erp applications

Results 901 - 925 of 925Sort Results By: Published Date | Title | Company Name
Published By: Ultimus     Published Date: Aug 16, 2007
The challenge for BPM today is not to simply “automate” processes, but to deliver the human-centric capabilities people need in order to fully embrace the new, more efficient work processes. When BPM systems deliver on these needs BPM close the gap between its high potential and its relatively modest adoption to-date.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, hcc, human centric computing, trend, trends, future
    
Ultimus
Published By: Docker     Published Date: Feb 21, 2019
Docker’s Windows Server application migration program is the best and only way to containerize and secure legacy Windows Server applications while enabling software-driven business transformation. With industry-leading Docker Enterprise 2.1 and our best-in-class, industry-proven tools and services specifically designed for Windows Server application migration, customers can quickly and easily migrate and modernize legacy Windows applications while driving continuous innovation across any application, anywhere.
Tags : 
migrate applications, containerization, application development, digital transformation, microservices, modernization, cloud computing, hybrid cloud, application security
    
Docker
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
This document outlines the new features in AutoPlay Media Studio 6.0 over previous versions of the product. Built on a solid base of proven predecessors, AutoPlay Media Studio 6.0 is more powerful and flexible than ever!
Tags : 
enterprise applications, sales & marketing software, cd maker, multimedia studio, multimedia software, indigo rose
    
Indigo Rose Corporation
Published By: Hewlett-Packard     Published Date: Jul 24, 2013
Isolating application problems can be challenging in highly virtualized or cloud environments. This paper offers a roadmap to optimize application performance management with a pragmatic, phased approach that goes beyond monitoring and focuses on support for composite applications, SOA, and ERP applications.
Tags : 
application performance, apps, soa, erp, applications, cloud
    
Hewlett-Packard
Published By: Datastax     Published Date: Aug 15, 2018
Built on a production-certified version of Apache Spark™ and with integrated search and graph capabilities, DSE Analytics provides highly available, production-ready analytics that enables enterprises to securely build instantly responsive, contextual, always-on applications and generate ad-hoc reports. Read this white paper to learn about the specific features and capabilities of DSE Analytics, and why DSE Analytics is designed for the Right-Now Enterprise.
Tags : 
    
Datastax
Published By: Genesys     Published Date: Jul 27, 2016
This white paper discusses how you can: • Overcome limitations of queue based with orchestrated routing • Design personalized, low-effort, end-to-end customer journeys • Match your customers with the best available resource at the right time in the right channel
Tags : 
genesys, omnichannel, contact center, customer experience, metrics, enterprise applications
    
Genesys
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Panaya     Published Date: Sep 14, 2017
Learn how using the right methodologies will enable you to deliver change rapidly to your enterprise applications.
Tags : 
software delivery lifecycle, enterprise, application delivery, collaboration, automation
    
Panaya
Published By: Enterprise Mobile     Published Date: Dec 04, 2014
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications, mobile apps, application management
    
Enterprise Mobile
Published By: IFS     Published Date: Jun 25, 2014
More and more companies are developing an interest in global ERP, and are confronting daunting barriers to getting to their goal of a single global ERP instance. Learn how to achieve the cost savings and simplicity that come from operating business units on a single database, on a single instance of ERP.
Tags : 
ifs, erp, soa, enterprise applications
    
IFS
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Five9     Published Date: Apr 29, 2013
Some argue that a single enterprise provisioning applications to their own operations from an owned and operated data center is cloud.
Tags : 
five9, cloud, cloud computing, on-premises deployments, cloud application, cloud-based applications
    
Five9
Published By: Lenovo and Intel®     Published Date: Jun 13, 2018
Get the answers to all of your Hyperconvergence questions in this definitive guide. You’ll find the help you need to determine whether you should consider Hyperconvergence, what kinds of problems it solves, how it fits into your current application architecture, how to get started...and more!
Tags : 
enterprise, applications, hyper-converged, infrastructure
    
Lenovo and Intel®
Published By: Red Hat     Published Date: Dec 27, 2012
In this paper, Frost & Sullivan examines historical concerns about Linux virtualization, and assess why, when, and how enterprises can safely virtualize their critical Linux workloads. They also review a Linux virtualization that meets needs.
Tags : 
red hat, linux, workload, virtualization, critical workload, enterprise applications, it environment
    
Red Hat
Published By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : 
sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone, crm, erp, mobile landscape
    
SAP
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The moats and castle approach is an antiquated, yet a common way, of protecting the enterprise network. This paper describes a new way to protect the enterprise which hides applications from the Internet, outside of the firewall, with zero open ports and a minimal attack surface.
Tags : 
security, enterprise security, eaa
    
Akamai Technologies
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: NetApp     Published Date: Nov 14, 2017
As companies’ transition to become digital enterprises, they must increasingly manage cost and performance across a hybrid IT environment. On-demand consumption strategies can be used to optimize your data storage costs, whether you are running applications in a private data center, across a hybrid cloud, or in the public cloud. Read this eBook and learn how on-demand consumption models can help you align IT spending with your business needs, both on-premises and in the cloud.
Tags : 
    
NetApp
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
    
netForensics
Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations, dect, dect architecture, wireless technologies, bluetooth headsets, interference avoidance, roaming range, radio spectrum, channel sharing, density effects, wideband operation
    
Plantronics
Published By: SAP Concur     Published Date: Sep 25, 2019
"This IDC study reviews the competitive market for travel and expense management software in 2018. ""Industry leaders need to leverage advanced technologies to augment their capabilities for streamlining approvals, combating fraud, and maintaining compliance. Many of these technologies have taken large leaps forward in terms of usability and accuracy over the past 24 months,"" said Kevin M. Permenter, research manager for Enterprise Applications with IDC. There is no magic formula to rid the business of the burden of noncompliance. Download this report to find out how organisations can minimize risk for noncompliance and fraud amidst rapid international growth. "
Tags : 
    
SAP Concur
Published By: VMware     Published Date: Nov 04, 2016
From private, public, and hybrid clouds to traditional and modern application architectures, today’s modern data center is complex. To effectively manage the evolving topology, IT needs a unified approach to management, with intelligent, cost-effective tools – which is just what an enterprise-ready cloud management platform (CMP) provides. CMP enables IT teams to automate provisioning as well as manage applications throughout their lifecycle with a single platform. Read this eGuide to learn more about how to avoid chaos in the data center with a unified cloud management platform.
Tags : 
    
VMware
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.