RecruitingBlogscom

Follow Us:

 

app environment

Results 51 - 75 of 616Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Feb 23, 2017
Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Plus, Dell EMC VxRail is more than 30% lower total cost of ownership compared to a build-your-own solution. This report looks at:
Tags : 
hyper-converged infrastructure, hci, hyper-converged appliance, enterprise workload, vmware environment
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 23, 2017
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Intel Inside®. Powerful Possibilities Outside. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
hyper-converged infrastructure, hci, hyper-converged appliance, vmware environment, intel processors
    
Dell EMC
Published By: Polycom     Published Date: Sep 04, 2012
Video enables public sector organizations to enable e-governance services and remote judicial applications and crisis management solutions in a richer and more collaborative environment.
Tags : 
tele-health, enterprise video initiatives, business video applications, healthcare, video, telepresence
    
Polycom
Published By: Quantum     Published Date: Jan 24, 2017
Is your organization ready to take the plunge into in-house video production? The benefits can be substantial, but making the move requires some preparation. The IT infrastructure you use for enterprise applications might not be able to meet the rigorous requirements of video production. And you might not want video production teams to use resources from your existing infrastructure, since doing so could affect the performance of other applications. Whether you’re just getting started with in-house video or ramping up production, consider these five best practices for building an IT environment optimized for video work. The right approach to IT is essential for developing efficient collaborative workflows and maximizing the value of your video content.
Tags : 
corporate video, corporate communications, video storage, enterprise video, enterprise storage, media production, video production, video marketing, video training, video communications, in-house video production
    
Quantum
Published By: DellEMC and Intel®     Published Date: Sep 16, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments
Tags : 
vxrail, hyper-converged infrastructure, converged infrastructure, vmware
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments
Tags : 
vxrail, hyper-converged infrastructure, converged infrastructure, vmware, convergence, infrastructure
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Rubrik EMEA     Published Date: Jan 04, 2019
Demand for flash storage is surging, but IT organizations are hard-pressed to align their data protection efforts with the realities of today’s infrastructure and application requirements in an increasingly flash-based environment.
Tags : 
: data, flash, storage, archiving, protection, recovery, workloads, applications, management
    
Rubrik EMEA
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology, networking, enterprise applications, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility
    
Blue Coat Systems
Published By: VMWare - vFabric     Published Date: May 10, 2012
Learn how SQLFire's speed and scale make it perfect for app development while its simple linear scalability makes it the perfect database to run in virtualized environments.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases, networking, data management
    
VMWare - vFabric
Published By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
    
HP Inc.
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies
Published By: Adobe     Published Date: Aug 04, 2015
This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.
Tags : 
e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement
    
Adobe
Published By: Riverbed     Published Date: Jul 17, 2013
To deliver IT performance, you need complete visibility. Riverbed Cascade offers a superior network performance management solution for discovering, monitoring and troubleshooting your network and your critical applications. Now you can resolve performance problems before they impact the business, while lowering your IT management costs. Cascade has an elegant and simple design that deploys easily in complex environments and provides true integration across the Cascade family. This cleaner architecture means superior visibility, management and troubleshooting, saving our customers both capex and opex. According to IDC, Cascade customers typically experience an 83% reduction in mean time to resolution (MTTR)
Tags : 
it performance, cascade, riverbed cascade, riverbed, it management, mttr, idc
    
Riverbed
Published By: Puppet     Published Date: Mar 09, 2017
System administrators and other IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Does the following apply to your organization? • You go from one server to the next, installing the same package on all of them. It works nine times out of 10, but the tenth time causes a failure ... and you can't identify what went wrong. • You can't scale. When the business wants to move to the cloud, or asks for faster provisioning of development and test environments, you only have so many hours in the day — and you can't meet everyone's needs. • You don't have time to get to the work that matters. You spend too much time on routine system management, and can't prepare for the projects that will bring real business value to your team — and customers. With growing demands from all corners of your organization, you simply can't keep doing it all manually. Download this paper to learn how you can benefit from automation, and how IT infrastructure can become a strategic ass
Tags : 
    
Puppet
Published By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you can’t escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: • Adopt and scale containers faster. • Move existing services to containers. • Eliminate the friction between development, QA, and production environments.
Tags : 
    
Puppet
Published By: Panaya     Published Date: Aug 04, 2016
This Panaya whitepaper explores methodologies and best practices for achieving IT agility for critical enterprise applications (ERP) in the era of digital transformation. It provides a unique perspective about how to increase IT velocity while minimizing IT risk and ensuring quality in a traditional IT environment.
Tags : 
panaya, erp, enterprise resources, digital transformation, digitalization, enterprise planning, erp software, knowledge management, enterprise applications, business technology
    
Panaya
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top