applications

Results 1 - 25 of 3952Sort Results By: Published Date | Title | Company Name
Published By: Gigaom     Published Date: Jun 25, 2019
Join this webinar to learn how the right data management practices and intelligent archives can boost the value of data and make it reusable for new applications, becoming a tool to improve and simplify the digital transformation journey of your organization.
Tags : 
aparavi, digital transformation, data management, data compliance, data storage, data liability, data regulations, data growth
    
Gigaom
Published By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC
Published By: VMware     Published Date: Jun 21, 2019
Business demands are shifting. The pace of technology is speeding up. The ability to deliver applications faster while building a hybrid cloud strategy is no longer a nice-to-have, but a must-have for modern businesses looking to stay competitive while meeting customer needs. The fast pace of digital business spurred organizations around the world to embrace compute virtualization, which transformed the data center over the past decade. But that transformation isn’t complete. Many IT teams still rely on hardware-centric approaches to storage and networking, which are expensive and time-consuming to manage and maintain, and don’t provide the flexibility and agility that today’s users demand. In an era where speed and performance are critical, moving to a software-centric approach in every area of the data center is the only way to get ahead. That’s why so many organizations are turning to hyperconverged infrastructure.
Tags : 
    
VMware
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: Gigamon     Published Date: Jun 21, 2019
Accelerate your digital transformation journey by giving teams and tools the application visibility needed to monitor and secure modern digital applications. Download this whitepaper to learn how you can Isolate and extract application and component traffic across multiple tiers for monitoring, Provide application metadata to analytics tools, enabling faster detection of customer experience, application performance and security-related issues and send only relevant traffic to the appropriate tools to reduce load and increase effectiveness.
Tags : 
    
Gigamon
Published By: Zscaler     Published Date: Jun 20, 2019
Les règles du jeu ont évolué : les applications migrent désormais vers le cloud, et les utilisateurs y accèdent de n’importe où, sans plus passer par le réseau de l’entreprise. Il est donc indispensable de repenser l’aspect sécurité de votre architecture. Découvrez avec ce livre blanc comment protéger vos actifs stratégiques avec les fonctionnalités Zscaler Data Protection et Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Découvrez grâce à ce guide comment rediriger de manière optimale le trafic de vos filiales, pour permettre un accès direct à Internet et à vos applications cloud. Baissez vos coûts, obtenez une visibilité complète sur vos flux et améliorer l’expérience de vos utilisateurs en sécurisant vos bureaux distants.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Les applications comme les utilisateurs ont désormais déserté le réseau de l’entreprise. Pourtant les systèmes de sécurité résident encore bien souvent dans les data centers. Il est temps de repenser votre architecture et offrir une expérience sécurisée et optimale à vos utilisateurs, où qu’ils soient. La sécurité offerte par la plate-forme cloud de Zscaler vous permet de transformer votre réseau pour profiter des avantages d’un monde orienté cloud et mobilité. Découvrez en plus grâce à ce livre blanc.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Le concept de backhauling vers un data center centralisé semble judicieux lorsque les applications et les utilisateurs y résident. Mais avec des collaborateurs dans vos différents bureaux et des applications qui migrent vers le cloud, rediriger le trafic sur un réseau en étoile offre une expérience utilisateur médiocre, qui plus est onéreuse et vecteur de davantage de risques. Le réseau SD-WAN est une réponse à ce défi. Il facilite la mise en place de points d’accès locaux à Internet. Zscaler les sécurisent. Découvrez comment grâce à ce livre blanc.
Tags : 
    
Zscaler
Published By: Rackspace     Published Date: Jun 20, 2019
In order to provide next-level digital experiences, you need to balance the modernisation of existing applications with the adoption of new ones. And a key factor in your ability to deliver these modern technologies and approaches is choosing the right foundation for your digital platforms. To help you choose the right platform for delivering more impactful customer experiences, our white paper, Modernise the Customer Experience with Your Apps: Delighting Customers Starts with the Right Cloud Foundation, covers the following topics: • Defining goals and requirements to ensure your modernisation efforts truly make an impact on the customer experience • Determining the right mix of infrastructure technologies to underpin the application ecosystem that powers your customer experience • Assessing application readiness to understand which workloads are best suited for public, private, and/or hybrid cloud.
Tags : 
    
Rackspace
Published By: Google - SAP     Published Date: Jun 20, 2019
SAP has been recognized as a leader in The Forrester Wave: B2B Commerce Suites, Q3 2018 report. Forrester evaluated the 12 most significant B2B commerce suite providers. According to the report, “SAP Commerce Cloud delivers a full featured suite that leverages the strengths of the SAP ecosystem and integration with the SAP S/4HANA and [SAP] C/4HANA applications.” The report also notes that “SAP Commerce Cloud is a best fit for companies looking for an industrial-strength, fully functional commerce platform.” Deliver personalized digital commerce experiences with SAP Customer Experience. For more details on the Wave evaluation, please download the complimentary copy of the report.
Tags : 
    
Google - SAP
Published By: Google - SAP     Published Date: Jun 20, 2019
SAP has been recognized as a leader in The Forrester Wave: B2C Commerce Suites, Q3 2018 report. Forrester evaluated the 11 most significant B2C commerce suite providers. According to the report, “SAP Commerce Cloud delivers a full featured suite that leverages the strengths of the SAP ecosystem and integration with the SAP S/4HANA and SAP C/4HANA applications.” The report also notes that “SAP Commerce Cloud is a best fit for companies looking for an industrial-strength full function commerce platform that is in wide use across several industry verticals.” Deliver personalized digital commerce experiences with SAP Customer Experience. For more details on the Wave evaluation, please download the complimentary copy of the report.
Tags : 
    
Google - SAP
Published By: Red Hat     Published Date: Jun 19, 2019
Cloud-native application development is an approach to building and running applications. It speeds time to market by using the cloud computing model, which is based on these key tenets:
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster. The following checklist will assess your needs and possible business impacts to help you choose a cloud-native platform that benefits the business, developers, and IT operations team.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by:
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another. In March 2018, Re
Tags : 
    
Red Hat
Published By: Zscaler     Published Date: Jun 19, 2019
The purpose of this document is to provide security guidance for routing traffic locally from your branch office locations to enable direct access to the internet and cloud applications. We will outline the five requirements for architecting the ideal solution. But first, let’s discuss why secure local internet breakouts have become necessary.
Tags : 
    
Zscaler
Published By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoT’s tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
    
Sierra Wireless
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Cybersecurity has been the #1 higher education IT concern for three straight years. Find out why identity plays an integral role in providing easy access to applications and files, while also securing sensitive data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
    
Infosys
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library