system application

Results 126 - 150 of 644Sort Results By: Published Date | Title | Company Name

CIO's Guide To Open Application Development

Published By: Google     Published Date: Apr 30, 2018
"Pressure on IT to deliver new functionality continues to drive faster software development cycles. While agility has always been important, today’s IT teams must operate in a hybrid environment where applications take various forms: legacy systems that remain on-prem, existing applications migrated to the cloud, and new applications built with cloud-native approaches. The combination makes for an increasingly complex IT landscape — one in which simply migrating to the cloud falls short. Read this Google Cloud guide and learn how IT leaders can better meet today’s challenges by capitalizing on the historic shift toward open, connected environments."
Tags : 
    
Google

Making a DDoS Protection Plan: 8 Best Practices

Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Making a DDoS Protection Plan: 8 Best Practices

Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies

Making a DDoS Protection Plan: 8 Best Practices

Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Making a DDoS Protection Plan: 8 Best Practices

Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Best Practices for Implementing Retail Distributed Order Management Systems

Published By: IBM     Published Date: Apr 25, 2018
Many retailers are investing in distributed order management systems to optimize their consumer order fulfilment performance. Chief supply chain officers can use this research to successfully implement these systems into their business application landscape.
Tags : 
b2c, ibm, order management, supply chain
    
IBM

Modern Storage Accelerates Data Insights, Speeding Innovation

Published By: Pure Storage     Published Date: Apr 18, 2018
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage

Blockchain benefits for electronics

Published By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : 
ibm, blockchain, electronics
    
IBM

Lost in the Cloud? Top Challenges Facing CIOs in a Cloud-Native World

Published By: Dynatrace     Published Date: Apr 16, 2018
Based on a global survey of 800 CIOs, this report examines the challenges organizations face when working within complex, cloud-centric ecosystems. Technology is at the heart of every organization today. Now more than ever, society expects the services we use to be innovative and faultless, prompting the creation of hyper-complex IT ecosystems. Relying on physical databases and third-party cloud service providers, businesses are finding it increasingly difficult to monitor application performance, ensure positive experiences, and succeed in this new environment.
Tags : 
    
Dynatrace

Mastering the operational complexity of IoT Applications

Published By: Dynatrace     Published Date: Apr 16, 2018
Internet-of-things (IoT) is increasing in excitement across all industries as they look to provide innovation in their product and services, and monitor risks and costs in their business operations. But IoT is not a single technology. It is an ecosystem of human and non-human touchpoints that span across multiple technologies. This creates a dynamic and complex environment that is difficult to see and manage in scope. The traditional monitoring approach of watching dashboards, responding to alerts, and manually analyzing doesn’t work anymore. Today’s hyper-dynamic, highly distributed IoT application environments have become way too complex and move too quickly. The volume, velocity, and variety of information is simply more than humans can keep up with using traditional tools.
Tags : 
    
Dynatrace

Making a DDoS Protection Plan: 8 Best Practices

Published By: Akamai Technologies     Published Date: Apr 13, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

Designing Distributed Systems

Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure

6 Steps to Build a Holisitc Security Strategy with Microsoft 365

Published By: Microsoft Azure     Published Date: Apr 05, 2018
Securing data and systems is a top priority for organizations. But meeting this challenge gets more difficult every day as attacks grow more sophisticated, employees use a wider array of devices and applications, and data flows into and out of your business in more ways
Tags : 
    
Microsoft Azure

AFP Guide to Integrated Business Planning

Published By: Anaplan     Published Date: Mar 29, 2018
The concept of integrated business planning — closing gaps in an organization’s various planning functions and aligning operations and strategy with its financial performance — has existed in various forms for decades. What has changed is creation of planning platforms that can handle the fluidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
afp, ibp, business, organizations, enterprise, data, systems
    
Anaplan

The Business Value of Progress Health Cloud

Published By: Progress     Published Date: Mar 26, 2018
Digital transformation has changed the face of business across the globe. New digital technologies— specifically, mobile devices—are opening new avenues for companies to engage their prospects and manage their operations with greater effectiveness and efficiency. However, in the healthcare space, the response to these technological innovations has been reserved. While it’s undeniable that digital transformation could bring great change to the healthcare space just as it has in other industries, obstacles like regulatory compliance and rigid systems of record discourage the adoption of new tools and technology. This has led to frustration from all sides of the healthcare ecosystem. Many people are accustomed to using intuitive digital applications in their everyday lives, so when healthcare applications deliver archaic user experiences, everyone is left wanting more. Patients and members want applications that enable them to manage their health more easily. Providers want to provide new
Tags : 
    
Progress

Capitalize on your unstructured data with MongoDB

Published By: IBM APAC     Published Date: Mar 19, 2018
MongoDB, one of the most popular NoSQL Open databases, helps you take advantage of exploding unstructured data with faster access to data and analytics while reducing your database cost. With the right infrastructure, you can benefit more. By running MongoDB on IBM Power systems, you can achieve: • ?Bring new apps to market faster and reduce the risk for mission-critical deployments • ?2.6x better performance for MongoDB at a much lesser cost than x86 Find out more about IBM Power Systems and MongoDB for today’s applications.
Tags : 
    
IBM APAC

Synchronous Replication with Automatic Failover

Published By: Pure Storage     Published Date: Mar 15, 2018
Organizations do everything they can to maintain business continuity, as this significantly impacts their competitiveness and profitability. The cost of downtime is enormous; depending on the industry, organizations lose hundreds of thousands to millions of dollars for every hour of downtime from lost productivity and revenue, missed opportunities, and loss of reputation and customers. When ESG surveyed organizations about their downtime tolerance for primary production servers or systems, 51% reported that they could tolerate high priority applications being down for less than an hour, and 29% could tolerate high priority applications having less than 15 minutes of downtime.1
Tags : 
    
Pure Storage

Worldwide All-Flash Array 2017 Vendor Assessment

Published By: Pure Storage     Published Date: Mar 15, 2018
The all-flash array (AFA) market has undergone significant maturation over the past two years. A high percentage of customers have already committed to an "all flash for primary storage" strategy, and every customer interviewed for this study was among those. In 2017, AFAs will drive over 80% of all primary storage revenue. All of the established storage vendors have entered this space, and there are several start-ups with over $100 million in revenue. With this level of market maturation, multiple segments have developed within the primary flash array space. There are systems targeted for dedicated application deployment, there are systems specifically for web-scale applications, and there are systems intended for dense mixed workload consolidation. These latter systems are driving most of the AFA revenue, and they aspire to become the primary storage platforms of record for enterprises of all sizes. This study evaluates the suitability of 10 vendors' AFA platforms for dense mixed ent
Tags : 
    
Pure Storage

IDC Marketscape – PSA ERP 2017 Report

Published By: Workday     Published Date: Mar 13, 2018
It’s important for services organizations to have a scalable ERP system that is easy to deploy and use. But figuring out which vendor best suits your specific needs can be a challenge. This IDC MarketScape report provides a look into the capabilities service organizations should expect from cloudenabled PSA ERP applications. Read an excerpt of the report to learn what it takes for an ERP system to lead your company into the future.
Tags : 
erp system, cloud, psa
    
Workday

Making Sense of AI

Published By: SAS     Published Date: Mar 06, 2018
Today's artifical intelligence (AI) solutions are not sentient in the manner popularized in science fiction by scores of self-aware and typically nefarious androids. Even so, the ability to arm such systems with the ability to directly sense and respond to their in situ environment is critical. Why? In the future, our experiences will be smart, intuitive and informed by analytics that are not seen but felt via new business, personal and operational engagement models. Enabling this interaction requires AI applications that can sense, analyze and respond to their environment in an intelligent and interactive manner. Without requiring the end user to write, understand or interpret code. “Sensitive” artificial intelligence enables: • More productive use of expanded (big, often unstructured) information sources • Intuitive man-machine interactions (no code-speak here!) • Adaptive, immersive experiences and environments As frequently touted on the nightly news, AI’s popularity is clear. Ho
Tags : 
    
SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.