critical application

Results 76 - 100 of 454Sort Results By: Published Date | Title | Company Name
By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
     Oracle ZDLRA
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
You’ve made a major investment in Oracle E-Business Suite applications to run your critical enterprise processes. But these processes stretch beyond Oracle E-Business Suite and rely on a mix of custom and packaged applications. Management of your critical enterprise processes has become a pressing challenge. Too many staff are tied up in managing the process, as well as finding and diagnosing process errors. SLAs are frequently missed, and customers perceive poor quality of service due to the recurring errors and delays, which are now impacting your critical processes, such as financial period end close, invoicing, payroll and materials requirements planning (MRP) processing. You’ve decided it’s time to consider automation. Automating Oracle E-Business Suite processes end-to-end can eliminate 90% of business process errors. Download this whitepaper to find out how.
Tags : 
     CA Technologies_Business_Automation
By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
     VMware
By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
     Fidelis Cybersecurity
By: CA Technologies     Published Date: Jun 09, 2015
In today’s application economy, everyone is in the software business. Auto makers are putting Wi-Fi hotspots in their cars. Watches are trading gears for motherboards. Even soda fountains have evolved from dumb machines into instrumented devices with touch-screen user interfaces. This digital transformation is changing the way applications are developed, tested, moved through environments and released into production—and it’s putting new demands on IT teams with which they’re struggling to keep up. At a high level, this is because the application delivery systems and processes at many enterprises were put in place when IT only had to push out an annual or semi-annual release. But as market pressures and executive mandates have forced teams to deliver innovations faster and more frequently, a new set of development, testing, automation and customer challenges have appeared—acting as obstacles that stand between you and your digital transformation goals.
Tags : 
     CA Technologies
By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : dyn, dns, downtime risk, end-user experience, networking, enterprise applications
     Dyn
By: Kaminario     Published Date: Aug 23, 2016
Read this guide for three critical steps to maximize all-flash performance for your applications.
Tags : kaminario, flash, performance, storage, application performance, networking, enterprise applications
     Kaminario
By: IBM     Published Date: Jul 07, 2015
Users expect quick, consistent access to their business-critical data and applications around the clock. That’s why outages, whether they are planned or unplanned, can negatively affect revenue, consumer trust and your reputation.
Tags : big data, mobility, compute-intensive apps, virtualization, cloud computing, scalable infrastructure, reliability, data management, infrastructure
     IBM
By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : ibm, digital business, api economy, api management, apim, api, enterprise applications, infrastructure, cloud computing
     IBM
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This paper looks at how the cloud landscape is rapidly evolving to address the needs of critical enterprise applications. On the way, we’ll highlight some common cloud misconceptions. Finally,we’ll set out how IT leaders can create a clear, robust enterprise cloud strategy for their organizations that enables digital innovation and business transformation.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Managing a large datacenter is a costly, complicated activity for any enterprise, but when that datacenter also includes a number of database servers, and when database performance is critical, those costs and complications can multiply. A recent study from IDC explains simple tips to quantify the value of Oracle Exadata Database Machine for your own business. Discover how to deliver new business applications faster.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : middleware, java, big data, analytics, mobile development, database development
     JBoss Developer
By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
     Rackspace
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms, storage, storage management
     CA Mainframe
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Novagalicia Banco secured critical applications with HP Fortify improving the security of the discrete applications that were coming from myriad sources
Tags : novagalicia, applications, hp fortify, financial service industry, saas, security, fortify on demand, application security, internet security, security management, vulnerability management
     HP - Enterprise
By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall, mobile computing, application performance management
     F5 Networks Inc
By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management, enterprise applications
     BMC Software
By: Dell     Published Date: Feb 02, 2018
Digital transformation is the process of creating value, growth, and competitive advantage through new offerings, business models, and business relationships that are data centric and data driven. It’s about changing the way that business gets done. This transformation also places IT at the forefront when making strategic business decisions related to redefining business processes and operational efficiencies, shifting work and employee productivity, changing customer relationships, increasing buyer loyalty, and transforming product and service revenue streams. IDC believes that IT organizations must assume a critical role in the forthcoming digital reinvention by assuming the position of being a critical business innovation platform.
Tags : 
     Dell
By: Dell     Published Date: Feb 02, 2018
VxRail appliances, now leveraging industry leading Dell PowerEdge servers, support business critical applications and workloads in many configurations providing required reliability, availability, flexibility and performance. Every organization has its own set of business critical applications. For instance: - Database applications such as Microsoft SQL server and Oracle - Customer Relationship Management (CRM) applications such as SAP - E-mail applications such as Microsoft Exchange -Collaboration applications, such as Microsoft SharePoint Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
     Dell
By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : ecommerce, 3dsecure, risk analytics, behavioral
     CA Technologies
By: NetApp     Published Date: Sep 26, 2018
Download this easy-to-read guide to learn how NVMe can help you achieve better storage performance. You'll get insight into comparing NVMe alternatives, developing a low-risk NVMe adoption strategy, and increasing the performance of mission-critical applications.
Tags : nvme, fibre, channel, performance, applications
     NetApp
By: SAP     Published Date: Jun 12, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application. Download this white paper to discover five best practices that can help make your career site your # 1 recruiting asset.
Tags : 
     SAP
By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application.
Tags : 
     SuccessFactors, an SAP Company
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.