application data

Results 276 - 300 of 1364Sort Results By: Published Date | Title | Company Name
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience
    
Dyn
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
For more and more organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. In fact, hybrid cloud is the new norm for IT. IDC says more than 80% of enterprise IT organizations will commit to hybrid cloud by 20171, and 70% of IT decision-makers say they will always have a mix of traditional IT and cloud architectures.2 With important applications and workloads architected across both on-premises and hybrid, public and private cloud environments, business and IT stakeholders must be able to access data with equal efficiency, reliability and speed—regardless of physical location, infrastructure type or time frame.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
To compete in today’s fast-paced business climate, enterprises need accurate and frequent sales and customer reports to make real-time operational decisions about pricing, merchandising and inventory management. They also require greater agility to respond to business events as they happen, and more visibility into business activities so information and systems are optimized for peak efficiency and performance. By making use of data capture and business intelligence to integrate and apply data across the enterprise, organizations can capitalize on emerging opportunities and build a competitive advantage. The IBM® data replication portfolio is designed to address these issues through a highly flexible one-stop shop for high-volume, robust, secure information replication across heterogeneous data stores. The portfolio leverages real-time data replication to support high availability, database migration, application consolidation, dynamic warehousing, master data management (MDM), service
Tags : 
ibm, infosphere, data replication, security, data storage
    
IBM
Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application
    
Qualys
Published By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&S®PACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"It is very well understood that Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements and remain competitive many companies are turning to cloud computing. Companies thus need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. Oracle understand the need for IT organizations to move to cloud computing at the same time also recognizes that moving to the cloud is a multi-step journey that starts with standardization and consolidation of IT infrastructure and ends by moving applications and data to the cloud. The PDF is meant to help you gauge through the Oracle’s SPARC servers and give you an experience of simplified journey to the cloud by using the same technology for both cloud and on-premises deployments. No matter where your IT organization is on the journey to the cloud SPARC servers will be an i
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"With the introduction of Oracle Database In-Memory and servers with the SPARC S7 and SPARC M7 processors Oracle delivers an architecture where analytics are run on live operational databases and not on data subsets in data warehouses. Decision-making is much faster and more accurate because the data is not a stale subset. And for those moving enterprise applications to the cloud, Real-time analytics of the SPARC S7 and SPARC M7 processors are available both in a private cloud on SPARC servers or in Oracle’s Public cloud in the SPARC cloud compute service. Moving to the Oracle Public Cloud does not compromise the benefits of SPARC solutions. Some examples of utilizing real time data for business decisions include: analysis of supply chain data for order fulfillment and supply optimization, analysis of customer purchase history for real time recommendations to customers using online purchasing systems, etc. "
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Optimizely     Published Date: Apr 06, 2018
The Need When building websites and applications, too many companies make decisions- on everything from new product features, to look and feel, to marketing campaigns- using subjective opinions rather than hard data. The Solution Companies should conduct online controlled experiments to evaluate their ideas. Potential improvements should be rigorously tested, because large investments can fail to deliver, and some tiny changes can be surprisingly detrimental while have big payoffs.
Tags : 
    
Optimizely
Published By: IBM     Published Date: Mar 13, 2014
This report takes an in-depth look at the primary challenges facing IT and how the IBM X6 Portfolio can deliver the performance needed as a solution to these challenges.
Tags : 
ibm, enterprise applications, data, server, memory, storage, management platforms
    
IBM
Published By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : 
middleware, java, big data, analytics, mobile development
    
JBoss Developer
Published By: JBoss Developer     Published Date: Oct 21, 2016
TMG Health, the largest business process outsourcing (BPO) provider in the Medicare and Medicaid market, relied on a slow, batch-oriented legacy application environment that prevented it from providing continuous data visibility and access to its clients. With help from Red Hat Consulting, TMG deployed a new application platform using Red Hat JBoss Enterprise Application Platform and other Red Hat solutions. As a result, TMG reduced development time and costs and delivered real-time data access and visibility to its clients.
Tags : 
consulting, efficiency, data, api, java
    
JBoss Developer
Published By: JBoss Developer     Published Date: Oct 21, 2016
CenturyLink needed to optimize operational cycle time and save money within its IT setup, including reducing time to deploy applications. The company migrated from Oracle to Red Hat and selected Red Hat JBoss Fuse to integrate its applications and incoming data. The new solution has increased IT agility while lowering costs.
Tags : 
software, flexibility, customer agility, competitive advantage, open source
    
JBoss Developer
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: Pure Storage     Published Date: Jan 12, 2018
Data is growing at amazing rates and will continue this rapid rate of growth. New techniques in data processing and analytics including AI, machine and deep learning allow specially designed applications to not only analyze data but learn from the analysis and make predictions. Computer systems consisting of multi-core CPUs or GPUs using parallel processing and extremely fast networks are required to process the data. However, legacy storage solutions are based on architectures that are decades old, un-scalable and not well suited for the massive concurrency required by machine learning. Legacy storage is becoming a bottleneck in processing big data and a new storage technology is needed to meet data analytics performance needs.
Tags : 
reporting, artificial intelligence, insights, organization, institution, recognition
    
Pure Storage
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Private cloud computing can better align IT with business concerns by making IT efficient, responsive, and cost-effective. Learn how to start your private cloud with automation and orchestration to gain operational efficiency and financial benefits.
Tags : 
private cloud, cloud automation, cloud orchestration, cloud security, secure cloud computing, applications in the cloud, data in the cloud, scalable private cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
    
F5 Networks Inc
Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications
    
Teradata
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: Juniper Networks     Published Date: Jan 11, 2016
À l'heure où les charges de travail des applications sont redéfinies, les data centers doivent évoluer. Ce livre blanc IDC étudie comment l'orchestration et l'automatisation des réseaux peuvent faciliter cette transition en créant des réseaux plus simples et plus flexibles.
Tags : 
    
Juniper Networks
Published By: BMC Software     Published Date: May 28, 2014
This paper, "Workload Automation – From Application Development to Digital Service Delivery," describes how a workload automation solution can eliminate the manual processes developers now use to define batch workflows and communicate them to schedulers.By extending the use of workload automation to developers, organizations can implement applications faster, slash costs, and increase service quality.
Tags : 
big data, hadoop
    
BMC Software
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: