software platforms

Results 26 - 50 of 54Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration.
Tags : 
    
VMware
Published By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
    
Intel
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle, business technology
    
Veracode
Published By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure
    
Entrust Datacard
Published By: Sponsored by Spredfast     Published Date: May 11, 2015
This report examines the market for enterprise social media management software (ESMMS) and the considerations involved in implementing ESMMS platforms.
Tags : 
social media management, social media, facebook, twitter, instagram, esmms
    
Sponsored by Spredfast
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management
    
IBM
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp, networking, it management, data management
    
Cisco
Published By: HP     Published Date: Oct 15, 2014
Just “keeping the lights on” in the server room is highly complex and largely inefficient. Maintaining IT infrastructure, system interdependencies, and application interoperability tie up valuable personnel and resources. The old way of simply throwing more hardware capacity at a problem can only serve to increase the complexity and further dampen productivity. In a perfect world, the infrastructure—hardware and software—would have been built as an integrated but scalable unit from the ground up. In our world, though, the best new systems combine independent pieces of IT infrastructure to form simplified computing platforms, freeing up IT to focus on business innovation rather than infrastructure management. Welcome to the new world of IT.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
    
HP
Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization, it management
    
Red Hat
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity
    
MobileIron
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
security, software, mobile, mobile application, malware, code signing, software development
    
Symantec Corporation
Published By: Red Hat     Published Date: Jun 10, 2014
Read this whitepaper to learn how infrastructure leaders can confidently manage cost, complexity, and risk, capitalize on emerging technologies, and drive future innovation across their organizations with Red Hat Storage Server, an open, software-defined storage platform.
Tags : 
red hat, storage, data deluge, it organizations, emerging technologies, software defined storage platforms, it management, data management
    
Red Hat
Published By: Red Hat     Published Date: Jun 10, 2014
Read this whitepaper and learn how administrators are keeping up by guiding their enterprises toward new, software-defined storage platforms that simplify and unify storage capacity across the enterprise and into the cloud.
Tags : 
red hat, architects, data driven applications, data, storage platforms, storage server, data defined storage platforms, it management
    
Red Hat
Published By: Red Hat     Published Date: Jun 09, 2014
Read this whitepaper to learn how infrastructure leaders can confidently manage cost, complexity, and risk, capitalize on emerging technologies, and drive future innovation across their organizations with Red Hat Storage Server, an open, software-defined storage platform.
Tags : 
red hat, storage, data deluge, it organizations, emerging technologies, software defined storage platforms, it management, data management
    
Red Hat
Published By: Red Hat     Published Date: Jun 09, 2014
Read this whitepaper and learn how administrators are keeping up by guiding their enterprises toward new, software-defined storage platforms that simplify and unify storage capacity across the enterprise and into the cloud.
Tags : 
red hat, architects, data driven applications, data, storage platforms, storage server, data defined storage platforms, it management
    
Red Hat
Published By: Progress Software     Published Date: Mar 12, 2014
This report enumerates the Top 10 technology trends that are reshaping the nature and value proposition of business applications today and in the future.
Tags : 
progress software, technology trends, forrester, business application, enterprise architects, cloud deployment, user experience, real time analytics
    
Progress Software
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
symantec, mobile, mobile applications, security
    
Symantec Corporation
Published By: Scribe     Published Date: Oct 09, 2013
Today’s customers are empowered with information – if they want to know something, they can look it up in an instant. Having information they need at their fingertips is expected. Having information at the ready – whether your sales or service personnel are in the field or in the office – is no longer a competitive advantage, it’s expected and required. In this whitepaper, you will learn how Scribe’s customer data integration solutions and connectors let you put customer information where it needs to go quickly and easily. Don’t be that business who makes their customers wait for answers!
Tags : 
scribe, scribe software, data, data integration, business systems integration, applications, integration platforms, cloud
    
Scribe
Published By: Thawte     Published Date: Aug 08, 2013
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, networking, data management
    
Thawte
Published By: Teradata     Published Date: Jun 12, 2013
Until now, huge amounts of data have been ignored or underutilized simply because the tools didn't exist to make sense of it all. The good news is that increasingly sophisticated software is combining with growing computing horsepower to produce new analytics platforms that can handle all types of data from disparate systems Organizations can extract intelligence from their data to significantly outperform their rivals on growth, earnings, and performance.
Tags : 
unified data architecture, big data, analytics
    
Teradata
Published By: HP and Intel ®     Published Date: May 03, 2013
In this white paper, Stratecast explores the relationship between hardware and software components in delivering a high-performing cloud environment. We present a list of questions to guide the reader in evaluating the offers of different cloud providers. Finally, we consider HP integrated solutions (hardware tuned to service automation platforms) as an effective choice for building a high-performance cloud environment.
Tags : 
software, hardware, integration, competitive advantage, cloud, infrastructure, it management, business technology
    
HP and Intel ®
Published By: AMD     Published Date: Oct 08, 2012
Virtualization has become the go-to technology to help organizations of all sizes successfully consolidate IT resources.
Tags : 
amd, cloud computing, cloud, data, data management, infrastructure, virtualization, cloud computing
    
AMD
Published By: AMD     Published Date: Oct 01, 2012
Virtualization has become the go-to technology to help organizations of all sizes successfully consolidate IT resources.
Tags : 
amd, virtualization, hardware, software, platforms, consilidation
    
AMD
Published By: AMD     Published Date: Jul 23, 2012
For most organizations, consolidation is the starting point and primary initial driver for their virtualization efforts. By enabling the sharing and pooling of resources, virtualization has become a proven, adept and widely adopted technology in allowing organizations of all sizes to achieve some of their most important technology consolidation initiatives.
Tags : 
virtualization, it resources, amd, microsoft, it infrastructure, cost-efficient, software platforms, green computing
    
AMD
Start   Previous    1 2 3    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.