app services

Results 76 - 100 of 765Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Nov 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: DellEMC and Intel® Xeon® processor     Published Date: Apr 13, 2017
In this report we’ll explore that question, comparing the cost of an on-site hyperconverged solution with a comparable set up in the cloud. The on-site infrastructure is a Dell EMC VxRailTM hyperconverged appliance cluster and the cloud solution is Amazon Web Services (AWS).
Tags : 
dell emc, cloud, hyperconverged solutions, hyperconvergence, amazon, amazon web services, cloud
    
DellEMC and  Intel® Xeon® processor
Published By: NetApp     Published Date: Dec 05, 2016
Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.
Tags : 
    
NetApp
Published By: CA Technologies     Published Date: Jun 27, 2014
Dans un contexte commercial en constante évolution, caractérisé par une compétitivité extrême, l'époque où les entreprises passaient des mois, voire des années, à élaborer, tester et lancer une application, un service ou un nouvel ensemble de fonctionnalités, est bel et bien révolue. Les clients, les utilisateurs de technologies et le marché dans son ensemble sont à l'origine de ces changements : ils sont en effet plus réactifs que jamais et leurs attentes en matière de nouvelles fonctionnalités innovantes ont augmenté de concert. Autrement dit, les clients ne se contentent plus d'attendre la prochaine mise en production d'envergure. Ils ne souhaitent pas non plus se voir confrontés à des bugs ni à des défauts. En réponse à ce changement au sein même du marché, de nombreuses entreprises se sont tournées vers des méthodes permettant d'accélérer le cycle de mise en production de leurs applications, sans pour autant en impacter la qualité et le coût.
Tags : 
new application services, application testing, application releasing, devops, software development, business technology
    
CA Technologies
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Oracle     Published Date: Aug 09, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based human capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : 
hcm, cloud, cloud services
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based juman capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : 
hcm, cloud, cloud services, enterprise applications, human resource technology, business technology
    
Oracle
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Pega     Published Date: May 24, 2016
Governments have long found it challenging to modernize legacy IT systems. Now comes pressure to offer digital government services. However, which takes priority? The answer is both. But rather than thinking linearly, the smart way is to execute simultaneously by standing a traditional IT approach on its head. Government agencies need to use technology to develop proactive and digital government services, from the outside in, from the perspective of the constituent, while making modernizing adjustments. To be successful, it is critical for government agencies to move beyond traditional development methodologies by adopting an agile development approach. But what are the challenges? How can they modernize massive projects already in the works? In short, how to get there? Download this E-bookand find out where government agencies are falling short and where they can improve regarding digitization.
Tags : 
    
Pega
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
The need to bridge the gap between traditional IT services and cloud application delivery is vital.   This HPE Pointnext blueprint guide examines the critical global business services and IT technology best practices for enabling cloud-native applications—from DevOps practices to underlying infrastructure. The blueprint helps IT teams accelerate the development and delivery of cloud-native applications.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Organizations are running their business on exponentially more data, created by more users, from different devices, and through different IT services and digital processes. While some data growth is fueled by new applications, it also arrives increasingly from non-traditional IT sources, including digital media, machines, and edge devices. Edge IoT devices are generating a massive amount of data that must be managed, monitored, stored, and analyzed. Deciding where to perform each of these functions is critical to supporting new data-driven global business services and processes. This blueprint from HPE Pointnext, the Services division of HPE, is based on real-world experiences from many customers across a range of industries on how to leverage flash storage modernization.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
IT services such as mobile devices, smart applications and cloud-based services are transforming the way we live, work and communicate. Global technology services and businesses are embracing digital transformation, introducing Intelligent Spaces to unleash worker productivity and accelerate the pace of business. The workplace plays a critical role in an organization’s digital transformation. Forward-looking organizations recognize that you can’t build a digital business without building a digital workplace.
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM APAC     Published Date: May 18, 2017
Welcome to IT as a Service For Dummies, IBM Limited Edition. IT as a Service is the emerging technique that gives technology leaders the flexibility of providing the right set of services to the business. The world of IT is changing dramatically. Businesses are increasingly discovering that IT services are becoming the foundation for the customer experience. IT as a Service isn’t simply a new delivery model for applications. Instead, IT as a Service is a new approach to providing an array of modular services that are targeted to solve changing business problems. While services can be as straightforward as compute or storage in the cloud, they can also be used to complex solutions. Other services may include microservices or integration services that enable a business to quickly create new solutions to help service customers in a more creative and efficient manner.
Tags : 
service, dummies, ibm, cloud, mobile
    
IBM APAC
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : 
raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices, business technology
    
Cleversafe
Published By: Riverbed     Published Date: Jul 17, 2013
Highly complex IT environment with multi-tier application architectures delivering apps and services, detecting and diagnosing code level performance problems can be like looking for a needle in a haystack. While it may be plain to the end user that there is a problem, understanding where that problem originates and exactly what is causing it is difficult, and time consuming. Riverbed OPNET AppInternals Xpert addresses this challenge by combining end-user experience, transaction tracing, and application component monitoring for deep end-to-end application visibility. This latest release facilitates bi-directional workflows between operations and application development to expedite problem resolution. Register to read the full report.
Tags : 
apm, esg, big data, end-user experience, application visability
    
Riverbed
Published By: NetApp     Published Date: Mar 29, 2017
Your IT team is struggling with aging, inflexible, and complex infrastructure and processes that make it difficult to support new business needs or take advantage of cloud.  Learn how you can transform your data infrastructure using flash storage to meet service level performance and availability, enabling your team to focus on the delivery of new applications and services.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Founded in 1992 as a provider of integrated network, voice and data centre solutions, Colt’s business today has grown to encompass a wide range of IT services, spanning enterprise application hosting, business critical cloud and end-user computing solutions. Colt has 29 data centre locations supporting thousands of customers across 28 countries in Europe and Asia, including Swiss International Airlines, Shurgard, Berenberg, and Jaguar Land Rover. Colt’s award-winning solution portfolio is based on end-to-end data centre, network and IT services capabilities; its aim is to help its customers compete and win in their markets without being held back by hardware, licensing and resource limitations.
Tags : 
network management, best practices, network optimization, network applications, application management, technology, telecommunications
    
SolidFire_NetApp
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Quality of service (QoS) is a critical enabling technology for enterprises and service providers wanting to deliver consistent primary storage performance to business-critical applications in a multi-tenant or enterprise infrastructure. The type of applications that require primary storage services typically demand greater levels of performance than what is readily available from traditional storage infrastructures today. However, simply providing raw performance is often not the only objective in these use cases. For a broad range of business-critical applications, consistent and predictable performance are the more important metrics. Unfortunately, neither is easily achievable within traditional storage arrays.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence, storage
    
SolidFire_NetApp
Published By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you can’t escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: • Adopt and scale containers faster. • Move existing services to containers. • Eliminate the friction between development, QA, and production environments.
Tags : 
    
Puppet
Published By: IBM APAC     Published Date: Jun 13, 2017
Using more than 70 criteria and combining feedback from customer interviews, IDC found that the providers in this evaluation bring diverse capabilities for modernizing SAP applications. Download this paper to find out more.
Tags : 
ibm, sap, applications, modernization, application services
    
IBM APAC
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your data or services into their offerings. By making it easier for other organizations to access your services, you create value and growth opportunities.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.