> Home

platforms

Results 851 - 875 of 886Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Mar 05, 2018
Did you know that by 2020, 50% of analytic queries will be generated using search, natural-language processing or voice, or will be automatically generated? Read the Gartner report Technology Insight for Modern Analytics and Business Intelligence Platforms and find out how to meet the time-to-insight demands of today's competitive business environment. Learn how to: • Determine when to use existing, traditional BI technologies versus modern analytics and BI • Broaden data access beyond relational systems • Adopt new approaches to data modeling
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: IBM     Published Date: Apr 06, 2015
Far from being out of date, mainframes are used around the world to build robust, trusted clouds. Increasingly, organizations are turning to cloud computing to improve their IT responsiveness and to reduce costs. And for enterprise workloads, which require highly reliable and secure platforms to meet demanding service levels, many companies are building their clouds using a mainframe.
Tags : 
ibm, cloud computing, cost reduction, next generation mainframe, bandwidth management, infrastructure, network performance management, web services
    
IBM
Published By: VMware AirWatch     Published Date: Oct 12, 2015
Organizaciones necesitan encontrar la forma de restringir el acceso de O365.
Tags : 
airwatch, emm, office 365, cloud, enterprise applications, platforms, data management, application performance management, best practices, business analytics, business intelligence, business management
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Oct 12, 2015
Quello di cui le organizzazioni hanno bisogno è un metodo per limitare l’accesso ad O365.
Tags : 
airwatch, emm, office 365, cloud, enterprise applications, platforms, data management, application performance management, best practices, business intelligence, business management
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
    
VMware AirWatch
Published By: IBM     Published Date: Oct 06, 2015
This Edison Group study provides an overview of three of the market leading MADPs -- IBM, SAP and Koney -- and discusses how they compared them using a real-world use case.
Tags : 
networking, it management, mobile computing, mobile data systems, mobile workers
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Many internal control programs are still undergoing major modifications due to increased PCAOB requirements, adoption of the 2013 COSO Framework, and board focus on risk and compliance processes. Organizations are using several technology approaches to manage the process—some with more success than others. Read this white paper to learn why organizations need to utilize the tools that optimize collaboration and focus on productivity, the pros and cons of desktop-based spreadsheets and GRC platforms, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
best practices, business analytics, business intelligence, business management
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
As the focus on internal controls moves into its second decade, it'd be easy to assume that most organizations have mastered their processes. However, with the adoption of the 2013 COSO Framework, increased requirements from the PCAOB, and board focus on risk and compliance processes, many internal control programs are undergoing major modifications in numerous areas. Read this e-book to find out how and why companies have made the move to different platforms, including why companies need to focus on utilizing the most productive tools, several technology approaches used by organizations, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
best practices, technology, risk management, compliance, business management, business analytics
    
IBM
Published By: IBM     Published Date: Oct 06, 2016
IBM LinuxONE servers are effective in-house Linux cloud server platforms that counter these myths and can provide IT executives with an alternative Linux infrastructure solution that will help organizations contain costs, become more competitive, and assist with a transformation to a least-cost consumption-based usage model.
Tags : 
ibm, linux solutions, websphere, operating systems, network management, service management
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
According to an IBM Center for Applied Insights survey of developers, while two-thirds of mobile apps fail to achieve budget, schedule and project objectives, the successful one-third rely heavily on cloud-based platforms such as the IBM MobileFirst Platform. Cloud-based platforms have been proven to reduce provisioning and development time by more than 90%. This on-demand webcast will demonstrate how you can leverage IBM’s Cloud offerings to accelerate your mobile transformation in a hybrid cloud.
Tags : 
ibm, mobile, ibm mobile cloud, cloud, digital business, networking, enterprise applications, mobile computing, mobile data systems
    
IBM
Published By: Cloudroute     Published Date: Jun 01, 2016
Cloud computing has changed the way businesses and people think about using technology to serve their needs. Too many, cloud computing is nothing but hype and overblown as the new direction for Information Technology. But to many more, cloud computing represents the future of how every business should plan, operate and execute applications, systems and processes. Goldman Sachs forecasts spending on cloud computing infrastructure and platforms will grow at a 30% compound annual growth rate (CAGR) from 2013 through 2018 compared with 5 percent growth for overall enterprise IT. Moreover, Forrester recently revised its 2011 forecast of the public cloud market size upward by 20 percent. Regardless, it is important to know what cloud computing is.
Tags : 
    
Cloudroute
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, enterprise applications
    
Veracode
Published By: IBM     Published Date: Apr 18, 2017
There are myriad software products, from complete CRM platforms that offer analytics to standalone or add-on software products that focus solely on analytics. There are analytics apps that can be added to your existing CRM platform. Or there’s the option to outsource analytics to a growing number of service providers. “The technologies are changing rapidly. There are a zillion startups offering either new tools or technologies, so it is kind of hard to navigate,”Mike Gualtieri, an analystfor Forrester Research Inc. in Cambridge, Mass., said in a recent webcast on analytics. “There isn’t just one platform that you’re going to need. There’s a whole ecosystem of platforms.” Having the right people on staff who know how to use the technology is equally important, analysts say. Analytics aren’t just for statisticians anymore—they’re used by sales, marketing and customer service teams in daily decision making.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
Published By: Sitecore     Published Date: Jun 14, 2017
The Gartner Magic Quadrant for WCM assesses leading solutions and delivers valuable insights for those looking to optimize digital marketing platforms for a better customer experience. The 2015 report evaluates 19 vendors for their Ability to Execute as well as their Completeness of Vision. This year, Sitecore® leapt vertically to the top position for its Ability to Execute among the vendors evaluated and has been in the Leaders quadrant for six consecutive years. Learn more by downloading your copy of the 2015 Gartner Magic Quadrant for WCM now.
Tags : 
profiling, flexible deployment, marketing systems, commerce, email marketing, testing, analytics, omnichannel experience marketing, personalization, cms, wcm
    
Sitecore
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: OnBase by Hyland     Published Date: May 16, 2017
To make informed decisions and serve customers, your employees need the right tools and access to key information, in the right context. But, when business-critical information is scattered across multiple off-the-shelf and custom-coded applications, your workers are less efficient and your customers’ experiences suffer. When it comes to your enterprise application strategy, are you thinking beyond build-versus-buy? Download this Forrester Consulting thought leadership paper to learn how Low-code rapid application development platforms offer a faster, easier alternative that empowers your IT organization, your employees and your customers.
Tags : 
forrester consulting, hyland, application development platforms, rapid app development platform, it sprawl, it solutions
    
OnBase by Hyland
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Supporting multiple internal clients and all of their requirements for testing and production networks in more than 1,000 cities around the world—these are the unrelenting challenges for the 12 brands that comprise eBay Classifieds Group. Activating new platforms and features can take a lot of time; with the Juniper solution, turnaround time has been reduced to a few hours—sometimes less—which helps eBay Classifieds turn innovation into a real competitive advantage every single day.
Tags : 
ebay classifieds, web services, internal clients, contrail networking, cloud platform, sdn, business platforms, laas
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The impact of cloud computing and software-defined networking (SDN), including network virtualization, has convinced large enterprises and customers building private, public, and hybrid cloud networks to consider new approaches to help them meet their current and future data center switching needs. Data center switching platforms are constantly evolving, delivering increasingly better performance while simplifying network operations.
Tags : 
scaling, memory, asic platforms, broadcom, tomahawk platforms, juniper networks, multivector scaling, memory architecture
    
Juniper Networks
Published By: Google     Published Date: Mar 05, 2018
Content collaboration platforms are the evolution of the EFSS destination products and address digital workplace enablement strategies. Application leaders can choose among a range of options to transform individual productivity, team collaboration and business workflow automation.
Tags : 
    
Google
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search Home