application services

Results 301 - 325 of 592Sort Results By: Published Date | Title | Company Name
By: ClickExpress     Published Date: May 01, 2013
The path forward is clear: the best practices organizations have already taken the first steps to establish a stronghold with the application of Mobile Workforce Management Solutions. They are already at the vanguard of technology adoption, implementation, and usage. However, as the global services economy continues to expand, all services organizations that expect to compete successfully in their respective market space will need to embrace the state-of-the-art technologies that will allow them to survive – and thrive – in an increasingly competitive marketplace.
Tags : stage, practice, service, performance, organizations, management solutions, implementation
     ClickExpress
By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
     VeriSign Incorp.
By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Infoblox     Published Date: Feb 03, 2009
Today’s networks support more applications, traffic, users, and devices than ever before – a trend that only increases on a daily basis. At the heart of all IP networks live core network services, like DNS, DHCP, and  RADIUS that are crucial for keeping traffic flowing, users connected, and applications available.
Tags : infoblox, core network services, dhcp, ip networks, radius, ip address assignment, ipam, ip telephony
     Infoblox
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 has worked with Microsoft during the beta cycle and beyond to ensure a high level of interoperability and optimization with the entire Windows Server 2008 platform. F5’s Application Ready Network for Windows Server 2008 not only helps optimize end-to-end performance, availability, and scalability for Windows Server 2008 deployments, but reduces the costs associated with deployment, management, and operation.
Tags : microsoft windows server 2008, application ready network guide, end-to-end performance, windows server 2008 deployments, windows, 2008, iis, internet information services, wts, terminal services, sstp, microsoft, application ready network, arn
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 22, 2009
One of the unfortunate effects of the continued evolution of the load balancer into today's application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created-producing highly available, scalable, and predictable application services. This White Paper describes the Evolution of load balancing devices to Application Delivery Controllers.
Tags : application delivery controller, load balancer, load balancing
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Feb 24, 2010
Moving your applications and services transparently between clouds is now possible with F5 and VMware.
Tags : cloud computing, vmware vmotion, application storage migration, data center, virtualization
     F5 Networks Inc
By: YASH Technologies     Published Date: Jul 06, 2010
In today's competitive global marketplace, Application Management Services (AMS) have become increasingly important for international companies to comply with country-specific markets and regulations, and ensure high-quality operations of SAP solutions in a sustainable, cost-effective manner.
Tags : yash, sap, erp, erp outsourcing, erp for manufacturing, application integration
     YASH Technologies
By: Citrix Systems     Published Date: Nov 23, 2015
Learn why NetScaler is the most fexible and effective application delivery solution for building high-density, multi-tenant data centers and cloud services.
Tags : netscaler, citrix, data center, cloud services
     Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
In the competitive business world IT organizations need to respond rapidly to the ever-changing needs of their users for resources to support their business applications.
Tags : citrix, networks, application delivery, sdn
     Citrix Systems
By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
     Viavi Solutions
By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : ssl certificates, communication, webmail, technical support, technology, data, security
     Symantec Corporation
By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market
     Aruba Networks
By: Cisco     Published Date: May 14, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity.
Tags : api, applications, monitoring, application management, communications, cisco
     Cisco
By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
     VMware SD-WAN by VeloCloud
By: CenturyLink     Published Date: Jan 02, 2015
DevOps Unlimited needed to provide application infrastructure for a start-up client which was enjoying rapid growth with its new financial services product. Neither DevOps nor the client wanted to invest in, or manage, its own IT hardware, so a cloud service was the ideal solution. It would give the client the ability to grow rapidly without tying up time, resources and capital expense deploying dedicated IT hardware.
Tags : centurylink, devops, enterprise applications, cloud, it hardware
     CenturyLink
By: MuleSoft     Published Date: May 02, 2016
This is a webinar about the top tech trends a CIO needs to know.
Tags : tech trends, cio, digital transformation, applications, data, software services, mobile
     MuleSoft
By: ServiceNow     Published Date: Oct 11, 2017
Customer service and contact centers are on the front lines representing organizations. Their successful handling of service issues helps deliver on the promise of a great customer experience. To continue meeting the demands of customers — while fulfilling the organizational goal of delivering a differentiated service experience — the modern customer service organization requires a seamlessly integrated front-office to back-office enterprise applications architecture and set of processes. As products and services become more technical in nature — think IoT devices — this interconnectedness is essential. Systems and customer support staff must be informed and enabled through technology to provide a contextualized experience that meets the customer's needs. Consistency across channels, proactive service, knowledge of a customer's past service requirements, technical skills, and rapid assessment and response will be essential requirements for modern customer service, which in turn creates
Tags : 
     ServiceNow
By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
     AWS
By: AWS     Published Date: Oct 30, 2018
Enhance the Availability & Performance of SAP HANA Apps Abstract: SAP HANA delivers powerful analytics capabilities that can help you improve business performance and drive digital transformation. You can more easily build reliable and performant SAP HANA-powered landscapes with SUSE Linux Enterprise Server for SAP Applications and Amazon Web Services (AWS). That’s because SUSE can help you achieve near zero downtime and sustain high-performance levels, while AWS delivers a broad and deep set of cloud services that are certified to fulfill the compute, memory, and storage requirements of SAP HANA.
Tags : availability, performance, sap, hana, apps
     AWS
By: Mitto     Published Date: Jun 09, 2017
A2P (Application to Person) messaging has underpinned this transformation, across a wealth of new use cases and new verticals. Historically, A2P was used for alerts and, as PSMS (Premium SMS), as a billing mechanism and carrier for simple content and services, both for one-off downloads or actions (eg voting) and for recurring payments. The latter use case has declined markedly in the past 5 years, due largely to the transition to an app-based economy, largely driven by card billing and by regulatory action (in markets such as the US and UK) against fraudsters.
Tags : 
     Mitto
By: Red Hat     Published Date: Mar 28, 2019
Digital business requires a culture of organizational agility, as the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. Most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, so they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility. The cloud-native approach modernizes existing applications and builds new applications based on cloud principles, using services and adopting processes optimized for the agility and automation of cloud computing.
Tags : 
     Red Hat
By: Red Hat     Published Date: Mar 28, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster.
Tags : 
     Red Hat
By: Red Hat     Published Date: Mar 28, 2019
Applications have moved outside the IT department. There’s a truism that all companies are now software companies, and the ability to rapidly provide new services and new functionality to customers is one of the key competitive differentiators a company can offer. IT agility is a stone that startup Davids can use to unseat massive Goliaths.
Tags : 
     Red Hat
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com