operating environment

Results 1 - 25 of 91Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
It doesn’t matter whether you’re new to Oracle Retail, have an active implementation project that is running or have an existing deployment in production. The same issue applies: You are making a significant investment in the technology and need to develop a reliable and efficient batch schedule. If you’re new to Oracle Retail, you are no doubt embarking on a major project to improve your competitive position in the retail market. With that in mind, your goals will be to shrink the time-to-market for your retail implementation, lower the reliability risks associated with in-house developed solutions and improve the visibility and control of retail business processes. In this eBook you will discover a series of recommendations for operating a fail-safe and efficient Oracle Retail operational environment. You will also understand how automation enables you to streamline the execution of your Oracle Retail batch operations and increase the day-to-day efficiency of your operations teams.
Tags : 
    
CA Technologies_Business_Automation
Published By: Red Hat     Published Date: Mar 16, 2015
Today’s enterprise IT organizations require more flexible IT services, greater capacity, and faster service delivery. Meanwhile, system management is more complex and compliance and audit overhead is increasing. A standard operating environment can drastically increase IT efficiency and lower operational expenses. Watch this webinar and learn more about 5 transformative areas that can make IT operations more efficient: • System standardization • Architectural flexibility • Automation of updates and maintenance • Greater productivity • Access and control Standardize your infrastructure and streamline your system management with Red Hat.
Tags : 
it organizations, flexible it services, it efficiency, system standardization, automation
    
Red Hat
Published By: VMware     Published Date: Feb 24, 2017
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile management tools today. This whitepaper provides an overview of how Windows management evolved from a rigid and disruptive PC-centric approach to one offering a flexible and light-touch model. It will also delve into the specific management technologies that Windows 10 introduces, as well as leveraging conventional Windows management tools that are in use today.
Tags : 
    
VMware
Published By: Citrix     Published Date: May 13, 2009
The traditional workforce model of permanent employees located in a single or small number of offices has undergone a significant transformation in recent years, accelerated by the effects of the current economic landscape. Drivers of this trend include initiatives to drive growth and expand into other markets, improve customer service, speed to market, improve decision-making processes, and increase both worker and overall organisational productivity.
Tags : 
citrix, virtualization, virtual workers, remote, remotely, outsource, teleworkers, business productivity, standard operating environment, soe
    
Citrix
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
    
Vision Solutions
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: Riverbed     Published Date: Sep 05, 2014
As enterprises have embraced IT trends like cloud computing and virtualization, their operational needs have evolved to make application performance more important than ever before. But operating applications at peak performance is challenging in the cloud. That's why many enterprise IT departments now have Applications Operations groups tasked with ensuring that applications run efficiently across these complex IT stacks. But, most tools designed to address these application performance management (APM) issues were never designed for this dynamic environment. To achieve smooth delivery of applications at all times, Applications Operations groups need APM solutions that can give them insight and analytics to manage their apps. This SlashGuide gives IT managers a scorecard to identify APM solutions that will deliver more efficient application performance.
Tags : 
apm, applications, operations, enterprise, stacks, dynamic
    
Riverbed
Published By: Tricentis     Published Date: Mar 13, 2018
Despite all your planning, the release made it to market with some significant bugs, and your company has had to run damage control. Now you’re getting questions about what went wrong, and before you know it, the blame game is in full force, with your developers and testers pointing fingers at one another. So what happened? Whose fault was it really? And what can you do better next time? The truth of the matter is, at a time when the stakes for software development are higher than ever (and only continuing to rise), the blame game simply isn’t going to cut it. And if you’re operating in a true DevOps environment, the finger pointing should never even happen in the first place.
Tags : 
    
Tricentis
Published By: Ahead     Published Date: Nov 15, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is wellintended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular--Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through common missteps and how to get it right.
Tags : 
    
Ahead
Published By: Ahead     Published Date: Aug 08, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is well-intended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular-- Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through missteps and how to get it right.
Tags : 
    
Ahead
Published By: NEC     Published Date: Aug 26, 2014
In addition to high reliability and availability, enterprise mission critical applications, data centers operating 24x7, and data analysis platforms all demand powerful data processing capabilities and stability. The NEC PCIe SSD Appliance for Microsoft® SQL Server® is a best-practice reference architecture for such demanding workloads. It comprises an Express 5800 Scalable Enterprise Server Series with Intel® Xeon® processor E7 v2 family CPUs, high-performance HGST FlashMAX II PCIe server-mounted flash storage, and Microsoft® SQL Server® 2014. When compared with the previous reference architecture based on a server with the Intel® Xeon® processor E7 family CPUs, benchmark testing demonstrated a performance improvement of up to 173% in logical scan rate in a data warehouse environment. The testing also demonstrated consistently fast and stable performance in online transaction processing (OLTP) that could potentially be encountered.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: NetApp     Published Date: Sep 24, 2013
Many organizations have adopted virtualization as a standard for server workloads. But virtualization has not proven to be the “game changer” many organizations had envisioned. IT departments face huge challenges related to server sprawl, which has actually increased with virtualization. Although virtualization has brought benefits beyond the physical paradigm of one operating system per server, the true optimal infrastructure for organizations comes with adopting a private cloud infrastructure. Check out this white paper to learn the benefits of a private cloud and discover how deploying one private cloud solution can provide: Consolidated resources Flexible services Easy provisioning of new environments And more
Tags : 
best practices, private cloud, netapp, cloud, technology, windows server
    
NetApp
Published By: HP     Published Date: Jun 23, 2008
This paper provides a comprehensive set of test-proven best practices for properly configuring, deploying, and operating an Oracle 10g database on an HP StorageWorks XP12000 Disk Array (XP12000) in an HP-UX environment using HP StorageWorks XP Continuous Access Software as the remote copy infrastructure.
Tags : 
replication, remote replication, storageworks, hp disaster proof, disaster proof, disaster-proof, oracle
    
HP
Published By: Maxwell Systems     Published Date: Sep 05, 2013
Construction companies are meeting the challenge of ever-intensifying competition by refining their business operations with standardized operating practices and “visible” information that is shared among multiple departments. “Before, only owners who wanted to grow a very large company would worry about transitioning from the informal business they started to formalized, standardized business processes,” says Jim Flynn, CEO of Maxwell Systems, a leading provider of construction management software solutions, expert services, and best practices. “But in the current environment, you also have to make that transition just to stay competitive and improve your profitability.”
Tags : 
construction, business processes, business management, process management, operations management
    
Maxwell Systems
Published By: RedHat     Published Date: May 10, 2017
By establishing an environment based on an enterprise-ready, open-source operating system — Red Hat® Enterprise Linux® — and a hardware platform based on Intel® architecture, organisations can immediately obtain benefits by migrating select workloads to a standardized environment. More ambitious modernization efforts can yield additional benefits, but the heart of every project should be a solid, proven foundation.
Tags : 
red hat, linux, enterprise linux, open source, open source platform
    
RedHat
Published By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : 
dell, san, storage area networks, component failures, data loss, reliable san, building san, raid
    
Dell Storage
Published By: SchemaLogic     Published Date: Jun 11, 2008
SchemaLogic of Kirkland, WA, provider of business semantics management software, announced that Chevron has chosen SchemaLogic Enterprise Suite as a critical software component for Phase 3 of the company's third-generation Global Information Link (GIL3) initiative. This strategic initiative defines Chevron's overall information management strategy, global hardware and software architecture and operating environment.
Tags : 
schemalogic, oil, gas, petroleum, sharepoint, share point, collaboration, chevron
    
SchemaLogic
Published By: Cisco     Published Date: Nov 17, 2015
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners. Managers of these traditional factories say the feeling is akin to flying blind. These are operations where plant floors, front offices, and suppliers operate in independent silos, where managers have only hazy visibility into downtime and quality problems, and where the root causes of inefficiencies are rarely understood or addressed.
Tags : 
industrial enterprise, manufacturing, connected factory, convergence, automation, business networks, factory-based operational technologies, it networks, global visibility, global supply chain, iot, ioe
    
Cisco
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
IDC studied a group of enterprises that had deployed SAP applications on IBM Power Systems servers running Linux server operating environments and had been working with those systems for several years.
Tags : 
ibm, technology, sap, tecnology product, linux server, technology platform
    
IBM MidMarket Demand Generation
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Cornerstone OnDemand     Published Date: Feb 24, 2011
GECU has the challenge of operating within one of the nation's most highly regulated industries, and as a result, has long understood that efficient processes for employee training, development and performance management are critical pillars for supporting long-term financial growth within a strict regulatory and compliance environment. Read more to find out why GECU chose Cornerstone OnDemand.
Tags : 
cornerstone, gecu, compliance, employee development, training, web-based training
    
Cornerstone OnDemand
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: