bi environments

Results 176 - 200 of 283Sort Results By: Published Date | Title | Company Name
By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : financial services paas, private clouds, disparate environments, memory utilization, it manageability, enterprise applications
     MuleSoft
By: CDW     Published Date: Sep 21, 2015
Years of IT infrastructure advancements have helped to drive out vast amounts of costs within the datacenter. Technologies like server and storage virtualization, data deduplication, and flash-based storage systems (to name just a few) have contributed to improvements of utilization rates, performance, and resiliency for most organizations. Unfortunately, organizations still struggle with deeply rooted operational inefficiencies related to IT departments with silos of technology and expertise that lead to higher complexity, limited scalability, and suboptimal levels of agility. The recent tectonic shifts caused by the rise of 3rd Platform applications that focus on social, mobile, cloud, and big data environments have amplified the pains associated with these structural inefficiencies.
Tags : quantify, infrastructure, performance, resiliency, data deduplication, datacenter, virtualization, it management, data management
     CDW
By: K2     Published Date: Aug 24, 2015
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud-hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
     K2
By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis, networking, security, it management
     Cisco
By: CDW     Published Date: Aug 07, 2015
VMware vCloud® Hybrid Service™ – Disaster Recovery introduces native cloud-based disaster recovery capabilities for VMware vSphere® virtual environments.
Tags : cloud, disaster recovery, hybrid, service
     CDW
By: BMC Software     Published Date: Jul 22, 2015
In this white paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services. • Accelerate mean time to repair (MTTR) while communicating better with stakeholders. • Manage even the most complex hybrid environments more efficiently and effectively. • Understand the impact of proposed changes and potential security risks to guide decision-making.
Tags : cloud, hybrid environments, application discovery mapping, application dependency mapping, security risks
     BMC Software
By: IBM     Published Date: May 18, 2015
To stay relevant and competitive in business today, companies must respond and interact with their customers in ways that were simply inconceivable a decade ago. Mobile, social and cloud are enabling businesses to better engage with customers, but these technologies put new pressures on businesses.
Tags : cloud applications, mobility, application integration, customer feedback, software defined environments, automate manual process, improving productivity, collaboration
     IBM
By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management, enterprise applications
     BMC Software
By: IBM     Published Date: Apr 22, 2015
To build a great mobile app, you need the right skills, tools, and support. That’s why many companies are turning to integrated and collaborative mobile application development environments that let them meet business needs and exceed customer expectations.
Tags : ibm, mobile application, app, build, integration, collaboration, development, software development, business technology, telecom
     IBM
By: Cisco     Published Date: Apr 10, 2015
The evolution from business connectivity to business mobility is unlike previous compute transitions because it redefines how people work. Historically, companies provided access to the necessary applications and data from corporate-issued devices such as laptops and desktops in controlled operating environments. This tightly integrated environment tethered workers to a specific device and operating system, and even sometimes to a location. Mobility breaks these shackles and enables workers to change the way they work.
Tags : cisco, zk research, mobile workplace, mobile deployment, mobile computing, it management
     Cisco
By: IBM     Published Date: Apr 09, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : mobile apps, mobile app testing, mobile device cloud, crowd sourcing, ibm, networking, software development, enterprise applications, business technology
     IBM
By: IBM     Published Date: Apr 09, 2015
IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.
Tags : ibm, user access, enhanced security, security risk, networking, security, it management, knowledge management, data management
     IBM
By: Riverbed     Published Date: Feb 26, 2015
SteelHead SaaS offers up to 30x better application performance for cloud services and SaaS applications deployed in enterprises. The solution combines the best of WAN optimization with the best of Internet optimization to provide a seamless transition for users between private and public clouds. Customers experience application acceleration immediately, without requiring any configuration changes to the user or service provider environments.
Tags : sas, optimization, private clouds, public clouds, saas applications
     Riverbed
By: IBM     Published Date: Feb 18, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : mobile app testing, ibm, desktop applications, mobile test environments, mobile device cloud, it management, knowledge management, enterprise applications
     IBM
By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : ibm security, access management solutions, mobile channel security, advanced threats, byod, security, it management
     IBM
By: IBM     Published Date: Feb 11, 2015
Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.
Tags : security solutions, layered protection, protect data, advanced analytics, ibm, security, it management, business technology
     IBM
By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, business technology
     CA Technologies
By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : it trends, it environments, smarter physical infrastructures, data protection, it management, knowledge management, enterprise applications, data management
     IBM
By: LogMeIn     Published Date: Jan 12, 2015
This IDC Technology Spotlight discusses the trends of the 3rd Platform and the role that LogMeIn Rescue plays in addressing the challenges they pose.
Tags : remote support software, logmein rescue, trends of the 3rd platform
     LogMeIn
By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : datacenter, data management, collaborations, business capabilities
     Cisco
By: NetApp     Published Date: Dec 15, 2014
IT managers and line-of-business stakeholders are striving to increase efficiency of their application environments. The biggest challenges they face in supporting database environments are managing data growth and database size, and meeting database performance requirements. This ESG Lab Report documents the performance, reliability, availability, and serviceability of NetApp EF Series flash arrays in Oracle database environments.
Tags : it managers, application environments, data growth, serviceability, performance, storage
     NetApp
By: McAfee     Published Date: Nov 20, 2014
How do we get more visibility into attacks across our environments, improve our response, and reduce response time? SANS Analyst, James Tarala, provides insight on the solution by automating functions that should be automated and connecting the dots between detection systems and response. Connecting these dots and applying intelligence provides responders rich context into the observed behaviors for taking action. Integrating these processes improves accuracy, while reducing time, manpower, and costs involved in detecting and managing events. This white paper explores how to achieve this.
Tags : sans, incident response, detection systems, data correlation and aggregration, siem, security analytics tools, security
     McAfee
By: Dell     Published Date: Nov 20, 2014
A rugged device is just one piece of a mobile solution for highly demanding environmental work environments. Support, security, and manageability will keep employees in the field, on the road, and in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged mobile notebooks and services to meet the demands of your end users.
Tags : durable devices, instantgo2, it protection, encryption
     Dell
By: Dell     Published Date: Nov 20, 2014
Harsh environments for PCs are not confined to factory floors and constructions sites today. They also include hospitals, trucks, and even some classroom settings, among others. A new study from IDG Research and related two-page paper detail just what environmental threats worry buyers the most, and therefore what laptop purchasing criteria rank the highest. Tying together strong computing capability with a highly productive operating system in the right rugged notebook solution is possible. Download this two-page paper to learn the most important factors driving needs for refreshed rugged systems.
Tags : rugged laptops, environmental threats, laptop purchasing criteria, refreshed rugged systems
     Dell
By: Dell     Published Date: Nov 20, 2014
In extreme conditions, you need reliable technology. Whether you are a first responder, work in dangerous locations, wild weather, or just need your equipment to be able to withstand the same harsh conditions you do, Dell allows you to access information quickly - in extreme environments where traditional notebooks simply cannot live up to your expectations. How do you work in such harsh environments and keep information secure and long-lasting without the fear of losing critical information? And how do you keep the information secure, yet utilize a manageable system? Download this interactive infographic today to become informed on Dell's best practices.
Tags : mobility, real-world systems, extreme environments
     Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com