asset applications

Results 1 - 25 of 42Sort Results By: Published Date | Title | Company Name
Published By: Extensis     Published Date: Jun 08, 2010
Metadata Management is the process of ensuring that all metadata associated with a digital asset is captured, organized, stored and made available for use by and within other applications. Metadata Management begins at the moment the digital asset is created by an application or captured by digital imaging.
Tags : 
metadata, management, extensis, digital asset management'
    
Extensis
Published By: Logicalis     Published Date: Sep 22, 2014
Most data initiatives face roadblocks from both technology and business perspectives. What steps can you take to resolve them, and what are the areas where an IT provider can help?
Tags : 
netapp, logicalis, data centers, data, data management, big data, digital asset management, data center services, data center knowledge, it management, enterprise applications
    
Logicalis
Published By: Logicalis     Published Date: May 06, 2014
Most data initiatives face roadblocks from both technology and business perspectives. What steps can you take to resolve them, and what are the areas where an IT provider can help?
Tags : 
hewlett packard, logicalis, data centers, data, data management, big data, digital asset management, data center services, data center knowledge, it management, enterprise applications
    
Logicalis
Published By: IBM     Published Date: Oct 22, 2013
Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change.
Tags : 
ibm, integration testing, optimize test efficiency, incremental integration, employ test virtualization, system-level testing, asset sharing, effective data management, e2e testing, applications
    
IBM
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : 
asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union
    
Vision Solutions
Published By: CDW     Published Date: Nov 05, 2013
A software audit can be either an internal process, executed by an in-house team or consultants, or it can be done externally, by the vendor. If done internally, the results are used by the organization to check what software is installed across the network, how the software is being used and how this usage compares with the entitlements owned by the organization. If you haven’t already been audited—get ready; it’s not a case of if, but when.
Tags : 
cdw solutions, software audit, software publisher, end user license agreement, eula, asset management, conduct self-audits, desktop deployment, prepare for audits, internal audits, enterprise applications, enforced vendor audit, immediate resolution
    
CDW
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage
    
CA Mainframe
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Thrill customers and empower employees with omni-channel, socially-infused digital experiences to drive better business outcomes IBM Customer Experience Suite features rich, integrated capabilities for managing web content, rich-media assets, real-time social communications, robust customer self-service capabilities, business analytics and mobile device delivery IBM Employee Experience Suite enables employees to easily find and share relevant information across multiple platforms, diverse geographies with multiple languages, and within the context of business applications
Tags : 
digital experience, ibm, software
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api
    
IBM
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The network of yesterday is not the network that can take businesses into the future. As mission critical enterprise applications move to the cloud, wide area network (WAN) must adapt to become agile, flexible, and scale rapidly. Leading IT trends such as Internet of Things (IoT), Software as a Service (SaaS), cloud storage, enterprise mobility, emerging transport alternatives, and globalization increase the importance of how network assets are leveraged and how the network is conceptualized. The advantages of public and private data centers and cloud-based applications are significantly diminished if the network is slow, inflexible, and unpredictable. Erratic network performance with high latency, jitter and packet loss can significantly impact user adoption, satisfaction, and overall corporate productivity. As connectivity options continue to emerge, end users are no longer tethered to the office or to the localized applications and services that were trademarks of a primary or branc
Tags : 
sd-wan, saas, cloud storage
    
VMware SD-WAN by VeloCloud
Published By: IBM     Published Date: Jan 13, 2009
In business, no two challenges are the same. To be effective now and in the future, organizations must be able to adapt with speed and agility. Read this white paper to learn how enterprise mashups can help you use existing IT assets and projects to solve situational problems and take advantage of business opportunities.
Tags : 
ibm, enterprise mashups, it assets, situational applications, information mashing, governance, supply chain management
    
IBM
Published By: IBM     Published Date: Jun 24, 2009
Improving access to core applications and data is just one of many mandates facing IT, along with improving collaboration, reducing administration costs and improving performance. Fortunately, shops running System z have an advantage. You can integrate and enhance your System z assets faster when you use the version 6.1 update to IBM WebSphere Portal on z/OS. Use it to quickly deploy business applications across the enterprise, reduce costs and increase flexibility with workloads centralized on System z.
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: CA Technologies     Published Date: Jul 26, 2017
Extending DevOps to mainframe applications and teams is essential towards the agility and velocity that enterprises require to remain innovative in today’s turbulent digital business environment. Talking Points: • For enterprises with mainframes, trying to achieve the benefits of Digital Transformation without dealing with existing mainframe assets is a fool’s errand. • Breaking down silos and moving to DevOps is central to what it means to undergo Digital Transformation. • Including the mainframe in modern software development approaches can improve quality overall, reduce test cycles and deployment timeframes, and ensure mainframe-based applications support the end-to-end performance requirements that today’s customers demand.
Tags : 
    
CA Technologies
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: Adobe     Published Date: Feb 20, 2014
Adobe positioned highest in Ability to Execute and Completeness of Vision in Gartner’s Magic Quadrant for Web Content Management. Gartner’s evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : 
gartner, adobe, adobe social, digital asset management, web content management, adobe experience manager, aem, internet marketing, marketing, customer engagement, user experience, mobile applications, content management
    
Adobe
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing, data breach, breach
    
Rapid7
Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
    
Akamai Technologies
Published By: Riverbed     Published Date: Jul 17, 2013
Effective IT planning and decision making are dependent upon having a complete asset inventory and an accurate understanding about dependencies available before, during and after IT change activities. Application discovery and dependency mapping (ADDM) solutions automate the process of discovering and mapping transactions and applications to the underlying infrastructure and application interdependencies. Learn how Riverbed Cascade’s built-in application discovery and dependency mapping capabilities can help you shorten project times and mitigate risk.
Tags : 
effective it, addm, application discovery, riverbed cascade
    
Riverbed
Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: Red Hat APAC     Published Date: Jul 16, 2019
https://asset.madisonlogic.com/production/asset-approval/35341_78975_preview.html?v=1563344610178 Red Hat CTO for global service providers, Ian Hood, and TelecomTV talk about multi edge compute capacity and the fundamental need to have a common platform to deliver future services. ‘If you are not feeling some pain, you are not driving fast enough’, says Red Hat CTO, Global Service Provider, Ian Hood. The race to 5G is definitely on, and the use cases are clear. You can talk about multi edge compute capacity and other technical issues, but the fundamental thing is to have a common platform to deliver future services. We need to get to the point where IoT Everywhere, virtualized video and all the applications that come from new 5G services are delivered seamlessly. Even blockchain has a clear future within the telco environment where the world of eSIMs, secure roaming charges and identity management can alls be based on blockchain technology.
Tags : 
    
Red Hat APAC
Previous   1 2    Next    
Search Resource Library