applications technology

Results 126 - 150 of 254Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Mar 12, 2015
Learn five simple strategies for securing APIs and see why they are an emerging technology for integrating applications using web technology.
Tags : 
api, mobile apps, mobile app, security, it management
    
CA Technologies
Published By: Ciena     Published Date: Nov 15, 2016
"Economic conditions have changed the operating landscape for government and educational organizations. Modern, converged networks utilize advanced optical and Ethernet technologies to form a highly flexible and scalable infrastructure capable of delivering many emerging applications and ready to scale far into the future. Additional benefits of building better networks for state and local governments include: >Better public service at lower taxpayer cost >Support for emerging applications in transportation, public safety, healthcare, and education >A graceful technology migration from legacy to converged network > Preparation for future, unplanned government applications Download ""Building Better Networks for State and Local Governments"" to discover more today."
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In today’s application economy, interaction between a business and its customers, partners and employees is increasingly through apps. And omni-channel access to these applications—from anywhere at any time—is dependent on APIs. These APIs provide an interface for developers to code against, and must be robust enough to support ever-growing demand. As a result, APIs are perhaps the most critical technology in digital business design today. APIs sit between your application clients —apps, websites and devices—and application backends. By leveraging APIs, you can securely stretch the boundaries of your enterprise by tapping into a broad array of digital businesses, digital customers and digital devices. But just as important as the API, is the application backend itself. Behind the API, the data access layer and application logic layer are doing the heavy lifting—implementing business rules, maintaining data consistency and managing interactions with various data sources. These three com
Tags : 
    
CA Technologies EMEA
Published By: Red Hat     Published Date: Jun 19, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster. The following checklist will assess your needs and possible business impacts to help you choose a cloud-native platform that benefits the business, developers, and IT operations team.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Epson     Published Date: Jun 21, 2018
Solvent printing is the perfect solution for signs, vehicle wraps, and many other print applications. Solvent inks produce top-quality graphics, enabling printing service providers (PSPs) to maintain high-volume output and lower production costs while providing their customers superior color gamut and accuracy. Although solvent inks provide great performance and have many additional bene ts, they come with one frustrating work ow drawback: the delays PSPs experience by having to wait for solvent ink to dry, particularly when the application requires lamination. A new breakthrough solvent ink technology solves this problem by reducing print curing time by at least 75% of the 24 hour waiting period normally recognized by media manufacturers and industry specialists. These new solvent inks make it possible for PSPs to laminate solvent prints on the same day they are printed. PSPs can achieve high image quality without sacri cing valuable time, plus they can avoid clutter and reduce spa
Tags : 
    
Epson
Published By: Domo APAC     Published Date: Mar 04, 2019
Cisco’s marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Cisco’s marketing team plaudits and several industry awards View Domo’s privacy policy
Tags : 
    
Domo APAC
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
In today's cloud-based, mobile IT world, the need for security is rapidly growing. As enterprises continue to depend on the cloud for delivery of applications and more workers are using multiple types of devices to access those applications, the need to control who has access to what is also growing. This Technology Spotlight discusses the challenges of cloud identity access management and provides guidance on which IAM architectural solutions would benefit your business.
Tags : 
security, cloud, application delivery, authentication, access control, application security, silos, password fatigue
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technolog
Tags : 
    
Amazon Web Services
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Nov 20, 2008
Intelligent file virtualization helps resolves the dilemma of managing and storing an ever increasing amount of information. This white paper introduces the F5 ARX intelligent file virtualization solution. It also discusses the key applications and benefits of this innovative technology.
Tags : 
intelligent file virtualization, f5 arx, key applications, data migration, data replication, storage, data management
    
F5 Networks Inc
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre
    
VMware/Intel Server Refresh and Cost Savings
Published By: Citrix Systems     Published Date: Feb 27, 2014
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. Success with mobilizing Microsoft® Windows® applications also requires a broad technology approach. The right approach integrates a universal client and single sign-on with a comprehensive application delivery platform to ensure information security and a seamless user experience. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, mobile. mobilizing, windows applications, microsoft windows, it management
    
Citrix Systems
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability
    
CDW
Published By: Aruba Networks     Published Date: Sep 18, 2013
In this whitepaper Gartner explores smartphones and tablet devices, and their applications, which are increasingly at risk of malware. IT security planners and operations managers can thwart serious malware threats for the time being with these best practices. Read this whitepaper for more information.
Tags : 
smartphones, tablet devices, malware, best practices, security planners, risk, applications, technology
    
Aruba Networks
Published By: Aruba Networks     Published Date: Jul 03, 2013
The increased performance and higher capacity of 802.11ac have tremendous appeal for organizations rapidly approaching the limits of their current Wi-Fi network, or for organizations that are striving to adopt next-generation applications or interactive network experiences. To help identify these opportunities, this brief represents the top use cases for adopting 802.11ac technology today.
Tags : 
802.11n, 802.11ac, ieee, enhancements, reliability, 5-ghz, capacity
    
Aruba Networks
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: ServiceNow     Published Date: Oct 11, 2017
Customer service and contact centers are on the front lines representing organizations. Their successful handling of service issues helps deliver on the promise of a great customer experience. To continue meeting the demands of customers — while fulfilling the organizational goal of delivering a differentiated service experience — the modern customer service organization requires a seamlessly integrated front-office to back-office enterprise applications architecture and set of processes. As products and services become more technical in nature — think IoT devices — this interconnectedness is essential. Systems and customer support staff must be informed and enabled through technology to provide a contextualized experience that meets the customer's needs. Consistency across channels, proactive service, knowledge of a customer's past service requirements, technical skills, and rapid assessment and response will be essential requirements for modern customer service, which in turn creates
Tags : 
    
ServiceNow
Published By: AWS     Published Date: Jul 25, 2019
What you'll learn in this webinar: Modernize your databases and applications by migrating to Amazon Aurora. Take advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS) to optimize your operations. TekStream, an AWS Partner Network (APN) Advanced Consulting Partner, specializes in migrating legacy on-premises databases to AWS. Watch this webinar to learn how TekStream helps you break free from commercial database licenses, such as Microsoft and Oracle, and move your databases to the cloud in order to focus on your core business. Watch our webinar to learn how TekStream can help you: Understand your options when migrating your databases to Amazon Aurora Reduce the annual maintenance and support costs associated with commercial database licenses See how the combination of business consultation and technology implementation can markedly improve operations
Tags : 
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.