system application

Results 326 - 350 of 644Sort Results By: Published Date | Title | Company Name

Why Learning is Critical to Strategic Talent Management

Published By: Intelladon     Published Date: Mar 08, 2012
Read this white paper to learn how to combine the best learning management system and talent management application to maximize revenue growth by addressing learning's role in onboarding, performance, succession, compensation and social networking.
Tags : 
learning management, talent management, learning management system
    
Intelladon

Mobile Apps Advance Customer Self-Service

Published By: Interactive Intelligence     Published Date: Oct 10, 2012
Nearly two-thirds of customers who try to solve issues online or through an interactive voice response (IVR) system inevitably choose to speak with an agent. Can smartphone applications change this interaction landscape for the better?
Tags : 
mobile apps, mobile self-service, mobile applications, customer interactions, business technology
    
Interactive Intelligence

Defining the Rules for Preemptive Host Protection

Published By: Internet Security Systems     Published Date: Aug 21, 2009
Protecting desktop and server, or host systems has rapidly become a high priority for organizations that want to ensure uptime and the availability of day-to-day business applications. Today's hybrid threats are growing faster, more complex and more destructive.
Tags : 
intrusion prevention, high availability, network security, iss, internet security, web security, malware, internet security systems
    
Internet Security Systems

Red Hat Jboss BRMS 6 Compared to IBM Operational Decision Manager

Published By: JBoss Developer     Published Date: Jan 25, 2016
Each Red Hat® JBoss® BRMS subscription provides a compelling combination of technology, including a business rules management system (BRMS), complex event processing (CEP), system management, and an application platform to run it all on. In comparison, IBM Operational Decision Manager provides BRMS and CEP capabilities. Check out the differences between Red Hat JBoss BRMS 6 and IBM Operational Decision Manager 8.5.1. in this competitive review.
Tags : 
red hat jboss brms, cep, system management, application platform, application developers, business rules, it management, knowledge management
    
JBoss Developer

Achieve a Succesful Microservices Architecture

Published By: JBoss Developer     Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
Tags : 
microservices, architecture, java, paas, soa, linux, database development
    
JBoss Developer

Enterprise Collaboration Shouldn’t Be a Pile of Legos

Published By: Jive     Published Date: Feb 12, 2015
Remember getting your first box of LEGOS as a kid? How fun it was putting the pieces together, collaborating with your friends to create something new? Now, as an IT professional, assembling and maintaining a Lego-like collaboration infrastructure isn’t what you signed up for. Piecing together disparate systems of record for email, web meetings and other applications is about as painful as stepping on a pile of Legos. Download the e-book to learn how implementing a collaboration system connects systems of record the easy way.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication
    
Jive

How to Choose Your Applicant Tracking System

Published By: Jobvite     Published Date: May 15, 2017
An Applicant Tracking System (ATS) is a software application specifically designed to automate the recruitment and hiring process. ATS solutions provide hiring managers with the tools they need to intelligently monitor and progress candidates throughout the hiring process
Tags : 
    
Jobvite

Creating the Network for the Future Digital Financial Institution

Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Connecting Physical and Virtual Networks with VMware NSX and Juniper Platforms

Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Building a Software-Defined Secure Network for Financial Services

Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

National Credit Union Federation of Korea Modernizes Its Data Center

Published By: Juniper Networks     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks

A Smarter Way to Integrate with SharePoint

Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions, networking, it management, knowledge management
    
K2

Endpoint Security

Published By: Kaseya     Published Date: Mar 12, 2015
Fighting Cyber Crime with Automated, Centralized Management
Tags : 
cyber crime, automation management systems, network security, software applications, network infrastructure, infrastructure, network management, network performance
    
Kaseya

Backup & Disaster Recovery Services

Published By: Kaseya     Published Date: Mar 12, 2015
Providers who add BDR to their offerings can enjoy substantial profit margins and incremental monthly recurring revenue. BDR, therefore, is ideal for solution providers, especially as a first step to a managed services practice.
Tags : 
backup, data loss, risks, recovery services, humor error, program deletions, hardware failures, system crashes
    
Kaseya

The Threat Landscape

Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud
    
Kaspersky Lab

The 4 Pillars of Mobile Performance – A Primer on App and Site Monitoring

Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring
    
Keynote

Forget the ABC's of Lead Scoring

Published By: LeadLife Solutions     Published Date: Oct 20, 2008
If your sales team loves your ABC lead-ranking system because it really works, good for you. However, if your Hot-Warm-Whatever system is leaving the sales team cold, there is a better way. A robust database and campaign management application helps marketing score every interaction by every lead, online and offline, and prioritize leads automatically for appropriate next steps...
Tags : 
leadlife solutions, e-newsletter, blog, telemarketing, trade show, direct mail, webinar
    
LeadLife Solutions

Lenovo X6 Mission Critical Servers

Published By: Lenovo and Intel®     Published Date: Oct 18, 2016
Mission critical servers require availability and reliability of systems and applications that are essential for customer interaction, commerce, and employee productivity. Read this infographic and learn how Lenovo helps meet these demands.
Tags : 
lenovo, x6 mission, server, customer interaction, business technology
    
Lenovo and Intel®

Learning Management Systems: Development Strategies for the Next Generation

Published By: Lionbridge     Published Date: Nov 19, 2009
This paper will interest ISV product managers and engineers of educational software products, chief learning officers and chief technology officers of corporate universities, along with information technology personnel at the community and state college level, including developers of custom applications & application services.
Tags : 
learning management systems, srcom 2004, saas, cms, ldap-based sso, isv product managers, educational software products, custom applications
    
Lionbridge

5 Considerations for Your Video Communication and Collaboration Strategy

Published By: Logicalis     Published Date: Sep 10, 2014
Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs. Download this white paper to learn how.
Tags : 
logicalis, cisco, cisco systems, video communication, video solutions, enterprise video technologies, enterprise applications, employee collaboration
    
Logicalis

5 Considerations for Your Video Communication and Collaboration Strategy

Published By: Logicalis     Published Date: Sep 22, 2014
Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs. Download this white paper to learn how.
Tags : 
logicalis, cisco, cisco systems, video communication, video solutions, enterprise video technologies, enterprise applications, employee collaboration
    
Logicalis

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout

3 Ways To Reduce Third-Party Application Risk and Strategies to Protect Endpoints

Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
    
Lumension

Top 8 Things To Secure on iOS and Android to Protect Corporate Information

Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension

Improving Server Performance and Security: An Impact Comparison of Application Control and Tradition

Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.