Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

application environment

Results 351 - 375 of 378Sort Results By: Published Date | Title | Company Name
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: NetApp     Published Date: Dec 01, 2009
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, esg, storage efficiency, microsoft application environments, xchange, sql server, sharepoint, storage management
    
NetApp
Published By: F5 Networks Inc     Published Date: Nov 03, 2009
How modern offload technologies in Application Delivery Controllers can drastically reduce expenses in traditional and virtualized architectures, with a fast ROI.
Tags : 
roi, application delivery controllers, virtualization, consolidation, ssl, server offload
    
F5 Networks Inc
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing
    
AppSense
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus
    
Internet Security Systems
Published By: ZSL Inc.     Published Date: Jul 20, 2009
Organizations have implemented enterprise applications such as ERP and CRM for business process execution but have failed to address the key enterprise asset: data. In the current economic environment, enterprises that fail to capitalize on their data assets jeopardize their cost structures and their earnings potential. It is vital for organizations to leverage their data assets to measure their business performance, identify the weak poles and strategic improvement spots to scale their business to new heights. Business Intelligence (BI), the recent innovation in IT, has emerged to be a potential hope for the organizations to build a strong business milieu without any new asset investments and utilizing the existing key assets of the organizations.
Tags : 
business intelligence, zsl, erp, crm, enterprise application, enterprises, investments, business transformation
    
ZSL Inc.
Published By: HP     Published Date: Jul 08, 2009
The growth of structured data from databases, e-mail and other applications has been exponential. The increasing flood of data can lead to a host of problems — failing to recognize that data storage must be managed as a critical resource often results in a very difficult environment to manage, a higher cost of ownership, less responsiveness to change and added risk to the business. This white paper discusses how a dedicated, optimized network storage solution can increase data availability and reduce operating costs by simplifying management and improving capacity utilization.
Tags : 
simply storage, storage, email, databases, databasing, structured data, network storage solution, capacity utilization
    
HP
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : 
big-ip, tool, application, system, device, installation, upgrade, production
    
F5 Networks Inc
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Migrating data associated with Microsoft operating systems, applications, and other software can be a challenge administrators overlook when planning system upgrades. Del™ PowerVault™ and Dell EqualLogic™ storage and CommVault® Simpana® data management software enable flexible data migration and transparent, release-specific data object recovery and backup to help simplify upgrades in enterprise environments.
Tags : 
dell, commvault simpana, microsoft windows server 2008, data migration, microsoft operating systems, data management software, platforms
    
Dell Windows Server
Published By: IBM     Published Date: Jan 12, 2009
Cardiff University was faced with the challenge of modernizing its work environment. By utilizing IBM WebSphere Portal software, they have streamlined their business processes with electronic forms and role-based portal applications. This webcast explains how you can reap the benefits of IBM portals and Web 2.0 in your own environment.
Tags : 
ibm, ibm portals, electronic forms, cardiff university, ibm websphere portal, streamline business processes, portal applications, networking
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Selecting the right server for your business-critical applications is an investment in the future of your business. This datasheet explores the IBM System x3650 server, and shows how it can save energy costs, help you manage growth and complexity, and protect valuable IT investments.
Tags : 
ibm, express seller, ibm system x3650, application server, x3650 datasheet
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Discover the IBM System x3650, a highly available and expandable, rack-dense, 2U dual-socket SMP server, ideal for application serving in Web environments. This product guide gives an overview of the x3650, as well as key features and specifications of this flexible, reliable, and simple-to-manage server.
Tags : 
intel, system x, system x3550, x3550, rack, rack-mounted, server, ibm x-architecture
    
IBM
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications, security
    
Cenzic
Published By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : 
job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling
    
Tidal Software
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Chances are, if you’re utilizing SSL, you’re not utilizing it to its full potential. SSL is a powerful technology that can help organizations protect their data as well as their users. While the technology behind SSL is solid, the most common best practices for its implementation do not take full advantage of the benefits that SSL brings. And this may be inadequate to provide proper security to the modern web application environment.
Tags : 
ssl, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services
    
KEMP Technologies
Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
    
Stratus Technologies
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
    
Dynapar Corp.
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
    
Vision Solutions
Published By: IBM     Published Date: Mar 28, 2008
For many organizations, applications have been moved to an SOA environment and now must be extended to offer a service interface to new sets of users that were not originally planned.  Extending resources in this way requires that you reassess your security risk. To minimize any risk, you need the right level of security checks for user authentication and authorization.
Tags : 
security
    
IBM
Published By: IBM     Published Date: Mar 28, 2008
More than likely you’ve heard quite a bit about service-oriented architecture (SOA) and how it holds the promises of quicker response to market trends, improved customer services and lower application development costs. From an infrastructure perspective, an SOA implementation contains all the same pieces and parts as your traditional environment.
Tags : 
infrastructure
    
IBM
Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure
    
Tideway Systems
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre
    
VMware/Intel Server Refresh and Cost Savings
Published By: Appistry     Published Date: Oct 11, 2007
This white paper describes how software-based, real-time grid environments -- i.e. application fabrics -- are successfully meeting the requirements of today's most demanding applications, delivering scalability, manageability and affordability.
Tags : 
application, application performance, application performance management, application fabric, application fabrics, grid computing, appistry, enterprise applications
    
Appistry
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel, crm, customer relationship, end user
    
Knoa
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.