legacy applications

Results 1 - 25 of 98Sort Results By: Published Date | Title | Company Name

Automate Migration to the Cloud with mLogica and AWS

Published By: AWS     Published Date: Jul 25, 2019
What you'll learn in this webinar: Simplify the move from legacy commercial databases or niche database solutions to Amazon Web Services (AWS) with help from experts in database migration and automation software solutions from mLogica. Watch our webinar to hear how you can transform your legacy environment to an AWS cloud-native infrastructure by migrating to Amazon Aurora. Using mLogica’s fully automated, self-learning mLogica Database Migration Studio, and consultancy service, you can modernize your databases and applications without disrupting your daily operations. Join our webinar to learn how: mLogica helped TicketSocket unify and simplify its data and gain efficiencies of cost and scale You can move enterprise, mission-critical complex databases to AWS You can break free of commercial licensing obligations
Tags : 
    
AWS

Managing Access to Legacy Web Applications with Okta

Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA

A global bank’s 3 step strategy for unlocking legacy systems

Published By: MuleSoft     Published Date: Nov 27, 2018
IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: The bank’s legacy modernization strategy, and how they used Anypoint Platform Best practices for modernizing legacy SOA web services How to think about re-architecting monolithic applications into microservices The role that APIs play in driving an effective legacy modernization strategy
Tags : 
    
MuleSoft

An IT Strategy to Support the Modern Analytics-Driven Business

Published By: Dell PC Lifecycle     Published Date: Mar 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle

An IT Strategy to Support the Modern Analytics-Driven Business

Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle

An IT Strategy to Support the Modern Analytics-Driven Business

Published By: Dell Server     Published Date: Aug 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization. Forward-thinking IT organizations are developing new infrastructure strategies to better support high-value analytics workloads with Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor.
Tags : 
    
Dell Server

Are Your Legacy Applications Suitable For The Cloud?

Published By: Riverbed     Published Date: Jun 02, 2015
Learn about the 3 critical evaluation activities to ensure migration success.
Tags : 
the cloud, legacy application, implementation, integration costs, legacy services, cloud migration, operational expenditure, capital expenditure
    
Riverbed

Assess, Containerize, and Optimize Legacy Microsoft Windows Server and SQL Server on AWS

Published By: AWS     Published Date: Feb 19, 2019
Microsoft Windows Server 2008 and SQL Server 2008 are nearing end of support, so now is the time to include these Microsoft workloads into your cloud migration strategy. Learn how this will set the stage to help you accelerate digital transformation, increase innovation and reduce the costs of your legacy and corporate applications.
Tags : 
    
AWS

Beyond Postfix and Sendmail

Published By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : 
email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform
    
ColdSpark

Big Data Multi-Cloud eBook

Published By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
    
BMC ASEAN

Boost Your Manufacturing Digital Transformation Webcast

Published By: Cisco     Published Date: Jun 21, 2016
The new age of digital manufacturing is expected to drive dramatic business improvements for companies transitioning from legacy automation systems. Manufacturers can create a foundation for a highly integrated and intelligent decision-making value chain by connecting existing industrial sub-systems, sensors and machines with enterprise applications.
Tags : 
    
Cisco

Building Better Networks for State and Local Governments.

Published By: Ciena     Published Date: Nov 15, 2016
"Economic conditions have changed the operating landscape for government and educational organizations. Modern, converged networks utilize advanced optical and Ethernet technologies to form a highly flexible and scalable infrastructure capable of delivering many emerging applications and ready to scale far into the future. Additional benefits of building better networks for state and local governments include: >Better public service at lower taxpayer cost >Support for emerging applications in transportation, public safety, healthcare, and education >A graceful technology migration from legacy to converged network > Preparation for future, unplanned government applications Download ""Building Better Networks for State and Local Governments"" to discover more today."
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena

Building Microservices for Speed and Agility

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
You want to deliver new innovations, release apps faster and take advantage of new opportunities, but legacy applications and infrastructure are holding you back. Transition to a modern architecture by decomposing monolithic applications into agile microservices—independently created, managed and scaled. Your business will be able to act faster and developers will love the easy access to APIs that give them the freedom to focus on customer experience.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA

CIO's Guide To Open Application Development

Published By: Google     Published Date: Apr 30, 2018
"Pressure on IT to deliver new functionality continues to drive faster software development cycles. While agility has always been important, today’s IT teams must operate in a hybrid environment where applications take various forms: legacy systems that remain on-prem, existing applications migrated to the cloud, and new applications built with cloud-native approaches. The combination makes for an increasingly complex IT landscape — one in which simply migrating to the cloud falls short. Read this Google Cloud guide and learn how IT leaders can better meet today’s challenges by capitalizing on the historic shift toward open, connected environments."
Tags : 
    
Google

Cloud For Dummies E-Book

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418

Cooperative Control Wireless LAN Architecture

Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive
    
Aerohive

Critical Application And Business KPIs For Successful Cloud Migration

Published By: AppDynamics     Published Date: Sep 25, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics

Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks

Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps, application security
    
Palo Alto Networks

Data Protection with ViPR: Redefining Disaster Recovery for Software-Defined Storage

Published By: EMC Corporation     Published Date: Dec 01, 2014
Data is changing the way organizations manage, consume, and deliver storage. Many legacy applications, however, are still in traditional storage silos, where data is tied to specific vendor storage and not easily configurable and monitored. EMC ViPR is the lightweight, software-only solution that centralizes, automates, and transforms storage into a simple, extensible and open platform.
Tags : 
data protection, availability, disaster recovery, easy configurable, vendor storage, data center
    
EMC Corporation

Develop Apps, Mobile to COBOL with CA Technologies

Published By: CA Technologies     Published Date: Jul 26, 2017
To deliver on the potential for transformative innovation, businesses must maximize the latent value of legacy application code and data—and fast. Talking Points: • Go Agile with Agile processes and tools that speed innovation on legacy applications • Onboard your team quickly with modern toolsets and languages that seamlessly integrate legacy code • Integrate legacy code and simplify how you manage the software development lifecycle
Tags : 
    
CA Technologies

ESG White paper: Modernizing IT infrastructure to Empower Business

Published By: HPE Intel     Published Date: Mar 14, 2016
The ever-rising tide of demands on IT organizations is creating constant pressure on their leaders to upgrade or replace their outmoded legacy systems with new infrastructure technologies that will allow them to keep pace with the speed of business. It is no longer sufficient to manage basic business applications and resources such as ERP, email, and silos of heterogeneous data. The bar has been raised higher than ever, and the role of IT is evolving to meet it. As a result, IT must support applications and services that make it possible for the business to provide new, diverse customer experiences while generating expanding revenues via the emergent crown jewels of business: big data, cloud, and mobility.
Tags : 
    
HPE Intel

Financial Services PaaS & Private Clouds: Managing and Monitoring Disparate Environments

Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability, enterprise applications
    
MuleSoft

Fulfilling the Promise of the Digital Workspace

Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch

Fulfilling the Promise of the Digital Workspace

Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware

Gartner - The Edge Completes the Cloud

Published By: Equinix APAC     Published Date: Feb 25, 2019
The Edge Completes the Cloud Edge computing delivers the decentralized complement to today’s hyperscale cloud and legacy data centers. To maximize application potential and user experience, enterprise architects and technology innovation leaders need to plan distributed computing solutions. Enabling this thinking is that although the cloud is becoming mainstream, that does not imply that all workloads will be placed in the cloud during the next decade or so. Technical incompatibilities, decades of embedded business logic in mainframe applications, government regulations and simple economics all conspire to keep some workloads out of the cloud, driving us toward a hybrid multi cloud future.
Tags : 
    
Equinix APAC
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.