system application

Results 126 - 150 of 630Sort Results By: Published Date | Title | Company Name

Modern Storage Accelerates Data Insights, Speeding Innovation

Published By: Pure Storage     Published Date: Apr 18, 2018
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage

Eliminate EDA Workflow Bottlenecks

Published By: Pure Storage     Published Date: Oct 09, 2017
Semiconductors run and connect today’s technology-driven world, powering all the electronic systems and products around us. Critical to communication, entertainment, work, medical diagnoses, travel, socializing, and making new discoveries, these specialized chips are ubiquitous. And chip designs grow ever more sophisticated in order to power new generations of devices, computers, the Internet, and the cloud. To enable new applications and use cases – like the Internet of Things – semiconductor vendors have continually pushed the boundaries of their designs to accommodate new fabrication processes that make chips smaller, more power efficient (to make personal devices last longer), and able to pack more gates into smaller dies (to make them more powerful).
Tags : 
verification, storage, customer, innovation, management, pure storage
    
Pure Storage

Living with Arc Flash Mitigation

Published By: Schneider Electric     Published Date: May 20, 2019
Developing an optimal arc flash protection strategy for a given facility can be difficult due to the number of solutions and system variables involved. Effective arc flash hazard reduction is best achieved by establishing an overall system protection strategy that accounts for safety and operational requirements as well as system reliability and availability. An overview of available solution categories and application guidance based on experience in a wide variety of facility types is presented in order to assist engineers trying to implement “safety by design” principles to help deal with arc flash hazards. The approach provided addresses the complexities of the trade-offs between competing priorities and provides tools that help users develop effective protection strategies for the unique circumstances in a given facility.
Tags : 
consulting, protection strategy, schneider electric
    
Schneider Electric

Practical advice for automating a supply chain tech stack

Published By: HERE Technologies     Published Date: Mar 22, 2019
As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs that provide supply chain stacks and applications with greater agility, contextual intelligence, real-time data implementation, speed and scale are turning the process of moving goods from A to B into a well-orchestrated exercise in precision. Introducing new technology into an organization can sometimes be daunting. As one of the world’s leading location platforms, HERE shares insights and tips to streamline the supply chain technology integration across the whole organization.
Tags : 
auto, mapping, location data
    
HERE Technologies

Location intelligence - shaping the future of mobility

Published By: HERE Technologies     Published Date: Mar 25, 2019
In the future, people won’t necessarily want to own cars, but they’ll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: • Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK • Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data • Create a frictionless and compelling UX - with APIs, mapping
Tags : 
auto, mapping, location data
    
HERE Technologies

Magic Quadrant for Cloud Core Financial Management Suites for Midsize, Large and Global Enterprises

Published By: Workday Netherlands     Published Date: Aug 07, 2018
Through 2021, the majority of system integrators and resellers of core financial management suites will have insufficient knowledge of the functionality in current releases, due to the speed with which software vendors introduce new products. By 2023, 50% of all new midsize core financial management application projects and 25% of large and global ones will be public cloud implementations.
Tags : 
cloud solutions, financial management suites
    
Workday Netherlands

The Total Economic Impact of IBM PureApplication System

Published By: IBM     Published Date: May 25, 2016
In June 2014, IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying the IBM PureApplication System. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the IBM PureApplication System on their organizations.
Tags : 
ibm, middleware, ibm pureapplication, total economic impact, forrester, cloud, enterprise applications, cloud computing, business technology
    
IBM

IBM i2 Analyst’s Notebook Premium

Published By: IBM     Published Date: May 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium This document provides an overview of the i2 Analyst’s Notebook Premium product.
Tags : 
ibm, ibm i2, ibm i2 analyst, notebook premium
    
IBM

IBM i2 Analyst’s Notebook Premium

Published By: IBM     Published Date: Jul 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium. This document provides an overview of the i2 Analyst’s Notebook Premium product. For more information on product features and capabilities in specific versions visit: ibm.com/smartercities.
Tags : 
ibm product, analyst notebook premium, product capabilities, information analysis
    
IBM

Automating Fax, Email & EDI Orders into SAP Systems

Published By: Esker     Published Date: Jun 29, 2016
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: - Automate fax, email, EDI, and other orders into SAP applications - Eliminate the cost and errors of manual order processing - Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Automating Fax, Email & EDI Orders into SAP Systems

Published By: Esker     Published Date: Feb 03, 2017
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: Automate fax, email, EDI, and other orders into SAP applications Eliminate the cost and errors of manual order processing Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Quick Demo: Workday Student

Published By: Workday     Published Date: Jan 10, 2019
Workday Student is an end-to-end student and faculty lifecycle information system that works seamlessly with Workday Financial Management, Workday Human Capital Management, and Workday Grants Management to unite the entire campus under one current, configurable, easy-to-use application.
Tags : 
    
Workday

IDC Marketscape – PSA ERP 2017 Report

Published By: Workday     Published Date: Mar 13, 2018
It’s important for services organizations to have a scalable ERP system that is easy to deploy and use. But figuring out which vendor best suits your specific needs can be a challenge. This IDC MarketScape report provides a look into the capabilities service organizations should expect from cloudenabled PSA ERP applications. Read an excerpt of the report to learn what it takes for an ERP system to lead your company into the future.
Tags : 
erp system, cloud, psa
    
Workday

IDC MarketScape: Midmarket ERP Application Advice

Published By: Workday     Published Date: May 09, 2018
"Looking for an agile and scalable ERP system but don’t know where to start? IDC MarketScape has put together a guide specifically for midsize companies. Read an excerpt from the report to learn the capabilities your midsize company should expect from cloud-enabled ERP applications.
Tags : 
    
Workday

Scale-out Storage Helps Optimize Your Storage Infrastructure

Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are shifting from large scale-up approaches to scale-out of clustered storage approaches. The need to increase the levels of storage and application availability, performance, and scalability while eliminating infrastructure or application downtime has necessitated such an architectural shift. This paper looks at the adoption and benefits of clustered storage among firms of different sizes and geographic locations. Access this paper now to discover how clustered storage offerings meet firms’ key requirements for clustered storage solutions and the benefits including: Non-disruptive operations Secure multi-tenancy Scalability and availability And more"
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, storage, data management, data center
    
NetApp

Scale-out Storage Overview: NetApp Data ONTAP 8.2

Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are moving away from monolithic scale-up approaches and adopting scale-out storage – providing a powerful and flexible way to respond to the inevitable data growth and data management challenges in today’s environments. With extensive data growth demands, there needs to be an increase in the levels of storage and application availability, performance, and scalability. Access this technical report that provides an overview of NetApp clustered Data ONTAP 8.2 and shows how it incorporates industry-leading unified architecture, non-disruptive operations, proven storage efficiency, and seamless scalability."
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, non-disruptive operations, storage, business technology, data center
    
NetApp

The 4 Pillars of Mobile Performance – A Primer on App and Site Monitoring

Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring, web application monitoring, mobile website performance, mobile website optimization, mobile web monitoring, keynote, wireless, enterprise applications, business technology, telecom
    
Keynote

Advanced Network Protection with McAfee Next Generation Firewall

Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee

Desktop and Application Virtualization for the 21st Century

Published By: VMware AirWatch     Published Date: Feb 21, 2017
Today’s IT organizations simply cannot afford to continue to manage the end user environment with an out-of-date PC-centric approach to systems management. The cloud, mobility and multiplatform environments render that approach ineffective. It’s time to take another look at virtual application and desktop virtualization technologies. Download this whitepaper to look at VMware Horizon, the most complete solution for delivering, managing and protecting Windows desktops, applications and online services across devices, locations, media and connections, making it ideal for systems management transformation.
Tags : 
    
VMware AirWatch

The Foundation for Cloud-first, Mobile-first IT

Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications., business intelligence, cloud computing
    
Okta

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout

Don't let IT sprawl put your organisation's future in gridlock. Manage growth with a master plan.

Published By: OnBase by Hyland     Published Date: May 17, 2017
IT sprawl can be a serious roadblock to your organization's future success, as disconnected information systems and multiple applications get in the way of overall performance. Instead, put sprawl in its place by thinking like an urban planner. In the complimentary e-book, learn how to manage growth with a master plan that uses a single enterprise information platform.
Tags : 
sprawl, application, content, information, management, system, cio, hyland, onbase, platform, ecm, infrastructure, ebook, scalable, silo, enterprise, data, e-book, storage
    
OnBase by Hyland

Privileged Access Management

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA

Rigorously Test Composite Applications Faster With CA Test Data Manager

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Generate rich virtual data that covers the full range of possible scenarios and provide the unconstrained access to environments needed to deliver rigorously tested applications on time and within budget. Model complex live system data and apply automated rule-learning algorithms to pay off technical debt and uncover in depth understanding of composite applications, while exposing virtual data to distributed teams on demand and avoiding testing bottlenecks.
Tags : 
virtual services, data, avoid project delays, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA

A Beginner's Guide to collectd

Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.