critical application

Results 76 - 100 of 462Sort Results By: Published Date | Title | Company Name
By: Juniper Networks     Published Date: Sep 10, 2014
To improve application performance with a simplified network, read our Whitepaper. Focusing on the top 5 benefits of a modernized data center architecture, it shows you how to optimize your network for business critical applications.
Tags : modernized data center, simplified network, data center architecture, optimization, critical application
     Juniper Networks
By: JBoss Developer     Published Date: Feb 05, 2016
IDC analyzed the business value that six surveyed organizations are realizing through their use of Red Hat integration products based on interviews conducted from April to June 2014. Interviewees were from companies ranging in size from just hundreds of employees to several hundred thousand employees, with a mean employee base of just under 92,000. Companies interviewed included representatives from the telecommunications, IT, shipment and logistics, and document management industries. These organizations are headquartered in the United States, the United Kingdom, and Norway and several of them operate on a global scale. These organizations use JBoss Fuse for integration and development of business-critical internal and customer-facing applications
Tags : jboss, red hat, idc, integration, jboss fuse, data management, application integration, application performance management, best practices, business analytics, business integration, business intelligence, business management, business process management
     JBoss Developer
By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
     Avi Networks
By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
     Avi Networks
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology, business intelligence, business management
     Microsoft
By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
     Oracle ZDLRA
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
You’ve made a major investment in Oracle E-Business Suite applications to run your critical enterprise processes. But these processes stretch beyond Oracle E-Business Suite and rely on a mix of custom and packaged applications. Management of your critical enterprise processes has become a pressing challenge. Too many staff are tied up in managing the process, as well as finding and diagnosing process errors. SLAs are frequently missed, and customers perceive poor quality of service due to the recurring errors and delays, which are now impacting your critical processes, such as financial period end close, invoicing, payroll and materials requirements planning (MRP) processing. You’ve decided it’s time to consider automation. Automating Oracle E-Business Suite processes end-to-end can eliminate 90% of business process errors. Download this whitepaper to find out how.
Tags : 
     CA Technologies_Business_Automation
By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
     VMware
By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
     Fidelis Cybersecurity
By: CA Technologies     Published Date: Jun 09, 2015
In today’s application economy, everyone is in the software business. Auto makers are putting Wi-Fi hotspots in their cars. Watches are trading gears for motherboards. Even soda fountains have evolved from dumb machines into instrumented devices with touch-screen user interfaces. This digital transformation is changing the way applications are developed, tested, moved through environments and released into production—and it’s putting new demands on IT teams with which they’re struggling to keep up. At a high level, this is because the application delivery systems and processes at many enterprises were put in place when IT only had to push out an annual or semi-annual release. But as market pressures and executive mandates have forced teams to deliver innovations faster and more frequently, a new set of development, testing, automation and customer challenges have appeared—acting as obstacles that stand between you and your digital transformation goals.
Tags : 
     CA Technologies
By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : dyn, dns, downtime risk, end-user experience, networking, enterprise applications
     Dyn
By: Kaminario     Published Date: Aug 23, 2016
Read this guide for three critical steps to maximize all-flash performance for your applications.
Tags : kaminario, flash, performance, storage, application performance, networking, enterprise applications
     Kaminario
By: IBM     Published Date: Jul 07, 2015
Users expect quick, consistent access to their business-critical data and applications around the clock. That’s why outages, whether they are planned or unplanned, can negatively affect revenue, consumer trust and your reputation.
Tags : big data, mobility, compute-intensive apps, virtualization, cloud computing, scalable infrastructure, reliability, data management, infrastructure
     IBM
By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : ibm, digital business, api economy, api management, apim, api, enterprise applications, infrastructure, cloud computing
     IBM
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This paper looks at how the cloud landscape is rapidly evolving to address the needs of critical enterprise applications. On the way, we’ll highlight some common cloud misconceptions. Finally,we’ll set out how IT leaders can create a clear, robust enterprise cloud strategy for their organizations that enables digital innovation and business transformation.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Managing a large datacenter is a costly, complicated activity for any enterprise, but when that datacenter also includes a number of database servers, and when database performance is critical, those costs and complications can multiply. A recent study from IDC explains simple tips to quantify the value of Oracle Exadata Database Machine for your own business. Discover how to deliver new business applications faster.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : middleware, java, big data, analytics, mobile development, database development
     JBoss Developer
By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
     Rackspace
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms, storage, storage management
     CA Mainframe
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Novagalicia Banco secured critical applications with HP Fortify improving the security of the discrete applications that were coming from myriad sources
Tags : novagalicia, applications, hp fortify, financial service industry, saas, security, fortify on demand, application security, internet security, security management, vulnerability management
     HP - Enterprise
By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall, mobile computing, application performance management
     F5 Networks Inc
By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management, enterprise applications
     BMC Software
By: Dell     Published Date: Feb 02, 2018
Digital transformation is the process of creating value, growth, and competitive advantage through new offerings, business models, and business relationships that are data centric and data driven. It’s about changing the way that business gets done. This transformation also places IT at the forefront when making strategic business decisions related to redefining business processes and operational efficiencies, shifting work and employee productivity, changing customer relationships, increasing buyer loyalty, and transforming product and service revenue streams. IDC believes that IT organizations must assume a critical role in the forthcoming digital reinvention by assuming the position of being a critical business innovation platform.
Tags : 
     Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.