back end

Results 51 - 75 of 292Sort Results By: Published Date | Title | Company Name
Published By: WebiMax     Published Date: Oct 29, 2014
In most use cases involving flash storage deployments, the business environment changes, driving a need for higher-performance storage. However, the case of Epic Systems Corporation software is the opposite—the storage requirements haven’t changed recently, but the options for addressing them have. Epic, a privately-held company founded in 1979 and based in Verona,Wisconsin, makes applications for medical groups, hospitals and other healthcare organizations. Epic software typically exhibits high frequency,random storage accesses with stringent latency requirements. IBM has been working with Epic to develop host-side and storage-side solutions to meet these requirements. Extensive testing has demonstrated that the combination of IBM® POWER8™ servers and IBM FlashSystem™ storage more than meets the performance levels Epic recommends for the backend storage supporting its software implementations—at a cost point multiple times lower than other storage alternatives.
Tags : 
webimax, ibm, flashsystem storage, epic systems corporation, epic requirements, performance levels, it management, storage
    
WebiMax
Published By: CA Technologies     Published Date: Jan 14, 2015
In the past, Enterprise IT managed the back of?ce…the data center…the systems that kept the business running. Today, there is a mandate for IT to adopt a new role—one that speaks a common language with the business. This new IT mans the storefront, interacts directly with customers and thinks beyond uptime metrics to give equal consideration to cost, spend, quality and consumption.
Tags : 
enterprise it, metrics, cost, quality and consumption, front office, it management
    
CA Technologies
Published By: JBoss Developer     Published Date: Feb 05, 2016
Perhaps the biggest transformation in enterprise IT since the public cloud emerged is the move toward “mobile-first” application development. As mobility continues to become the new enterprise standard, developers are looking for frameworks that provide the tools they need to create innovative mobile applications without sacrificing their existing investments. While there are proven, enterprise-ready frameworks and platforms for developing and deploying traditional desktop applications, the mobile application development landscape is still evolving. Mobile Backend as a Service (MBaaS) attempts to fill the gap between traditional application platforms and mobile applications. It is the new middleware, exposing APIs and functions that enable developers to rapidly build new mobile apps and mobile-enable legacy enterprise applications.
Tags : 
jboss, red hat, gigaom, enterprise, mbaas platforms, cloud, mobile applications, it management
    
JBoss Developer
Published By: CA Technologies     Published Date: Aug 21, 2017
Effektive Messdaten und Messungen sind für ein leistungsstarkes Unternehmen unerlässlich. Wenn sie richtig genutzt werden, ermöglichen sie bessere Einblicke, bessere Entscheidungen und bessere Unternehmensergebnisse. Sie bieten Feedback als Grundlage für Verbesserungen und neue Kenntnisse. Sie helfen Ihnen, die richtigen Ergebnisse zu identifizieren, die Sie Ihren Unternehmenszielen näherbringen. Viele Unternehmen verwenden diese leistungsstarken Werkzeuge jedoch falsch und zerstören so aktiv die Agilität, die sie erreichen möchten. In diesem Artikel zeigen wir neun Fehler auf, die bei Agile-Messungen auf Unternehmensebene unterlaufen – und wie sie vermieden werden können.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
• Verwenden Sie CA Live API Creator, um funktionierende Prototypen in Stunden zu liefern. Konvertieren Sie Unternehmensanforderungen in eine funktionsfähige Software. • Nicht nur für Wireframes, sondern auch für funktionierende Systeme, Datenbanken, Logik und Benutzeroberflächen. Es ist so einfach wie eine Kalkulationstabelle und geht auch so schnell. • Beeindrucken Sie die Anwender im Unternehmen, indem Sie innerhalb von Stunden Ergebnisse liefern und Feedback zum Datenmodell und zur Logik einholen. Iterationen sind unmittelbar möglich. • Alles, was Sie benötigen, ist enthalten. Es muss keine IDE installiert oder konfiguriert werden. Verwenden Sie einfach Ihren Browser.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
The “connected car” market is forecasted to reach $98.42 billion by 20181. The convergence of the app economy, increased connectivity, the Internet of Things (IoT), growth of in-car screen displays and open enterprise data models is giving automotive manufacturers and their partners a wealth of opportunities to improve service delivery and backend supply-chain management.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The ‘80s Called… … And they don’t want their enterprise Project and Portfolio Management (PPM) tools back. If your Project Management Office (PMO) is still relying on the same or similar processes and systems used when neon and mullets were trending, it will never keep pace with today’s market demands or shifts in technology. Six-month deployment schedules and command and control models of yesteryear are actively being replaced with continuous delivery methods and practices like agile and lean—all in the interest of driving greater customer engagement.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Apr 05, 2016
IBM SPSS Solutions offer a straightforward, visual solution that is easy to use on the front end and highly scalable on the back end.
Tags : 
ibm, big data, little data, ibm spss solutions, knowledge management, data management, business technology
    
IBM
Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application
    
Qualys
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: WNS     Published Date: Jun 21, 2017
E-commerce which till a few years back was of peripheral significance to the CPG industry is now one of the biggest drivers of change and innovation in the sector. The numbers representing growth are quite staggering with McKinsey1 believing that the online space will account for anywhere from 10 to 30 percent of total industry sales growth in the next five years. This equates to a market opportunity of USD 15 Billion to USD 50 Billion. Given how digital is impacting every part of the CPG value chain, companies need to be awake to the emerging trends as they can potentially have a make or break effect. This article discusses key trends that will define the CPG space in days to come.
Tags : 
ecommerce, cpg companies, personalization, market mix modeling, digital media, integrated it infrastructure, predictive demand, agile supply chain
    
WNS
Published By: Castlight Health     Published Date: Feb 14, 2017
Tired of year after year of healthcare cost increases, Steel Dynamics decided to fight back. They partnered with Castlight Health, a cloud-based provider of healthcare management services. Castlight Health’s health benefits platform armed employees with buying information — when and how they needed it. As a result, Steel Dynamics cut healthcare spending by approximately $500,000 in their first year with Castlight Health.
Tags : 
    
Castlight Health
Published By: CA Technologies     Published Date: Jun 04, 2015
Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: Storiant     Published Date: Apr 27, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : 
storage technologies, it storage vendors, storiant, storage infrastructures, automated storage
    
Storiant
Published By: Cisco     Published Date: Apr 11, 2016
Los atacantes y los responsables de la seguridad están desarrollando tecnologías y tácticas cada vez más sofisticadas. Por su parte, los atacantes están creando infraestructuras back-end sólidas para el lanzamiento y soporte de sus campañas. Los ciberdelincuentes están perfeccionando sus técnicas para obtener dinero de sus víctimas y para evitar ser detectados mientras continúan robando datos y propiedad intelectual.
Tags : 
    
Cisco
Published By: Lucidworks     Published Date: Aug 24, 2016
In reality, we developed search technologies, not primarily as a front-end service but to alleviate the challenges of the back end: our data. Search grew in direct response to data problems. The search story can’t be told without the data story, and high-volume data would be nearly useless without search technology. Download this eBook to learn more about search technologies.
Tags : 
search, search query, search technologies, search apps, data problems, ecommerce search
    
Lucidworks
Published By: Carbonite     Published Date: Jul 12, 2017
With IT departments stretched thin, it’s no wonder more businesses are looking to outsource their backup and disaster recovery (BDR) plan. The rise of disaster recovery as a service (DRaaS) is a big win for businesses that want their IT staff focusing on strategic business goals but still require a dependable, provable BDR deployment. Find out more by reading our white paper, 5 reasons to choose DRaaS. Carbonite DoubleTakeTM is now delivering leading DRaaS solutions for complex and mixed environments. Contact us to learn more.
Tags : 
information technology, disaster recovery, it development, outsource
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : 
evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
There are five essential pieces to a sound backup and disaster recovery (BDR) plan, and IT pros who follow these steps are able to feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through BDR deployments, to learn these five fundamentals. Understand how to size your environment, evaluate your BDR capabilities, and test your system for any surprises.
Tags : 
bdr, recovery capabilities, backup data repositories, data center, over - the - wire, remote
    
Carbonite
Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC
Published By: Rackspace     Published Date: Mar 20, 2019
Running an IT backend that is secure, scalable and well-managed is resource draining for any enterprise. Challenger, Singapore’s largest IT retailer, took a more pragmatic route by transforming on a Online to Offline (O2O) model. For the journey, it partnered with Rackspace to accelerate the value of its AWS cloud migration, by tapping its proven AWS expertise, strong managed services portfolio, and familiarity with local regulatory compliance and cloud security demands
Tags : 
    
Rackspace
Published By: Oracle     Published Date: Nov 30, 2017
Secondary DNS (sometimes referred to as multi-DNS) operates in an “always on” manner to complement your existing infrastructure as an additional authoritative DNS service. When an end user’s recursive server initiates a DNS request, both the “primary” DNS service and the “secondary” DNS will respond as soon as they receive the request. The response that reaches the recursive server first will be passed back to the end user, completing their request.
Tags : 
dns, service, server, infrastructure, technology, business, optimization
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Secondary DNS (sometimes referred to as multi-DNS) operates in an “always on” manner to complement your existing infrastructure as an additional authoritative DNS service. When an end user’s recursive server initiates a DNS request, both the “primary” DNS service and the “secondary” DNS will respond as soon as they receive the request. The response that reaches the recursive server first will be passed back to the end user, completing their request.
Tags : 
dns, service, server, infrastructure, technology, business, optimization
    
Oracle Dyn
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.