new applications

Results 351 - 375 of 475Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Dec 05, 2016
"All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all-flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale-out solutions have emerged that are designed to power the new cloud services of the future. The book examines various elements of all-flash storage: how it evolved, and why you should now consider it for all of your primary applications. You get acquainted with the NetApp portfolio of all-flash storage solutions and learn how each is designed to meet the needs of a specific type of application environment. You’ll also learn five strategies for making smart decisions about all-flash arrays for your next storage project. In that classic Dummies style, you’ll walk away with useful tips on how to select and deploy all-flash
Tags : 
netapp, database performance, flash storage, storage for dummies, data management, cost challenges
    
NetApp
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Today’s workforce accesses corporate content from the office, home, and everywhere in between. They utilize non-Windows devices including iOS, Android and Mac, and demand that IT support the specialized apps they need to get the job done. Savvy organizations have embraced desktop and application virtualization to meet these demands. Download this asset to learn how Horizon Cloud with on-premises infrastructure represents a new approach to building, delivering and managing virtual workspaces. This radically simple and scalable service unifies the management of on-premises virtual workspace services (desktops and applications) through a centralized cloud control plane, enabling delivery of virtual desktops and apps for as little as $0.50/user.
Tags : 
    
VMware AirWatch
Published By: Mitel     Published Date: Jun 29, 2016
Today’s world of business is increasingly fast-paced, competitive, technology-led and global. Cultural, technological and physical elements are working together to drive a rapid pace of change like never before. From demand for more freedom in the way we work and the Bring Your Own Device (BYOD) trend, to technology innovation and the increasing adoption of new devices, platforms and applications, to the breaking down of international and regional barriers.
Tags : 
best practices, business optimization, business management, productivity
    
Mitel
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
    
Palo Alto Networks
Published By: Rackspace     Published Date: Mar 08, 2016
Moving existing line-of-business (LOB) applications to the cloud can be a daunting task. In this white paper, find out how Rackspace makes moving to the Microsoft cloud easy by: • Assessing current system and applications with one of 250+ Microsoft Experts • Understanding how to utilize new cloud capabilities based on our over 15 years of Microsoft Cloud experience • Manage, monitor and secure migrated applications and workloads 24x7x365
Tags : 
microsoft azure, cloud computing, business solutions
    
Rackspace
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Add more value to your business Independent Software Vendors (ISVs) are turning to the cloud to modernize their applications and get rid of their commercial database dependencies to improve application performance, lower total cost of ownership (TCO), and reach new customers. DB Best delivers the established processes and technology ISVs need to accelerate the modernization of applications still running on commercial databases to Amazon Aurora. This enables your customers to quickly get up-and-running on the cloud and drive greater business value through Amazon Web Services (AWS). View the webinar to learn how DB Best and AWS enable you to accelerate every stage of your application modernization journey – from evaluating the right migration path for your application, to following a proven and repeatable database migration process, to driving growth and reaching more customers.
Tags : 
    
AWS
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege
    
Centrify Corporation
Published By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
    
OKTA
Published By: SAS     Published Date: Mar 06, 2018
Today's artifical intelligence (AI) solutions are not sentient in the manner popularized in science fiction by scores of self-aware and typically nefarious androids. Even so, the ability to arm such systems with the ability to directly sense and respond to their in situ environment is critical. Why? In the future, our experiences will be smart, intuitive and informed by analytics that are not seen but felt via new business, personal and operational engagement models. Enabling this interaction requires AI applications that can sense, analyze and respond to their environment in an intelligent and interactive manner. Without requiring the end user to write, understand or interpret code. “Sensitive” artificial intelligence enables: • More productive use of expanded (big, often unstructured) information sources • Intuitive man-machine interactions (no code-speak here!) • Adaptive, immersive experiences and environments As frequently touted on the nightly news, AI’s popularity is clear. Ho
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
    
SAS
Published By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : 
idirect, satellite communications, technology, smart grid, utility companies
    
iDirect
Published By: WebEx Communications     Published Date: Dec 14, 2007
Enterprises around the world are discovering new ways to optimize business processes using on-demand web services. These businesses use WebEx online collaboration applications to reach, educate, and support a growing number of employees and customers. Companies can now collaborate anywhere, any time, without boundaries.
Tags : 
online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos, online presentations, interactive selling, desktop support, remote support, helpdesk, webex
    
WebEx Communications
Published By: The FeedRoom     Published Date: Mar 31, 2009
Many companies still are experimenting with different ways to use Web video in order to squeeze more efficiency out of their on-going operations. New, creative applications of the technology are emerging every day, helping organizations to achieve high returns on investment from their spending on the technology.
Tags : 
feedroom, communications, web, video, online video, emerging markets, video enhancement, outbound marketing, rich media, multimedia
    
The FeedRoom
Published By: HP     Published Date: Jan 19, 2012
Our networks are under great strain today - more data, video, audio, new applications, mobility, virtualization and so much more. In this program, leading experts from Gartner and HP address your most pressing questions and concerns, including what challenges are weighing most on the public sector?
Tags : 
technology, networking, puiblic sector organizations, solutions
    
HP
Published By: Adaptive Computing     Published Date: Feb 06, 2014
A new approach, known as “Big Workflow,” is being created by Adaptive Computing to address the needs of these applications. It is designed to unify public clouds, private clouds, Map Reduce-type clusters, and technical computing clusters. Download now to learn more.
Tags : 
adaptive, ada[tive computing, big data, data center, workload management, servers, cloud, cloud computing, storage, data storage
    
Adaptive Computing
Published By: K2     Published Date: Apr 27, 2015
Download K2’s new white paper, “Make the move from IBM Lotus Notes and optimize your business apps,” to see how the right business-application solution can make all the difference. You will also learn how the right business-application solution can help you quickly rebuild your applications to have greater flexibility and configurability than you had before.
Tags : 
business applications, ibm lotus notes, app environment, it investments, visual tools, reusable components, future app development
    
K2
Published By: Pivot3     Published Date: Sep 27, 2017
Over the last several years, there have been some dramatic changes in enterprise computing. Not only have there been new applications introduced such as business analytics, there have also been important developments in the infrastructure components used to enable these critical application services.
Tags : 
    
Pivot3
Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
    
Tripwire
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization introduces new challenges for managing your data center. Applications now compete for shared resources such as storage, CPU cycles and memory, often causing performance bottlenecks and unhappy customers. This paper details 20 metrics that indicate when capacity issues are occurring and recommends a corresponding tool that will analyze the data and resolve your VM performance issues. Read the White Paper "
Tags : 
vmware, metrics, virtualization
    
Dell
Published By: IBM     Published Date: Mar 18, 2015
What if your organization could take advantage of emerging business opportunities by deploying new applications faster? With IBM PureApplication solutions, companies can build and use a cloud environment faster, easier and with less risk to better engage with their customers and partners.
Tags : 
enterprise applications, the cloud, deployment, pureapplication, applications, cloud environment, enterprise
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.