Skip to main content
 

application environments

Results 126 - 150 of 207Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Sep 21, 2015
Years of IT infrastructure advancements have helped to drive out vast amounts of costs within the datacenter. Technologies like server and storage virtualization, data deduplication, and flash-based storage systems (to name just a few) have contributed to improvements of utilization rates, performance, and resiliency for most organizations. Unfortunately, organizations still struggle with deeply rooted operational inefficiencies related to IT departments with silos of technology and expertise that lead to higher complexity, limited scalability, and suboptimal levels of agility. The recent tectonic shifts caused by the rise of 3rd Platform applications that focus on social, mobile, cloud, and big data environments have amplified the pains associated with these structural inefficiencies.
Tags : 
quantify, infrastructure, performance, resiliency, data deduplication, datacenter, virtualization
    
CDW
Published By: Flexera     Published Date: Apr 19, 2019
How is enterprise security like a commercial airliner? Preventative maintenance and regular, in-depth inspections keep jumbo jets operating safely, and the same approach will protect your enterprise security, too. When you consider the widespread security vulnerabilities, the massively intertwined application dependencies, the diversity of deployment environments, and the potential device takeover of mobile apps, keeping your applications safe is a mind-boggling job. Traditional manual approaches are no longer practical. Our exclusive white paper, “Keeping Your Application Fleet Flying Risk Free,” will help you establish the preflight checks and regular inspections that keep the applications in your portfolio running reliably and securely. Download it today.
Tags : 
    
Flexera
Published By: Avi Networks     Published Date: Mar 25, 2016
This white paper examines the challenges of guaranteeing application performance in OpenStack-based cloud environments and looks at new alternatives to traditional application delivery solutions.
Tags : 
avi networks, openstack, application delivery, cloud computing services
    
Avi Networks
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
To power your new and legacy applications and workloads, different IT environments are required based on your unique industry and application needs. Organizations need the right mix of traditional infrastructure, private cloud, and public cloud with consistent management and control software to meet the demands for agility and excellent user experience.
Tags : 
infrastructure management, applications, information technology, cloud computing, content management
    
CDW-HPE Servers
Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
CDW - EMC
Published By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : 
data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility
    
McAfee
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
    
Rapid7
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
HP
Published By: NetApp     Published Date: Dec 01, 2009
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, esg, storage efficiency, microsoft application environments, xchange, sql server, sharepoint, storage management
    
NetApp
Published By: Riverbed     Published Date: Apr 27, 2011
This paper examines the trends towards server consolidation and virtualization, and how WAN optimization can help IT organizations address the challenges of application performance and information availability within these environments.
Tags : 
riverbed, virtualization, server consolidation, wan optimization, application performance, information availability, disaster recovery, infrastructure consolidation
    
Riverbed
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
For data centers looking to get the maximum performance from Flash-based storage supporting their virtual infrastructure, the RamSan-720 should be given strong consideration.
Tags : 
ramsan-720, integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization
    
Texas Memory Systems
Published By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net
    
Sybase PowerBuilder
Published By: Tripp Lite     Published Date: May 17, 2016
As wattages increase in high-density server applications, providing redundant power becomes more challenging and costly. Traditionally, the most practical solution for distributing redundant power to 208V server racks above 5 kW has been to connect dual 3-phase rack PDUs to dual power supplies in each server. Although this approach is reliable, there is a better way. Tripp Lite has developed a patent-pending high-capacity 3-phase rack ATS specifically designed to deliver efficient, reliable redundant power to high-density clustered server environments. This White Paper will: • Explain the redundancy challenges for high-density server racks • Compare traditional dual PDU and 3-phase rack ATS redundancy setups • Outline the benefits of using a Tripp Lite 3-phase rack ATS
Tags : 
server, applications, wattage, power, high density, ats, pdu, supplies
    
Tripp Lite
Published By: Hewlett-Packard     Published Date: Jul 24, 2013
Isolating application problems can be challenging in highly virtualized or cloud environments. This paper offers a roadmap to optimize application performance management with a pragmatic, phased approach that goes beyond monitoring and focuses on support for composite applications, SOA, and ERP applications.
Tags : 
application performance, apps, soa, erp, applications, cloud
    
Hewlett-Packard
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model
    
BubblewrApp
Published By: NetApp     Published Date: Dec 05, 2016
"All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all-flash storage in the enterprise. Originally used to accelerate performance for dedicated, mission-critical applications, all-flash arrays are now replacing disk and hybrid-flash systems as the preferred storage systems for virtualized environments. At the same time, scale-out solutions have emerged that are designed to power the new cloud services of the future. The book examines various elements of all-flash storage: how it evolved, and why you should now consider it for all of your primary applications. You get acquainted with the NetApp portfolio of all-flash storage solutions and learn how each is designed to meet the needs of a specific type of application environment. You’ll also learn five strategies for making smart decisions about all-flash arrays for your next storage project. In that classic Dummies style, you’ll walk away with useful tips on how to select and deploy all-flash
Tags : 
netapp, database performance, flash storage, storage for dummies, data management, cost challenges
    
NetApp
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Deploying virtual desktops and applications can be a rigorous process if organizations are not using the appropriate tools. Even amongst the best run IT organizations, setting up a complete VDI environment can take several days and sometimes weeks to install and configure. This leads to long maintenance windows and a lot of time needs to be set aside to design and scale the environments equaling higher costs in the long run. Download this solution brief to discover a new approach to building, delivering and managing virtual workspaces.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 09, 2016
To streamline the process of maintaining desktop environments, many IT managers are turning to mobile-cloud first approaches to application and desktop delivery. And if your business is in a similar transition, due to trends in BYOD, changing application delivery models, and worker mobility, your end-user computing environments could be becoming overly complex. To combat this rising complexity, you need to consider implementing hybrid consumption models that work at scale and address security threats. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Tags : 
    
VMware AirWatch
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 02, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
    
AWS
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Despite the business-transforming upsides of data from the Internet of things (IoT), there’s a downside: security. Porous networks and lax users offer tantalizing access for hackers. Although most security spending is at the enterprise level, a shift is needed to secure IoT applications and provide improved governance and accountability. Electronics companies must create secure environments that safely collect, consume, share and store data on their networks. But they also must go beyond devices and consumers to close holes to factory, ecosystem and partner networks.
Tags : 
planet scale security, iot, security, iot application, application security, partner networks
    
Group M_IBM Q1'18
Published By: SAS     Published Date: Mar 06, 2018
Today's artifical intelligence (AI) solutions are not sentient in the manner popularized in science fiction by scores of self-aware and typically nefarious androids. Even so, the ability to arm such systems with the ability to directly sense and respond to their in situ environment is critical. Why? In the future, our experiences will be smart, intuitive and informed by analytics that are not seen but felt via new business, personal and operational engagement models. Enabling this interaction requires AI applications that can sense, analyze and respond to their environment in an intelligent and interactive manner. Without requiring the end user to write, understand or interpret code. “Sensitive” artificial intelligence enables: • More productive use of expanded (big, often unstructured) information sources • Intuitive man-machine interactions (no code-speak here!) • Adaptive, immersive experiences and environments As frequently touted on the nightly news, AI’s popularity is clear. Ho
Tags : 
    
SAS
Published By: Cisco     Published Date: Sep 08, 2016
This white paper summarizes the main architectural features that make the Cisco CloudCenter solution a unique and powerful choice for any IT organization or service provider seeking to deploy and manage applications in a mix of data center and cloud environments.
Tags : 
    
Cisco
Published By: Polycom     Published Date: Jun 08, 2016
Microsoft Lync and Skype for Business each provides presence information within email and business applications and promotes voice and video collaboration within virtual teams, and with customers and partners. Polycom extends the benefits of Lync’s voice solutions with Polycom voice endpoints and enables collaboration experiences in multiple environments within the Microsoft Lync or Skype for Business interfaces.
Tags : 
business optimization, business strategy, network management, business applications, best practices, cost reduction, best practices
    
Polycom
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.