new applications

Results 376 - 400 of 483Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Computing     Published Date: Feb 06, 2014
A new approach, known as “Big Workflow,” is being created by Adaptive Computing to address the needs of these applications. It is designed to unify public clouds, private clouds, Map Reduce-type clusters, and technical computing clusters. Download now to learn more.
Tags : 
adaptive, ada[tive computing, big data, data center, workload management, servers, cloud, cloud computing, storage, data storage
    
Adaptive Computing
Published By: K2     Published Date: Apr 27, 2015
Download K2’s new white paper, “Make the move from IBM Lotus Notes and optimize your business apps,” to see how the right business-application solution can make all the difference. You will also learn how the right business-application solution can help you quickly rebuild your applications to have greater flexibility and configurability than you had before.
Tags : 
business applications, ibm lotus notes, app environment, it investments, visual tools, reusable components, future app development
    
K2
Published By: Pivot3     Published Date: Sep 27, 2017
Over the last several years, there have been some dramatic changes in enterprise computing. Not only have there been new applications introduced such as business analytics, there have also been important developments in the infrastructure components used to enable these critical application services.
Tags : 
    
Pivot3
Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
    
Tripwire
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization introduces new challenges for managing your data center. Applications now compete for shared resources such as storage, CPU cycles and memory, often causing performance bottlenecks and unhappy customers. This paper details 20 metrics that indicate when capacity issues are occurring and recommends a corresponding tool that will analyze the data and resolve your VM performance issues. Read the White Paper "
Tags : 
vmware, metrics, virtualization
    
Dell
Published By: IBM     Published Date: Mar 18, 2015
What if your organization could take advantage of emerging business opportunities by deploying new applications faster? With IBM PureApplication solutions, companies can build and use a cloud environment faster, easier and with less risk to better engage with their customers and partners.
Tags : 
enterprise applications, the cloud, deployment, pureapplication, applications, cloud environment, enterprise
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
    
IBM
Published By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : 
ibm, forrester, cloud, mobile, mobile applications
    
IBM
Published By: IBM     Published Date: May 25, 2016
Management Strategies for a New Wave of Integrated Applications
Tags : 
ibm, middleware, connect, api, api economy, management strategies, integrated applications
    
IBM
Published By: IBM     Published Date: Sep 15, 2016
This webcast session will discuss and demonstrate a new set of mobile capabilities within the IBM Digital Experience portfolio. These exciting new capabilities enable the line of business to work hand in hand with mobile app developers to deliver personal, adaptive, and relevant content to hybrid or native mobile applications. Come see how a new content authoring experience brings workflow, segmentation, and mobile notifications together to help drive the right mobile app experience for your users.
Tags : 
ibm, commerce, mobile, apps, mobile app, ibm digital experience portfolio
    
IBM
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Topics to be discussed include: - The need for new RAS characteristics in next-gen applications - The benefits of having an agile and scalable platform for workloads running SUSE Linux Enterprise Server on IBM Power Systems
Tags : 
ibm, hardware, systems hardware, linux, linux on power
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
The new IBM MQ Appliance M2001 provides an optimized version of IBM MQ V8 that runs in a hardware appliance. IBM MQ provides universal messaging that allows applications, systems and services to connect and exchange information securely, reliably, rapidly and simply. Offering MQ capability in hardware appliances, additional features are provided, as well as some appliance benefits. This on-demand webcast will help you understand how your business can benefit from the IBM MQ Appliance, and where it can fit into your business today.
Tags : 
ibm, middleware, mq appliance, ibm mq appliance m2001
    
IBM
Published By: IBM     Published Date: Sep 10, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IDC strongly believes that the days of homogenous compute, in which a single architecture dominates all compute in the datacenter, are over. This truth has become increasingly evident as more and more businesses have started to launch artificial intelligence (AI) initiatives. Many of them are in an experimental stage with AI and a few have reached production readiness, but all of them are cycling unusually fast through infrastructure options to run their newly developed AI applications and services on.
Tags : 
    
Group M_IBM Q2'19
Published By: Gomez IT     Published Date: May 23, 2011
Load testing is not a new concept and many of you have probably used various load testing tools prior to major releases with varying degrees of success. Yet, we still see new web applications or newly launched web sites for which performance is not meeting the demands of the customer base.
Tags : 
web performance management, compuware, gomez, andrea mulligan, load testing, saas, web applications, emarketing program, major traffic event, website performance
    
Gomez IT
Published By: Group M_IBM Q1'18     Published Date: Mar 26, 2018
IBM Cloud Identity is a new Identity-as-a-Service (IDaaS) offering which provides your users with rapid and secure access to thousands of popular cloud applications, while enabling single sign-on (SSO) to all their applications, whether from the cloud or on-premise.
Tags : 
identity management, idaas, cloud applications, ibm cloud identity
    
Group M_IBM Q1'18
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Businesses understand more than ever that they depend on data for insight and competitive advantage. And when it comes to data, they have always wanted easy access and fast performance. But how is the situation different now? Today, organizations want those elements and more. They want IT to strip away the limitations of time with faster deployment of new databases and applications. They want IT to reduce the limitations of distance by giving remote and branch offices better and more reliable access. And in a global world where business never stops, they want IT to ensure data availability around the clock. If IT can deliver databases and applications faster, on a more automated and consistent basis, to more locations without having to commit onsite resources, IT will be free to focus on more strategic projects."
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile
    
OutSystems
Published By: IBM     Published Date: Oct 01, 2013
The new IBM System x3650 servers provide the power midmarket customers need to improve the performance of mission-critical applications, such as Microsoft Exchange, while offering dramatic cost savings and environmental customer benefits.
Tags : 
ibm, ibm system x, ibm system x m4, ibm system x m4 servers, servers, midmarket, applications, storage, processor, memory
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.