application operations

Results 101 - 125 of 193Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : 
bsm, business service management, it operations group, it case study, capital one, automation
    
HP
Published By: HP     Published Date: Feb 02, 2015
Diversified Agency Services serves a global network of marketing services and specialty communication companies. To provide its internal customers and their clients with safe, secure access to applications and services, DAS worked with HP on a multi-year project to consolidate its IT networks and implement HP SDN cloud-enabled networking. These steps have vastly simplified DAS IT operations, enabling it to deliver a faster, more agile, and more secure network. Read this case study to learn more.
Tags : 
    
HP
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
In this on-demand webinar, join Eric Pelletier, System Architect with HP Networking, as he discusses how to reduce power consumption as you design your network, buy networking gear, and during network operation.
Tags : 
media rich applications, media rich, applications, smb, networking, power, power consumption, network operations, green, sustainability, infrastructure, power, cooling
    
HP and Intel® Xeon® processors
Published By: HP Software     Published Date: Oct 20, 2015
Mobile strategy to transform into a digital business.
Tags : 
mobile application, management, solutions, performance, mobile strategy, operations
    
HP Software
Published By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
    
HPE Intel
Published By: IBM     Published Date: Feb 25, 2008
Competitive pressures, increased marketplace demands and the constant need to reduce expenses have only intensified the demands put on companies to develop and deploy their software applications quickly, efficiently and cost-effectively. Read about the key barriers companies must cross as they attempt to streamline their software delivery processes and learn how to bridge the gap between development and operations in this paper.
Tags : 
productivity, application development, software development, web development, ibm
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Natural and manmade disasters have costly, far-reaching impacts on businesses. And organizations of all types are making business continuity plans that protect their data, networks, core business applications and facilities. But it’s important to build resiliency into your business operations as well your human capital. This Web seminar on Workplace Recovery will take you through the risks related to human capital resiliency and provide a framework for addressing them.
Tags : 
ibm, ibm mi, ibm grm, disaster recovery, recovery, business continuity
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
The basic principles for managing an archiving project presented in this paper can help you initiate and plan an archiving strategy that meets your organization’s requirements.
Tags : 
ibm integrated data management, peoplesoft, business critical erp applications, daily operations, database archiving, data growth, archiving project, data classification, service level agreements, slas, ibm optim data growth solution
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : 
ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office, oracle, sap, sql, recovery point objective, rpo, recovery time objective, rto, tape backup, mirroring, asynchronous replication, continuous data protection, wide area file services
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
You feel the same pressures to secure your data as a massive corporation does, but without the massive budget. This white paper gives an overview of next-generation data protection and recovery options designed and priced for small and mid-sized business.
Tags : 
ibm, data protection and recovery options, disaster recovery, application protection and recovery, e-mail object recovery, business continuity and resiliency
    
IBM
Published By: IBM     Published Date: Nov 07, 2012
IBM Integrated Service Management supports deployment, operations and optimizations for SAP. Read on to learn how IBM can help deploy SAP applications faster, with greater ease and consistency and also enhance operations that fully utilize SAP.
Tags : 
ibm, sap, integrated service management, deployment, consistency, management software, sap functionality
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
In an around-the clock business world, you need nearly instantaneous failover and failback of your critical applications. Otherwise, you risk business losses and brand damage in the event of disruption or disaster. But how can you improve your existing disaster recovery operations? Read this brochure to learn how the power of cloud technologies can help you increase recovery speed, reliability and scalability
Tags : 
cloud, cloud technologies, cloud computing, applications, critical applications, applications management, risk, business losses, brand damage, disruption, disaster recovery, disaster recovery operations, loss prevention, recovery speed, reliability, scalability
    
IBM
Published By: IBM     Published Date: Jan 02, 2014
Discusses why converged systems, such as IBM PureSystems platforms, can radically simplify the IT life cycle and how these changes can deliver business value by accelerating time to market, improving application performance, and reducing required staff time.
Tags : 
ibm, idc, puresystems, cut costs, increase agility, it life cycle, converged systems, application development, it operations, infrastructure design, middleware engineering, operations management, management automation, application development, deployment
    
IBM
Published By: IBM     Published Date: Mar 13, 2014
The design principles of SOA make it possible for you to develop new engagements in a way that optimizes value for your organization. IBM provides a strong application foundation and business agility technologies that help you to become a truly engaging enterprise.
Tags : 
ibm, business technology, service oriented architecture, extend, transact, optimize, applications, scale, speed, business operations, integration, customer enagement
    
IBM
Published By: IBM     Published Date: Sep 04, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
ibm, collaboration, email communication, real time communication, business communication, social software
    
IBM
Published By: IBM     Published Date: Nov 13, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
email capabilities, integration, social software, business operations
    
IBM
Published By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : 
ibm, blockchain, electronics
    
IBM
Published By: IBM MidMarket Demand Generation     Published Date: Apr 23, 2012
With real storage virtualization, according to the report, you can improve operational efficiency and drive down costs. And you can do this without sacrificing - or while even improving flexibility - giving you the ability to "continuously migrate" applications as a part of normal business operations
Tags : 
ibm, technology, storage, virtualization, business technology, it management, data storage
    
IBM MidMarket Demand Generation
Published By: InMage     Published Date: Feb 18, 2009
Enterprises Applications - the Challenge Businesses today rely on enterprise applications such as SAP, PeopleSoft, Siebel, Oracle and Microsoft SQL to provide day to day business operations.
Tags : 
inmage, dr-scout protection, database applications, tcp/ip, cost-effective disaster recovery, recovery point objectives
    
InMage
Published By: Juniper Networks     Published Date: Oct 19, 2015
Customers looking to cloud technologies for better application agility and more efficient support of their entire IT operations are finding that broader use of virtualization across hardware is fundamental to achieving these goals.
Tags : 
juniper, software, data center, cloud, vmware, application agility
    
Juniper Networks
Published By: Logi Analytics     Published Date: Jan 12, 2016
Access this resource for the top 10 reasons why embedded analytics will bolster your existing business applications, and see real ways your operations can benefit from such insights.
Tags : 
embedded analytics, analytic tools, analytics, data, collect data, reports
    
Logi Analytics
Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management, database development
    
Lumension
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organization’s journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.