Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

application environment

Results 326 - 350 of 381Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 17, 2012
Overlooking how an application fits into your overall IT landscape can lead to costly implementations. But addressing data management with middleware solutions that work seamlessly with existing applications in your company's IT environment can lead to significant benefits. Explore the value of technology decisions that support and maintain infrastructure-wide interoperability with regard to your data management solutions.
Tags : 
infrastructure, functionality, data management, technology, solutions, white paper
    
SAP
Published By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : 
modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability
    
IBM
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"
Tags : 
cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle
    
Red Hat, Inc.
Published By: IBM     Published Date: Jul 06, 2012
This paper describes the benefits of consolidating from HP servers to an IBM PureFlex System in a SAP application environment with six industry examples. Learn about the cost reductions through the use of IBM PureFlex System.
Tags : 
ibm, cloud, sap, pureflex, enterprise, technology, data management
    
IBM
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
    
Rapid7
Published By: IBM Corporation     Published Date: May 22, 2012
This paper describes the benefits of consolidating from HP servers to an IBM PureFlex System in a SAP application environment with six industry examples. Learn about the cost reductions through the use of IBM PureFlex System.
Tags : 
sap, cloud computing, pureflex systems, sap lvm, virtualization, distinctive power systems, lpars, ibm pureflex system
    
IBM Corporation
Published By: OpenText     Published Date: May 15, 2012
Featured in SharePoint Pro magazine online, the OpenText white paper Extending SharePoint Across Your Information Architecture, by leading SharePoint consultant Colin Spence, offers valuable insights and best practices for integrating SharePoint with your full enterprise application environment.
Tags : 
opentext, sharepoint, technology, buesiness, business information, it management, data quality
    
OpenText
Published By: Splunk     Published Date: Apr 16, 2012
Using Splunk, Cricket was able to identify system degradation and failures, even in the application area of Cricket's highly-automated and virtualized environment. Read about Cricket's impressive hard and soft ROI.
Tags : 
splunk, cricket communications, virtualization, automation, customer behavior, data, analyzying, decision making
    
Splunk
Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
IDC studied a group of enterprises that had deployed SAP applications on IBM Power Systems servers running Linux server operating environments and had been working with those systems for several years.
Tags : 
ibm, technology, sap, tecnology product, linux server, technology platform
    
IBM MidMarket Demand Generation
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
For data centers looking to get the maximum performance from Flash-based storage supporting their virtual infrastructure, the RamSan-720 should be given strong consideration.
Tags : 
ramsan-720, integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization
    
Texas Memory Systems
Published By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net
    
Sybase PowerBuilder
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection
    
Brainloop
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
Brainloop
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: IBM Corp     Published Date: Sep 23, 2011
Networked storage is being deployed in combination with server virtualization by an increasing amount of organizations interested in - consolidation, reduced costs, improved flexibility and availability of mission-critical applications. This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment. Download now to find out the results.
Tags : 
ibm, technology, esg, storage system, vmware, storwize v7000
    
IBM Corp
Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
Akamai
Published By: EMC Corporation     Published Date: May 27, 2011
This ESG white paper confirms that momentum continues to build around server virtualization. Learn about an in-depth survey of 463 senior IT professionals in both large midmarket and enterprise-class organizations in North America and resulting trends.
Tags : 
enterprise strategy group, esg, emc, backup and recovery, enterprise applications, vmware, mark bowker, david a. chapa
    
EMC Corporation
Published By: Riverbed     Published Date: Apr 27, 2011
This paper examines the trends towards server consolidation and virtualization, and how WAN optimization can help IT organizations address the challenges of application performance and information availability within these environments.
Tags : 
riverbed, virtualization, server consolidation, wan optimization, application performance, information availability, disaster recovery, infrastructure consolidation
    
Riverbed
Published By: Dell Storage     Published Date: Apr 21, 2011
The Storage Center SAN is a smart, virtual storage platform that speeds storage provisioning for virtual machines, minimizes disk capacity, automates disaster recovery, fine-tunes data placement for virtual applications and provides a shared storage pool available to all VMs all the time. Watch this webcast to see why Dell Compellent storage is the perfect complement to VMware server environments. (39 mins)
Tags : 
dell compellent, webinar, virtual storage platform, vmware virtual servers, storage center san, disk capacity, disaster recovery
    
Dell Storage
Published By: Gomez IT     Published Date: Apr 01, 2011
Download this white paper to learn how Compuware's Vantage 11.5, now VMware Ready certified, can provide a complete VMware APM solution.
Tags : 
application performance management, compuware, vmware, apm solution, vantage 11.5
    
Gomez IT
Published By: Vertica     Published Date: Aug 15, 2010
If you are responsible for BI (Business Intelligence) in your organization, there are three questions you should ask yourself: - Are there applications in my organization for combining operational processes with analytical insight that we can't deploy because of performance and capacity constraints with our existing BI environment?
Tags : 
business intelligence, vertica, aggregated data, olap, rolap, sql, query, data warehouse
    
Vertica
Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security, cyber crime
    
Lumension
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
HP
Published By: Arcserve     Published Date: Jul 26, 2010
Using the CA Wily Application Performance Management (APM) solution consisting of CA Wily Introscope® and CA Wily Customer Experience Manager™, JN Data better manages Web applications through faster diagnosis of problem root causes in its customers' heterogeneous environments.
Tags : 
ca technologies, jn data, web application management, ca wily, application performance management, apm, customer experience manager, virtual server network
    
Arcserve
Published By: Red Hat     Published Date: Jul 14, 2010
This use case introduces Red Hat solutions that you can use to build a world-class web application infrastructure. Learn best practices that will scale as your company grows and find out how to increase your productivity while reducing costs.
Tags : 
red hat, web app infrastructure, productivity, web application environment, enterprise linux, open source, enterprise virtualization, jboss enterprise middleware
    
Red Hat
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.