deploy application

Results 451 - 467 of 467Sort Results By: Published Date | Title | Company Name
Published By: SWsoft     Published Date: Feb 28, 2007
Virtual appliances have recently been gaining notoriety with IT organizations. These pre-packaged ready to deploy instances of an applicationcreated in a virtual machine or environment can provide significant management savings. While they can be a powerful IT tool, not all virtual appliances are created equally.
Tags : 
server virtualization, virtualization, swsoft, servers, virtual appliances, networking, platforms, server hardware, virtuozzo, swsoft, sw soft
    
SWsoft
Published By: EMC Corporation     Published Date: Jun 12, 2012
This complimentary 1-page white paper outlines the top 10 reasons why customers deploy virtualized Microsoft applications on EMC VNX. Find out more today!
Tags : 
emc vnx, microsoft, emc, idc analyst report, virtualization, backup and recovery, vm sprawl, vmware, disaster recovery, infrastructure, avamar
    
EMC Corporation
Published By: AWS     Published Date: Nov 12, 2018
VMware Cloud on AWS makes it easier for your organization to run VMware workloads on AWS, giving you a simple path to hybrid cloud deployment. Adopting this service will allow your organization to preserve your investments in existing applications, licenses, and processes, while taking advantage of the advanced capabilities that AWS has to offer. With just a few clicks, you will be able to rapidly provision and scale AWS resources that are operationally consistent with vSphere. VMware Cloud on AWS delivers workload portability powered by the VMware technology in your on-premises data center, combined with the cloud-scale resources and global footprint of AWS. It is truly a next-generation solution that gives you the best of both worlds.
Tags : 
    
AWS
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Deploying virtual desktops and applications can be a rigorous process if organizations are not using the appropriate tools. Even amongst the best run IT organizations, setting up a complete VDI environment can take several days and sometimes weeks to install and configure. This leads to long maintenance windows and a lot of time needs to be set aside to design and scale the environments equaling higher costs in the long run. Download this solution brief to discover a new approach to building, delivering and managing virtual workspaces.
Tags : 
    
VMware AirWatch
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality
    
Microsoft Dynamics
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Organizations don’t know what’s going on inside their networks, and that’s costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target. The impact of network performance problems on worker productivity has become a serious business risk. To mitigate it, organizations need to strategically embrace a network recording infrastructure that provides them with accurate, network-wide visibility. Only accurate visibility will empower them to slash maximum and mean response and repair times and keep network-reliant business applications and processes running. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications
    
Webroot
Published By: Five9     Published Date: Apr 29, 2013
Some argue that a single enterprise provisioning applications to their own operations from an owned and operated data center is cloud.
Tags : 
five9, cloud, cloud computing, on-premises deployments, cloud application, cloud-based applications
    
Five9
Published By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx, vsrx
    
Juniper Networks
Published By: Sierra Wireless     Published Date: Jun 19, 2019
The IoT is transforming the energy industry by eliminating tradeoffs between operation, SCADA systems, maintenance and new services for assets deployed in industrial and power facilities, buildings and across the grid. When it comes to building the best IoT system for your business application, it’s vital to keep your use case and business requirements at the forefront of your technical design strategy. In the energy industry, accessing and collecting data at the edge from disparate, heterogenous, multi-site, fixed topologies and transferring that data efficiently to the cloud to perform analytics and action business decisions is still the greatest challenge. Mission-critical data collected from the edge is integral to energy facility operations and cannot be excluded or corrupted.
Tags : 
    
Sierra Wireless
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Jelecos     Published Date: Aug 02, 2018
The people of Jelecos are experts in migrating some or all of a Customer’s work-loads or operations to AWS. We can help you build, deploy, scale, and manage Microsoft applications easily, quickly, securely and cost-effectively.
Tags : 
    
Jelecos
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing, software license, compliance, appsense
    
AppSense
Published By: Dell     Published Date: Oct 23, 2008
Windows Vista® offers a new way to deliver manageable IT services that are planned for security service-level agreements (SLAs), while helping to lower the cost of ownership, management, and deployment.
Tags : 
dell, service-level agreements, lower cost of vista deployment, application compatibility, client deployment solutions, image management
    
Dell
Published By: Dell     Published Date: Sep 07, 2011
Take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
Tags : 
windows 7, microsoft deployment, desktop, inventory applications, windows xp, healthcare management, healthcare, public health
    
Dell
Published By: Pure Storage     Published Date: Mar 15, 2018
The all-flash array (AFA) market has undergone significant maturation over the past two years. A high percentage of customers have already committed to an "all flash for primary storage" strategy, and every customer interviewed for this study was among those. In 2017, AFAs will drive over 80% of all primary storage revenue. All of the established storage vendors have entered this space, and there are several start-ups with over $100 million in revenue. With this level of market maturation, multiple segments have developed within the primary flash array space. There are systems targeted for dedicated application deployment, there are systems specifically for web-scale applications, and there are systems intended for dense mixed workload consolidation. These latter systems are driving most of the AFA revenue, and they aspire to become the primary storage platforms of record for enterprises of all sizes. This study evaluates the suitability of 10 vendors' AFA platforms for dense mixed ent
Tags : 
    
Pure Storage
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.