Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical applications

Results 301 - 325 of 354Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Apr 13, 2014
Learn how Isbank, Turkey’s largest bank, dramatically reduced testing times for Functional Testing automation from 6 man-days to a few hours. Read about the benefits of adopting an Application Lifecycle Management approach to improve software quality, automate testing processes and safeguard mission-critical applications while supporting growth.
Tags : 
application lifecycle management, application development, application testing, enterprise release management, financial services, functional testing, hp application, hp loadrunner, hp performance center, hp quality center, hp quick test professional, hp service, hp service test, hp software professional, it case study, lifecycle management, performance testing, quality planning assessment, services, test management
    
HP
Published By: Riverbed     Published Date: Sep 05, 2014
Application Performance Management For Dummies, Riverbed Special Edition, introduces you to application performance management (APM) solutions and how these tools can help you monitor and troubleshoot your mission-critical applications — from the perspective of your users, as well as your systems.
Tags : 
application, performance, solutions, systems, management
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services.
Tags : 
application, performance, management, tool set, enterprises, fundamental issues
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
As organizations rely on IT to support critical business processes to an ever-greater degree, the importance of application performance management (APM) is growing. Gone are the days when systems monitoring and management could focus on components in isolation; instead, organizations must ensure that applications are operating at top e?ciency from end to end to support critical business processes. This requires a holistic focus on the end user’s application experience.
Tags : 
business, value, roi, application, performance, management, efficiency
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
The explosion in mobility and the increasing number of ways to connect with the corporate network has created an IT environment that is increasingly difficult to manage, and that leads to inconsistent user experience. Mobile WAN optimization can help overcome many of the challenges of running a distributed environment by improving the performance of critical enterprise applications, which lowers the cost of effectively supporting mobile workers and eliminates the need for many organizations to pursue expensive strategies and upgrades.
Tags : 
mobile, wan optimization, cut costs, it environment, user experience, networking, wireless, data center
    
Riverbed
Published By: HPE     Published Date: Oct 07, 2014
So far, most data centers have virtualized their least-critical workloads as a matter of basic cost containment. Virtualizing mission-critical applications is still forthcoming for the majority,though, largely due to infrastructural concerns. Complicating matters is the shift in IT purchasing decisions from IT to business management. Integrated Computing Platforms (ICPs), private cloud computing, and public cloud services all leverage virtualization to achieve a number of IT and business goals, including increased ROI, reduced OpEx, and business process improvement. Now more than ever, it makes sense to explore the benefits of ICPs. Find expert data center considerations here.
Tags : 
virtualization, data center, cloud, infrastructure, integrated, optimization, solution, it management
    
HPE
Published By: IO     Published Date: Dec 31, 2015
The primary focus of any data center is the critical applications that form an enterprise’s business and operational core—its commercial and technical heart.
Tags : 
data center, data center optimization, facility management, servers, infrastructure, network architecture, remote access, server hardware, cloud computing, data center design and management
    
IO
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Oracle Corp.     Published Date: Jan 16, 2013
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : 
oracle, database, 11g release, microsoft sql server 2008
    
Oracle Corp.
Published By: Progress Software     Published Date: Mar 12, 2014
Big data and cloud data are still hurling outward from the “big bang.” As the dust settles, competing forces are emerging to launch the next round of database wars—the ones that will set new rules for connectivity. Progress® DataDirect Cloud™ is well positioned to help organizations establish data control amid the chaos. How? Information workers at all levels require easy access to multiple data sources. With a premium cloud based connectivity service, they can count on a single, standardized protocol to inform their most business critical applications.
Tags : 
progess software, datadirect, big data, cloud computing, connectivity, data management, cloud data, database wars, networking, software development, it management
    
Progress Software
Published By: SolarWinds     Published Date: May 20, 2013
Given the criticality of the IT infrastructure to business critical applications and services such as e-commerce, voice, and business intelligence, the “network”, and its various components, is becoming more and more of a competitive differentiator for businesses of all sizes.
Tags : 
solarwinds, improve slas, roi, management & monitoring, e-commerce
    
SolarWinds
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: NEC     Published Date: Aug 12, 2014
By now, much has been written about the advantages server virtualization brings to an enterprise. In the June 2013 survey, 63% of all companies and 100% of large enterprises reported having a server virtualization program. However, when you segment the virtualization rates, you find a trend that indicates that large enterprises in particular are not gaining all of the advantages that server virtualization has to offer. What is more difficult and remains a challenge, particularly for large enterprises, is virtualizing Tier 1 applications. These are large, mission-critical enterprise applications such as email, customer relationship management (CRM), or enterprise resource planning (ERP). These applications tend to be very large, consume the entire capacity of a current generation server, and require high application uptimes. As shown in Figure 1, the virtualization rates for these applications are far lower than Tier 2 apps. In this eBook, you’ll learn how the NEC enterprise server provides a platform that now gives customers the right platform to virtualize their Tier 1 apps.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, architecture, express, stress, enterprise applications
    
NEC
Published By: NEC     Published Date: Aug 26, 2014
In addition to high reliability and availability, enterprise mission critical applications, data centers operating 24x7, and data analysis platforms all demand powerful data processing capabilities and stability. The NEC PCIe SSD Appliance for Microsoft® SQL Server® is a best-practice reference architecture for such demanding workloads. It comprises an Express 5800 Scalable Enterprise Server Series with Intel® Xeon® processor E7 v2 family CPUs, high-performance HGST FlashMAX II PCIe server-mounted flash storage, and Microsoft® SQL Server® 2014. When compared with the previous reference architecture based on a server with the Intel® Xeon® processor E7 family CPUs, benchmark testing demonstrated a performance improvement of up to 173% in logical scan rate in a data warehouse environment. The testing also demonstrated consistently fast and stable performance in online transaction processing (OLTP) that could potentially be encountered.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, enterprise applications
    
NEC
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: PerformanceIT     Published Date: Aug 21, 2009
With the current demands on today's CIO and IT Managers, implementing a top notch, easy-to-use proactive network, application and server support structure that meets budgetary confines can seem like a daunting task. Until now...
Tags : 
infrastructure, network management, server management, application performance management, server support, performance management, performanceit, performance it, it management, enterprise applications
    
PerformanceIT
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade, security
    
Third Brigade
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade, security, it management, platforms
    
Third Brigade
Published By: Xiotech     Published Date: Apr 13, 2007
Well-publicized disasters highlight the need for an effective and timely data recovery solution. While current tape and disk backup provide some peace of mind, they do not keep up with the demands placed on your business. You cannot afford to wait hours (or days) to recover your critical applications and data.
Tags : 
disaster recovery, disaster plan, data backup, backup and recovery, data recovery, disk backup, tape backup, offsite storage, data protection, continuous data protection, xiotech
    
Xiotech
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: Network Automation     Published Date: Dec 08, 2008
Often, the insurance underwriters stay late that last day of the month to enter new policies. This means that IT staff have a very small window to execute the applications critical to successful and error-free closing of the accounting books. IT staff had to run and baby sit the applications – one application requiring manual operation took over three hours to complete, another that uploads premium and claim information to the data warehouse took up to six hours.
Tags : 
network automation, application execution, process automation, networking, it management, network management, network performance management
    
Network Automation
Published By: Network Automation     Published Date: Dec 08, 2008
In order to deliver quality patient care, Health First must exchange information with a large number of partners, customers, and vendors on a timely basis. Complicating this enormous task is the fact that Health First has over 15 business units using a variety of mission-critical applications.
Tags : 
network automation, mission critical applications, process automation, automate, it management, network management, network performance management
    
Network Automation
Published By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : 
soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance, ejb, user interface, infrastructure
    
Oracle Corp.
Published By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : 
mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application, it management, enterprise applications, platforms
    
Mimosa Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.