enterprise applications

Results 276 - 300 of 676Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Sep 08, 2011
Get a demo and an in-depth look at the Adobe DEP. Marcel Boucher will show you the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Tags : 
adobe, application development platform, digital enterprise platdform, marcel boucher, osgi, jcr, sling, java
    
Adobe
Published By: Adobe     Published Date: Sep 08, 2011
Review the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
    
Adobe
Published By: Adobe     Published Date: Sep 08, 2011
Discover how to build mobile apps and learn more about minimizing development time and the re-use of components across device platforms.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
    
Adobe
Published By: EMC Corporation     Published Date: May 27, 2011
This ESG white paper confirms that momentum continues to build around server virtualization. Learn about an in-depth survey of 463 senior IT professionals in both large midmarket and enterprise-class organizations in North America and resulting trends.
Tags : 
enterprise strategy group, esg, emc, backup and recovery, enterprise applications, vmware, mark bowker, david a. chapa
    
EMC Corporation
Published By: Layered Tech, Inc.     Published Date: Dec 16, 2010
Layered Tech's engineers created a customized package of virtual private data centers (VPDCs), managed services and disaster recovery solutions that support KANA's clients, large and small. Layered Tech tailored the architecture to meet the highest enterprise security requirements, as well as ensuring that each KANA client can deploy applications that scale to ongoing volume fluctuations.
Tags : 
layered tech, kana, virtual private data center, enterprise security, vpdc, disaster recovery, customer interaction
    
Layered Tech, Inc.
Published By: Citrix Systems     Published Date: Feb 27, 2014
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. Success with mobilizing Microsoft® Windows® applications also requires a broad technology approach. The right approach integrates a universal client and single sign-on with a comprehensive application delivery platform to ensure information security and a seamless user experience. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, mobile. mobilizing, windows applications, microsoft windows, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
Learn why Citrix was named a leader in the 2015 Gartner Magic Quadrant for Application Delivery Controllers, for the ninth consecutive year. With more than 25 years experience providing secure access to enterprise applications, it’s clear you can rely on Citrix to drive new levels of security and productivity in your organization. Register to download the 2015 Gartner Magic Quadrant for Application Delivery Controllers, plus receive a bonus white paper, Citrix NetScaler - A Foundation for Next-Generation Datacenter and Cloud-Based Security.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
What is an application delivery controller (ADC) and what role does it play in supporting complex enterprise application environments? In this paper, it will discuss how modern ADCs can help provide improved reliability, security and performance for Microsoft Exchange, SharePoint and Lync. And with Citrix NetScaler, it will serve as an excellent front-end to a Microsoft environment, enhancing the user experience and providing for optimal supportability – allowing you to get the most value out of your Microsoft applications .
Tags : 
    
Citrix Systems
Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
IDC studied a group of enterprises that had deployed SAP applications on IBM Power Systems servers running Linux server operating environments and had been working with those systems for several years.
Tags : 
ibm, technology, sap, tecnology product, linux server, technology platform
    
IBM MidMarket Demand Generation
Published By: Riverbed     Published Date: Oct 16, 2012
As enterprises continue to grow, tools for collaboration are becoming more interactive. Read this to learn how to examine the need for acceleration, application control and visibility to improve and solve problems effectively for the future.
Tags : 
riverbed, wan optimization, wan, network management, enterprise application, networking, electronics
    
Riverbed
Published By: Riverbed     Published Date: Oct 17, 2012
Microsoft SharePoint is a collaboration tool used in enterprises. Read this white paper to learn about the optimizing a web-based SharePoint environment and how to address the requirements across the technology stack to deliver ROI for the business.
Tags : 
microsoft sharepoint, enterprise applications, connectivity, it infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Nov 12, 2012
Learn how Riverbed® Steelhead® appliances to centralize applications such as Microsoft Exchange and SharePoint and Riverbed® Whitewater® cloud storage enables International Justice Mission to manage constant data growth. read on to learn more.
Tags : 
case study, riverbed, sharepoint, steelhead, enterprise applications, riverbed whitewater cloud storage, data management
    
Riverbed
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: CDW     Published Date: Jun 18, 2013
Boosting productivity and efficiency enterprisewide — from applications and infrastructure to internal and external users.
Tags : 
cdw, mobile solutions, mobile strategy, wireless strategies, security
    
CDW
Published By: CDW     Published Date: Nov 05, 2013
A software audit can be either an internal process, executed by an in-house team or consultants, or it can be done externally, by the vendor. If done internally, the results are used by the organization to check what software is installed across the network, how the software is being used and how this usage compares with the entitlements owned by the organization. If you haven’t already been audited—get ready; it’s not a case of if, but when.
Tags : 
cdw solutions, software audit, software publisher, end user license agreement, eula, asset management, conduct self-audits, desktop deployment
    
CDW
Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise — what many are calling the "consumerization of IT" — and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility, wireless
    
Aruba Networks
Published By: Dell     Published Date: Sep 12, 2013
Organizations everywhere are turning to virtualization, cloud computing, and mobile technologies to support anytime, anywhere access to today’s work load intensive, data-heavy applications. Dell PowerEdge 12th generation servers—built for high performance, 24/7 availability, and uncompromised reliability—can help IT organizations deliver the benefits of these transformative technologies.With cost-saving power, cooling, space, and management efficiencies, Dell’s new servers offer data centers unparalleled performance, efficiency, and reliability for a diverse range of enterprise applications.
Tags : 
data center, dell poweredge 12th generation servers, virtualization, cloud computing, mobile technologies, data-heavy applications, cost-saving power, management efficiencies
    
Dell
Published By: Nimble Storage     Published Date: Oct 28, 2013
Storage plays a critical role in the datacenter. To keep up with the performance, capacity, availability, and efficiency needs of today’s enterprise, storage is undergoing a transformation by leveraging flash, high-capacity disks, and integrated data management. This paper discusses how Nimble Storage’s flash-optimized architecture is engineered to accelerate applications, scale performance and capacity, protect data, and make IT more productive and empowered.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications
    
Aruba Networks
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Published By: Red Hat     Published Date: Jun 09, 2014
Read this whitepaper to find out how Red Hat Storage Server can allow enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Tags : 
red hat, data explosion, business applications, enterprise architects, mobile, social, data platforms, digital media
    
Red Hat
Published By: Red Hat     Published Date: Jun 10, 2014
Read this whitepaper to find out how Red Hat Storage Server can allow enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Tags : 
red hat, data explosion, business applications, enterprise architects, mobile, social, data platforms, digital media
    
Red Hat
Published By: CenturyLink     Published Date: Jan 02, 2015
DevOps Unlimited needed to provide application infrastructure for a start-up client which was enjoying rapid growth with its new financial services product. Neither DevOps nor the client wanted to invest in, or manage, its own IT hardware, so a cloud service was the ideal solution. It would give the client the ability to grow rapidly without tying up time, resources and capital expense deploying dedicated IT hardware.
Tags : 
centurylink, devops, enterprise applications, cloud, it hardware, it management
    
CenturyLink
Published By: Red Hat     Published Date: May 05, 2015
IT organizations are under intense pressure to improve service levels and contain expenses in today’s challenging economic climate. Forward-looking organizations are upgrading IT infrastructure and implementing virtualization and cloud computing solutions to improve business agility and drive down costs. Many enterprises are adopting a dual platform approach, retaining Microsoft Windows for office productivity and collaboration applications, and deploying Red Hat® Enterprise Linux® for infrastructure and datacenter modernization initiatives. By adopting standards-based Red Hat Enterprise Linux, businesses can enjoy high performance, reliability, and security, with a lower overall TCO.
Tags : 
red hat, platform strategies, modern datacenter, virtualization, cloud computing solutions, it management, knowledge management, data management
    
Red Hat
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!