system application

Results 251 - 275 of 644Sort Results By: Published Date | Title | Company Name

Turbo LAMP White Paper

Published By: IBM     Published Date: Oct 06, 2016
With the rise of cloud computing and mobile technologies the desire would be to have a LAMP stack that can be optimized for dynamic scale out as well as scale up virtualized infrastructures that can take advantage of the capabilities of the latest POWER8 architecture from IBM and its OpenPOWER partners. Building upon the collaboration gained with POWER8 and the OpenPOWER Foundation, IBM is uniquely positioned to deliver a more robust and high performing stack by working with key component providers while still allowing interchangeability of the components.
Tags : 
cloud computing, ibm, ubuntu, power8, operating systems, web applications, network performance, database development
    
IBM

The Top 20 Tools Needed for Hybrid IT

Published By: Viavi Solutions     Published Date: Sep 30, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world. Today’s IT environment provides greater promise than ever before. New technologies are driving new capabilities and even more opportunities to differentiate. The opportunity for innovation has never been greater: faster compute, more storage, and new applications all working together to drive greater efficiency and greater power. But this wave of innovations has also added greater complexity since one failure in this increasingly complex IT stack means a failure of the entire service. New consumer-focused cloud based applications are setting a high standard—nearly 100% up time with peak performance all while IT.
Tags : 
    
Viavi Solutions

Safeguard Sensitive Data Against Insider Threats and External Attacks: Top 5 scenarios

Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM

Securing the Unpatchable: How to Prevent Security Breaches on Endpoints Is Not an Option

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks

Becoming a Customer Company

Published By: MuleSoft     Published Date: Sep 08, 2016
Enterprises are adopting more and more SaaS applications and customers are interacting with companies from an increasing number of channels. Many companies are not ready to provide the level of engagement, service and support their customers demand. New applications are added to the company’s ecosystem, but not connected with the existing applications. Customer data is inconsistent and not synced across a customer’s lifecycle.
Tags : 
mulesoft, microservices, digital transformation, business value, it support, business management, business process automation, business process management
    
MuleSoft

The Future of Mobile Selling — Getting More from your CRM

Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management
    
Tact

Cloud to the Core

Published By: Oracle     Published Date: Aug 31, 2016
What happened to Moore’s Law? Why is Oracle releasing a new SPARC processor with fewer cores and threads? The SPARC S7’s core processors are 50 percent to 100 percent more efficient than x86 processors. SPARC S7 delivers up to 10 times more-efficient data analytics and machine learning than x86-based systems. The new SPARC S7 is available in servers, an engineered system, and a cloud service at the same price as the Oracle Cloud x86 Compute service. The SPARC S7 processor makes it possible to build powerful, scalable, and cost-effective systems be it for application scale-out, on premise or public cloud.
Tags : 
    
Oracle

Buyer's Guide: How to Compare All-Flash Arrays

Published By: NetApp     Published Date: Aug 26, 2016
The technical and financial advantages of solid state drives are driving a rapid transition from hard disk-drive (HDD) and hybrid-flash array (HFA) storage systems to all-flash arrays (AFAs). The white paper identifies some of the key considerations for evaluating all-flash storage infrastructure for three major uses cases: standalone applications, virtualized applications, and next-generation cloud services.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

Evaluator Group: Investing Strategically in All Flash Arrays

Published By: NetApp     Published Date: Aug 26, 2016
For customers looking to implement flash for primary data center storage, NetApp's All Flash FAS systems offer some significant advantages over competitive offerings. Customer can deploy All Flash FAS arrays for specific applications now and later extend them to private and hybrid cloud-based applications as enterprise IT's longer term strategy dictates. Read this technology insight paper on investing strategically in all flash arrays.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

Acceptable Use Policy

Published By: NAVEX Global     Published Date: Aug 18, 2016
This guide provides an example of an acceptable use policy of computer systems at an organization.
Tags : 
policy, policy of computer systems, security, security application, application security, policy based management, security management, security policies
    
NAVEX Global

Application Delivery Services: The Key to Successful Integrated Systems Deployments

Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Data center refresh cycles and new initiatives tied to business growth and revenue opportunities are leading more organizations to deploy integrated systems, including both converged and hyper-converged infrastructures. IT leaders can see the potential benefits of converged, integrated systems but as applications increase in complexity, virtual workloads grow, and resource demands expand, managing these applications becomes a critical and often stubborn challenge.
Tags : 
application delivery services, systems deployments, integration, idg research, integrated system approach, networking, security, enterprise applications
    
F5 Networks Inc

Operationalizing and Embedding Analytics for Action

Published By: SAS     Published Date: Aug 03, 2016
As the pace of business continues to accelerate, forward-looking organizations are beginning to realize that it is not enough to analyze their data; they must also take action on it. To do this, more businesses are beginning to systematically operationalize their analytics as part of a business process. Operationalizing and embedding analytics is about integrating actionable insights into systems and business processes used to make decisions. These systems might be automated or provide manual, actionable insights. Analytics are currently being embedded into dashboards, applications, devices, systems, and databases. Examples run from simple to complex and organizations are at different stages of operational deployment.
Tags : 
best practices, embedding analytics, technology, data, operational analytics, business analytics, business management, business technology
    
SAS

The Foundation for Cloud-first, Mobile-first IT

Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

The Foundation for Cloud-first, Mobile-first IT

Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas
    
Okta

Securing Productivity in the Borderless Enterprise

Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology, business intelligence, business management
    
Microsoft

Get started with Puppet on Windows: 9-part recorded webinar series

Published By: Puppet     Published Date: Jul 05, 2016
Our recorded Windows webinar series covers all the basics and more to help you get started with Puppet. Each 45-minute recording focuses on a specific task you can automate with Puppet, as well as a demo of how it works. You’ll learn how to use automation to: • Manage local groups and Active Directory membership. • Manage Windows services, install packages and create scheduled tasks. • Deploy IIS and ASP.NET. • Set up Windows for system and application monitoring. • Get started on Azure with Puppet. Puppet can do a lot, so start small and build on each success. Enjoy the demos!
Tags : 
    
Puppet

Automating Fax, Email and EDI Orders into ERP Systems

Published By: Esker     Published Date: Jun 29, 2016
In a perfect world, every sales order your company receives would go straight into your ERP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: - Automate fax, email, EDI, and other orders into ERP applications - Eliminate the cost and errors of manual order processing - Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence, business process management
    
Esker

Automating Fax & Email Orders into ERP Systems

Published By: Esker     Published Date: Jun 29, 2016
In a perfect world, every sales order your company receives would go straight into your business system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: - Automate fax, email, EDI, and other orders into your ERP or other business applications. - Eliminate the cost and errors of manual order processing - Consolidate resources to simplify your IT landscape. You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Automating Fax, Email & EDI Orders into SAP Systems

Published By: Esker     Published Date: Jun 29, 2016
In a perfect world, every sales order your company receives would go straight into your SAP system. But in reality, orders sent by fax and email end up as paper that gets pushed around the office. And those are the ones that cost the most to process. Learn about a solution to: - Automate fax, email, EDI, and other orders into SAP applications - Eliminate the cost and errors of manual order processing - Consolidate resources to simplify your IT landscape You’ll also find out how the technology works and what it has done for other businesses.
Tags : 
sales, solutions, best practices, business process, business management, business intelligence
    
Esker

Spotlight: Increasing Enterprise Application Performance with Flash Storage

Published By: NetApp     Published Date: Jun 27, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

Boost Your Manufacturing Digital Transformation Webcast

Published By: Cisco     Published Date: Jun 21, 2016
The new age of digital manufacturing is expected to drive dramatic business improvements for companies transitioning from legacy automation systems. Manufacturers can create a foundation for a highly integrated and intelligent decision-making value chain by connecting existing industrial sub-systems, sensors and machines with enterprise applications.
Tags : 
    
Cisco

Cisco Intelligent WAN Design Guide Summary

Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco

Magic Quadrant for the CRM Customer Engagement Center

Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega

Magic Quadrant for the CRM Customer Engagement Center

Published By: Pega     Published Date: Jun 21, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems.
Tags : 
    
Pega

Brief: Integrating Flash Storage with Enterprise Applications

Published By: NetApp     Published Date: Jun 03, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
    
NetApp
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.