Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

enterprise computing

Results 176 - 200 of 245Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 15, 2014
In this white paper, IDC examines how IBM's Storwize family of storage offerings is changing the game by delivering a robust enterprise grade virtualization platform that is efficient, cost-effective, and optimized.
Tags : 
enterprise storage, big data, cloud computing, virtualization platform
    
IBM
Published By: IBM MaaS360     Published Date: Jul 01, 2016
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives.
Tags : 
ibm, gartner, mobile, enterprise mobility, enterprise mobility management suites, wireless, enterprise applications
    
IBM MaaS360
Published By: IBM     Published Date: Jul 14, 2015
Begin your journey toward becoming a cognitive enterprise and start gaining unprecedented value from your own data. Watson Explorer reduces unnecessary research time and allows enterprises to work smarter and faster. Read this brochure to learn how Watson Explorer combines content and data with cognitive computing capabilities to help your organization work more efficiently and make better decisions.
Tags : 
ibm, watson, software, explorer, applications, developer, cloud
    
IBM
Published By: IBM     Published Date: Oct 14, 2015
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, information application, enterprise, application, search tool, networking, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, information applications, analytics, data, enterprise software
    
IBM
Published By: IBM     Published Date: Apr 20, 2016
Modern organizations often have huge stores of data, which can make it difficult for employees to find the information they need when they need it. In response, innovative enterprises are creating unified information applications based on cognitive computing technology in order to put invaluable information at workers' fingertips.
Tags : 
ibm, ibm watson, watson explorer, business intelligence, business decisions, innovative enterprises, enterprise applications
    
IBM
Published By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : 
ibm, forrester, cloud, mobile, mobile applications
    
IBM
Published By: Gomez IT     Published Date: May 23, 2011
A Critical Look at Key Technologies to Help Ensure that Your Cloud Investments Work For and Not Against You.
Tags : 
compuware, enterprise management associates, ema, cloud computing, application delivery, peformance management strategy, cloud services, performance monitoring, user experience management
    
Gomez IT
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: BlackBerry     Published Date: Jan 06, 2011
With consumer use of smartphones growing by the day, it's no surprise that users are taking them into the workplace as well. Thousands of people already use their personal smartphones for work-related tasks like checking email and calendars when they're away from their desks. And many wish they could do more with their smartphones, given their myriad functions and applications.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : 
case study, enterprise feedback, blackberry 10, mobile field service solutions, mobile computing corp, enterprise applications
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
Mobile Computing Corp Inc. (MCC) specializes in mobile field service solutions. After a rigorous trial period, the company’s CEO concluded that “the strength of BlackBerry 10 is great.” Find out what made the experience so positive.
Tags : 
mobile computing corp, implementing blackberry 10, feedback, enterprise, enterprise applications
    
Blackberry
Published By: HP and Intel ®     Published Date: Jul 26, 2013
Because of relatively low barriers to entry and short time to value, many enterprises are choosing application development and testing projects as their initial steps into cloud computing.
Tags : 
converged infrastructure, cloud, cloud testing, cloud models, software development
    
HP and Intel ®
Published By: IBM     Published Date: Sep 27, 2013
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : 
ibm, ibm pureflex system, sap, cloud, sap enterprise environments, cloud computing, storage, networking, database management, infastructure, it solutions, data center
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Analytics: The Real-World Use of Big Data - How innovative enterprises in the midmarket extract value from uncertain data This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, big data, big data solutions, midmarket businesses, analytics, it management
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
Continual and timely upgrades of UNIX systems can enable growth and lower costs. But for some Sun/Oracle and HP customers, expected upgrade plans have hit major hurdles. Read this Clipper Group white paper to see how only IBM continues to provide a plan, and a predictable drumbeat, for the future. Read it now.
Tags : 
ibm, ibm power7, ibm power7 systems, data center, it infastructure, data center, enterprise applications, consolidation, virtualization, smart computing, platforms
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, telecom
    
IBM
Published By: Cisco     Published Date: Jun 10, 2015
Enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity, cloud, enterprise, hybrid, convergence
    
Cisco
Published By: Cisco     Published Date: Aug 28, 2015
A growing number of enterprises are adopting both private and public cloud computing models. While virtualization, cloud, mobility, data analytics, and the Internet of Things (IoT) are providing tremendous opportunities for businesses, they are also creating new challenges for IT departments.
Tags : 
cloud, hybrid, iot, public cloud, cloud computing
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.