applications platform

Results 1 - 25 of 273Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Jul 11, 2019
Supply chain managers are increasingly leveraging location intelligence and location data to raise visibility throughout their whole logistics process and to optimize their delivery routes. Leveraging this data requires an ever-more-robust technology stack. As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs provide supply chain stacks and applications with: Greater agility Contextual intelligence Real-time data implementation Speed Scale Introducing new technology into an organization can sometimes be daunting. As one of the world’s leading location platforms, HERE shares insights and tips to streamline the supply chain technology integration across the whole organization.
Tags : 
here technologies, supply chain, mapping
    
HERE Technologies
Published By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
Welcome to Secure Hybrid Cloud For Dummies, IBM Limited Edition. The hybrid cloud is becoming the way enterprises are transforming their organizations to meet changing customer requirements. Businesses are discovering that in order to support the needs of customers, there is an imperative to leverage the highly secure IBM Z platform to support missioncritical workloads, such as transaction management applications. The Z platform has been transformed over the years. The combination of z/OS, LinuxONE, open APIs, and the inclusion of Kubernetes has made IBM Z a critical partner in the hybrid cloud world. Businesses can transform their IBM Z environments into a secure, private cloud. In addition, through IBM’s public cloud, businesses may take advantage of IBM Z’s security services to protect their data and applications.
Tags : 
    
Group M_IBM Q3'19
Published By: ASG Software Solutions     Published Date: May 12, 2010
For many organizations, managing and delivering the knowledge contained within documents is difficult or impossible due to technological disparity. Conventional approaches to knowledge management work within the constraints of disparate platforms, applications, and output devices, and fail to address technological disparity.
Tags : 
asg, cypress, managing delivery, knowledge management, document management
    
ASG Software Solutions
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 05, 2018
The competitive advantages and value of BDA are now widely acknowledged and have led to the shifting of focus at many firms from “if and when” to “where and how.” With BDA applications requiring more from IT infrastructures and lines of business demanding higher-quality insights in less time, choosing the right infrastructure platform for Big Data applications represents a core component of maximizing value. This IDC study considered the experiences of firms using Cisco UCS as an infrastructure platform for their BDA applications. The study found that Cisco UCS contributed to the strong value the firms are achieving with their business operations through scalability, performance, time to market, and cost effectiveness. As a result, these firms directly attributed business benefits to the manner in which Cisco UCS is deployed in the infrastructure.
Tags : 
big data, analytics, cisco, value, business, enterprise
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. To find out more download this whitepaper today.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
This white paper discusses the issues involved in the traditional practice of deploying transactional and analytic applications on separate platforms using separate databases. It analyzes the results from a user survey, conducted on SAP's behalf by IDC, that explores these issues.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Cisco     Published Date: Dec 08, 2015
The 2015 Guide to WAN Architecture and Design describes a hypothetical company, referred to as NeedToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
applications, systems integration, cloud, platform, wan, networking, it management
    
Cisco
Published By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
Financial Force
Published By: SAP     Published Date: May 03, 2016
To support IT-enabled business processes, line-of-business (LOB) and IT executives are teaming to assess applications and IT workloads and shifting the right workloads to more agile cloud-enabled platforms.
Tags : 
sap, agile, business technology, business processes, platforms, integrated, data management
    
SAP
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and PGi CTO David Guthrie discusses how the cloud computing platform helped his company scale up immediately by getting his applications running efficiently in a matter of days, rather than months.
Tags : 
ca technologies, cloud computing, applications, computing platform, technology
    
CA Technologies
Published By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : 
distributed enterprises, vmware, storage, virtualization, software management, appliances
    
Dell EMC
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
In this case study, a company needed to find a way to update and improve a legacy trade portal application. With the help of Collaborative, using domestic resources, the company completely replaced several legacy trade portal applications, allowing for the retirement of several application platforms and legacy databases.
Tags : 
collaborative consulting, trade portal, right price, infrastructure, better application, business documentation, inspire engagement, financial metrics, investment management, strategic technology, financial strategy, technology platforms, financial services, integration
    
Collaborative Consulting
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity
Tags : 
    
Hewlett Packard Enterprise
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Adobe     Published Date: Feb 03, 2015
This Gartner paper provides information on how the mobile application development platform market continues to grow, evolve and mature in response to escalating customer requirements.
Tags : 
madp, mobile applications, response customer requirements
    
Adobe
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red Hat®Enterprise Linux® frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.