Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 301 - 325 of 2620Sort Results By: Published Date | Title | Company Name
Published By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : 
application fabric, performance computing, application performance, grid computing, infrastructure, appistry, enterprise applications
    
Appistry
Published By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
    
Avi Networks
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Data center refresh cycles and new initiatives tied to business growth and revenue opportunities are leading more organizations to deploy integrated systems, including both converged and hyper-converged infrastructures. IT leaders can see the potential benefits of converged, integrated systems but as applications increase in complexity, virtual workloads grow, and resource demands expand, managing these applications becomes a critical and often stubborn challenge.
Tags : 
application delivery services, systems deployments, integration, idg research, integrated system approach, networking, security, enterprise applications
    
F5 Networks Inc
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : 
application modernization, forrester consulting, apo, asg, application portfolio optimization
    
ASG Software Solutions
Published By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : 
modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability
    
IBM
Published By: AppNeta     Published Date: Oct 28, 2013
6 things you should be doing today to assure fast availability and delivery of your critical web apps.
Tags : 
appneta, applications, application performance, application performance management, web applications, application delivery, network health, latency
    
AppNeta
Published By: IBM     Published Date: Jun 28, 2016
Software applications are the mainstay of modern business. Applications deliver business-critical services to customers and enable companies to function efficiently. To ensure performance and availability of their applications, companies must have full visibility and control of the applications and enabling infrastructure. If an outage or slowdown occurs, the company needs to know precisely where the problem originated, what caused it, and how to prevent it from occurring again.
Tags : 
software, data, best practices, productivity, applications
    
IBM
Published By: Riverbed     Published Date: Apr 03, 2014
This book introduces you to application performance management (APM) solutions and how these tools can help you monitor and troubleshoot your mission-critical applications — from the perspective of your users, as well as your systems.
Tags : 
riverbed, application performance management, apm, service management, compliance, performance management, cloud computing
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
Application Performance Management For Dummies, Riverbed Special Edition, introduces you to application performance management (APM) solutions and how these tools can help you monitor and troubleshoot your mission-critical applications — from the perspective of your users, as well as your systems.
Tags : 
application, performance, solutions, systems, management
    
Riverbed
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security
    
Progress Software BTA Telecommunications
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
    
F5 Networks Inc
Published By: F5     Published Date: Jan 31, 2013
Whether critical applications live in the cloud, in the data center, or both, organizations need a strategic point of control for application security. Learn how you can achieve the security, intelligence, and performance for today's standards.
Tags : 
application, security, cloud, cloud security, f5 networks, performance, prevent attacks, it management
    
F5
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm, security, ip networks, network security
    
Cenzic
Published By: Workday     Published Date: Oct 06, 2014
Comment reconnaître les applications et fournisseurs de solutions Cloud efficaces
Tags : 
the cloud, cloud providers, cloud computing, modern saas
    
Workday
Published By: Intel Security     Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions, it management, enterprise applications, data center
    
VMTurbo
Published By: VMTurbo     Published Date: Feb 11, 2014
VMTurbo’s Observe-­-Advise-­-Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, virtual currency
    
VMTurbo
Published By: Esker     Published Date: Jun 29, 2017
With little to no oversight into billing and collections‚ it can be hard to evaluate and improve the performance of accounts receivable (AR) processes — but not anymore. AR Automation solutions provide access to critical analytics that go beyond DSO to transform your AR department into a more strategic‚ value-added operation. Read our new AR Analytics Playbook to discover the six essential metrics that can bring big gains in efficiencies‚ such as: • Faster customer payments • Reduced administrative costs • Enhanced collections efficiencies • Improved customer retention The competition isn’t getting any weaker. Start strengthening your business with an AR automation solution today!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: Oath     Published Date: Oct 31, 2017
Consumers are better than ever at differentiating between low-quality and premium content. For marketers, this means the placement of their ads is critically important. Brands can’t afford to risk appearing alongside questionable content, not with 75% of consumers holding brands accountable for their ad environments. When brands are shown adjacent to Oath’s trustworthy, premium content, they experience 5x greater favorability - a striking example of the power of positive associations and the importance of knowing your digital neighbors.
Tags : 
digital advertising, online advertising, ad placement, quality content, quality video content, online news, online video, offensive content
    
Oath
Published By: Keas     Published Date: Sep 17, 2013
The start of the Affordable Care Act has been delayed to January 2015 and now is the time to get educated on provisions for Corporate Wellness Programs which are critical to combatting rising healthcare costs.
Tags : 
aca, affordable care act, employee wellness, health and wellness programs, wellness programs
    
Keas
Published By: Riverbed     Published Date: Jul 11, 2017
Four Stages to Successful Cloud Adoption Forrester Research predicts 81% of companies expect to leverage the cloud for business-critical applications and services in the next two years. If you’re planning to move applications to the cloud, watch this webinar to learn how Asurion, an insurance provider with 280 million customers worldwide, undertook their cloud migration.
Tags : 
cloud, adoption, application, migration, performance
    
Riverbed
Published By: Dell Software     Published Date: May 10, 2013
Active Directory is critical to your IT infrastructure, but, if you’re relying on native tools and PowerShell scripts, it may be costing you much more than you think. Learn about how the right tools can put you back in control, making AD management easy and cost effective.
Tags : 
native tools, powershell scripts
    
Dell Software
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.