new applications

Results 251 - 275 of 476Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Nov 16, 2018
"Today’s technology advances at a fast rate. Attempting to adopt modern architectures can uncover a knowledge gap with developers, who might be unfamiliar with new architecture patterns and frameworks. This includes adopting cloud-native architectures to help with greater efficiency and cost benefits. TIBCO’s integration solutions helps enable you to create an environment that simplifies the building of cloud-native applications, with support for modern architectures, such as microservices, event-driven APIs, serverless, and edge deployment. Download this solution brief to see how you can help accelerate your development on AWS cloud by: • Helping reduce your costs with modern application microservices and functions • Seamlessly migrating your integration workloads to Amazon Elastic Container Service using out-of-the-box migration utilities • Connecting your cloud, on-premises, and edge data sources, regardless of data formats "
Tags : 
    
AWS
Published By: Red Hat     Published Date: Jan 07, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another. In March 2018, Re
Tags : 
    
Red Hat
Published By: Forcepoint     Published Date: Jun 06, 2019
When it comes to connecting remote offices and employees, traditional distributed networks can't handle the new wave of cloud-based applications that are driving increasing speed and innovation across the enterprise. If you want to make sure that your network resources are being used more efficiently, this eBook will show you how using direct-to-cloud connectivity and scaling site-to-site with on-demand VPNs can reduce downtime and decrease complexity—ultimately saving you money.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint
Published By: Tricentis     Published Date: Jan 22, 2019
With today’s enterprise IT landscape evolving faster than ever, it’s hardly surprising that IT teams find it difficult to keep pace with the seemingly non-stop testing requirement for new software. That’s particularly the case in the SAP arena, where end-to-end SAP-enabled business processes now frequently span multiple SAP applications and platforms, and increasingly draw on multiple SaaS applications – all with their own separate release cycles.
Tags : 
    
Tricentis
Published By: Pure Storage     Published Date: Dec 05, 2018
Deep learning opens up new worlds of possibility in artificial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Read this MIT Technology Review custom paper to learn how advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics, helping to accelerate business outcomes for data driven organizations.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Dec 05, 2018
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to tap into their data with artificial intelligence (AI). With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists are tackling new use cases like autonomous driving vehicles and natural language processing. Read this technical white paper to learn reasons for and benefits of an end-to-end training system. It also shows performance benchmarks based on a system that combines the NVIDIA® DGX-1™, a multi-GPU server purpose-built for deep learning applications and FlashBlade, a scale-out, high performance, dynamic data hub for the entire AI data pipeline.
Tags : 
    
Pure Storage
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Domo APAC     Published Date: Mar 04, 2019
Cisco’s marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Cisco’s marketing team plaudits and several industry awards View Domo’s privacy policy
Tags : 
    
Domo APAC
Published By: Intel     Published Date: Mar 19, 2019
Technology has drastically transformed the banking industry and the way in which consumers transact. Mobile banking is now the new normal. Many consumers, especially millennials prefer to do most if not all of their financial transactions via smartphone due to the convenience in which it offers. Even so, the popularity of mobile banking does not imply that the end of retail banking is near as research has shown that consumers still prefer retail banking for complex services such as loan applications, new account openings and advisory services. Download the whitepaper to learn— • How to build a bank of the future by leveraging the Internet of Things • How to increase security, ease system management and reduce operational costs • The benefits of migrating to a thin-client infrastructure and going paperless
Tags : 
    
Intel
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Speed and agility matter. Businesses are being disrupted every day by digital upstarts that find ways to address new market requirements before the more established companies can respond. Despite talented IT teams and years of head start in both architectural and development work, it is still difficult to respond to these challenges using traditional development patterns centered around monolithic software applications. It’s simply impossible to get to market quickly when applications need to be maintained, modified and scaled as a single entity by a large, heavily inter-dependent team. From this need has arisen the microservices paradigm: a set of patterns for software architecture, development, deployment and culture that focus on speed and agility. From small, independent services and teams to automated deployment to fault tolerance and resiliency, these patterns help accelerate time to market.
Tags : 
    
CA Technologies EMEA
Published By: Riverbed     Published Date: Feb 26, 2015
While powerful and beneficial, the Citrix XenApp environment can present new challenges to IT departments when troubleshooting application performance issues. Citrix acts as a proxy for backend applications, making it difficult to get end-toend visibility of transactions and to identify and troubleshoot end-user experience problems
Tags : 
troubleshooting, application performance issues, application management, enterprise application, application virtualization technology
    
Riverbed
Published By: Schneider Electric     Published Date: Mar 03, 2015
This paper explains how to plan for VoIP power and cooling needs, and describes simple, fast, reliable, and cost effective strategies for upgrading old facilities and building new facilities.
Tags : 
voip power and cooling needs, building new facilities, upgrading old facilities, ip telephony applications
    
Schneider Electric
Published By: Epson Robotics Media     Published Date: Feb 09, 2018
Digital Elektronik bought four Epson robots for the job, and these robots completed the task in just a few months. Since then Digital Elektronik has used the robots for new applications, some similar but others quite different, demonstrating a key advantage of Epson robots in being flexible and reusable. Volker Spanier, head of factory automation at Epson Germany, says, “I think this is an excellent example of how Epson robots can improve production line efficiency and complete tasks that may not even be possible by hand. It’s also great to see our robots involved in the construction of such a memorable landmark that will stand the test of time.”
Tags : 
robotics, epson, technology, robots
    
Epson Robotics Media
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
    
F5 Networks Inc
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Endpoint computing managers should plan to spend six to nine months learning about Windows 10, developing new environments and testing their applications. Such preparation will significantly lessen time and effort spent on migration and support.
Tags : 
    
Microsoft Windows
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Getting your applications to work properly over a Wide Area Network (WAN) is a complex task, and it is not likely to get easier any time soon. Trends such as data center consolidation, the advent of Web 2.0 applications, and the move to web-based application delivery have only served to increase complexity and slow user response times. Often, the result is sluggish application response and at worst, abandoned applications and shopping carts due to slow or failed web page loads. The good news is that you can do something to improve application performance over slow or congested WAN networks. An Application Delivery Network can accelerate your applications and help make sure they’re secure, fast, and available.
Tags : 
acceleration, data center consolidation, web-based application, application performance, application delivery network, accelerate, optimize, big-ip
    
F5 Networks Inc
Published By: VMware     Published Date: Feb 26, 2009
This flash provides an overview of how CA ARCserve® Backup r12 provides several new disaster recovery enhancements, including an easy-to-use Disaster Recovery wizard. Together with the replication and application failover functionality in CA XOsoft™ Replication and CA XOsoft™ High Availability, and the integrity testing features in CA XOsoft™ Assured Recovery, these tools enable you to recover servers, applications, and data swiftly and effectively.
Tags : 
ca arcserve, ca xosoft, vmware, restoring database application, bootable cd, bootable tape, cdp, database sessions
    
VMware
Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
"HP customers need to be aware that changes in server market trends are affecting Itanium. Read this Clabby Analytics paper to understand how industry consolidation and new server architectures are driving a new class of applications, leaving Itanium behind.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform
    
IBM MidMarket Demand Generation
Published By: Dell     Published Date: Sep 12, 2013
Organizations everywhere are turning to virtualization, cloud computing, and mobile technologies to support anytime, anywhere access to today’s work load intensive, data-heavy applications. Dell PowerEdge 12th generation servers—built for high performance, 24/7 availability, and uncompromised reliability—can help IT organizations deliver the benefits of these transformative technologies.With cost-saving power, cooling, space, and management efficiencies, Dell’s new servers offer data centers unparalleled performance, efficiency, and reliability for a diverse range of enterprise applications.
Tags : 
data center, dell poweredge 12th generation servers, virtualization, cloud computing, mobile technologies, data-heavy applications, cost-saving power, management efficiencies
    
Dell
Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
    
Cisco
Published By: Red Hat     Published Date: Jun 09, 2014
Read this whitepaper to learn how administrators are leveraging their existing skills to simplify the management of storage and servers.
Tags : 
red hat, server administrators, system administrators, big data, reduce complexity, unstructured data, new technologies, applications
    
Red Hat
Published By: Red Hat     Published Date: Jun 10, 2014
Read this whitepaper to learn how administrators are leveraging their existing skills to simplify the management of storage and servers.
Tags : 
red hat, server administrators, system administrators, big data, reduce complexity, unstructured data, new technologies, applications
    
Red Hat
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.