By: Cisco     Published Date: May 21, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
virtualization, cisco, data center, applications, private cloud
    
Cisco
Published By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : 
e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure, it administrator, it infrastructure, web application performance
    
Xangati
Published By: IBM     Published Date: May 18, 2015
To stay relevant and competitive in business today, companies must respond and interact with their customers in ways that were simply inconceivable a decade ago. Mobile, social and cloud are enabling businesses to better engage with customers, but these technologies put new pressures on businesses.
Tags : 
cloud applications, mobility, application integration, customer feedback, software defined environments, automate manual process, improving productivity, collaboration
    
IBM
Published By: Cisco     Published Date: May 14, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
cloud computing, erp, productivity, applications, efficiency, unified computing, cisco
    
Cisco
Published By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
    
Dell
Published By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : 
hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management
    
BMC Software
Published By: K2     Published Date: Apr 27, 2015
Download K2’s new white paper, “Make the move from IBM Lotus Notes and optimize your business apps,” to see how the right business-application solution can make all the difference. You will also learn how the right business-application solution can help you quickly rebuild your applications to have greater flexibility and configurability than you had before.
Tags : 
business applications, ibm lotus notes, app environment, it investments, visual tools, reusable components, future app development
    
K2
Published By: IBM     Published Date: Apr 22, 2015
To build a great mobile app, you need the right skills, tools, and support. That’s why many companies are turning to integrated and collaborative mobile application development environments that let them meet business needs and exceed customer expectations.
Tags : 
ibm, mobile application, app, build, integration, collaboration, development, software development
    
IBM
Published By: IBM     Published Date: Apr 15, 2015
What if your organization could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options? These capabilities are available today. With IBM® PureApplication® solutions, companies can build and use a cloud environment faster, easier and with less risk than traditional methods to better engage with their customers and partners in new ways. The result: increased competitiveness and improved profitability in a changing business landscape. This paper describes a simpler way forward to gain these advantages.
Tags : 
ibm, business intelligence, applications, cloud computing, migration
    
IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.