• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

application access

Results 226 - 250 of 341Sort Results By: Published Date | Title | Company Name
By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : 
demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud, x86, virtualization, server, disaster recovery, business agility, business continuity, it administration, failure, scalability, smp, symmetric multiprocessing, data integrity
    
Stratus Technologies
By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
By: NexGen     Published Date: Feb 09, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now! - See more at: http://www.findwhitep
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
NexGen
By: Cisco     Published Date: Jan 29, 2009
Every minute counts in a small company and wireless networks are a powerful tool for boosting productivity and encouraging information sharing. With untethered access to documents, emails, applications and other network resources, employees can roam where they need to and have constant access to the tools required to do their jobs.
Tags : 
cisco, wireless, wireless networks, information sharing, untethered access, wlan, wireless lan, effective communication, improved responsiveness, mobility, mobile computing, mobile data systems, mobile workers
    
Cisco
By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in, pay‐per‐seat, flat‐rate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies, data management, customer interaction service, customer relationship management, customer satisfaction
    
Catapult
By: Catapult.     Published Date: Apr 23, 2009
As a software provider for a product information management solution, we were experiencing a myriad of problems supporting and servicing our on premise application – too many versions to maintain, test, install and upgrade. It was becoming increasingly difficult to support our existing customers, let alone sell to new customers.  The following information is a compilation of our research.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‐in, pay‐per‐seat, flat‐rate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies
    
Catapult.
By: EMC Corporation     Published Date: Jun 14, 2013
Transform your Microsoft Application environment with simple, efficient, and flexible virtualization solutions. EMC VSPEX Private Cloud solutions improve accessibility, centralize management, and increase performance for mission critical Microsoft Applications.
Tags : 
servers, accessibility, centralization, microsoft application, virtulization solution, cloud, networking, security, enterprise applications, storage
    
EMC Corporation
By: StorageCraft Technology Corporation     Published Date: Jun 23, 2011
Adaptive Infrastructure provides fast and reliable access to data and the applications that rely on that data. When a problem occurs, you better be able to get things running again in a very short order. There are multiple solution architectures available to provide reliable access to data and applications - find out more now.
Tags : 
storagecraft, infrastructuer, back up, recover, adaptive, avoid loss, resources, vulnerabiilty, infrastructure, backup and recovery, application security, disaster recovery
    
StorageCraft Technology Corporation
By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivityto name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data, wireless
    
CDW
By: CDW     Published Date: Mar 31, 2015
A wireless network is a platform for enabling enterprise-wide access to an organization's applications and data. Wireless infrastructure allows users to take the office with them wherever they go. The wireless network provides employees and guest workers with untethered access to voice, video, data and applications regardless of their physical location. With the influx of mobile devices and increase in Wi-Fi connections, organizations are already starting to see a paradigm shift to "wireless by default" and "wired by exception." Watch this video to see how our solution architects upgraded the Shawnee Mission School District's aging network infrastructure.
Tags : 
wireless network, networking, applications, data, infrastructure, update, it management, wireless
    
CDW
By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, theyre forced to work without them or find workarounds that can compromise security. Todays workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees cant easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : 
cdw, client virtualization, mobile workforce, mobile strategy, best practices, networking, security, software development, it management
    
CDW
By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
Box
By: Equinix     Published Date: Mar 26, 2015
In todays technology-rich world, customers and employees demand the highest level of application performance. Failure to provide access to applications that consistently perform well anytime, anywhere, and on any device, often leads to lower productivity, customer dissatisfaction, decreased revenue and market share, and damage to brand reputation. This paper explores the challenges that todays CIOs face in regard to application performance, and how a more strategic data center approach, like distributing applications closer to your users, can help optimize application performance and reduce IT costs.
Tags : 
end-users, application performance, strategic data center approach, application optimization, it costs, it management
    
Equinix
By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-inhaving only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability, it management
    
Equinix
By: Equinix     Published Date: Mar 26, 2015
A leading U.S.-based financial services firm was faced with the growing challenge of providing consistent application performance to a vast employee base and nationwide network of partners. The company turned to Equinix to help redesign its network, both to improve performance and prepare for a move to a cloud-enabled environment. Equinix worked with the firm to deploy bi-coastal Equinix Performance Hubs, extension nodes of the companys existing network placed in strategically located Equinix International Business Exchange (IBX) data centers. A Performance Hub moves services closer to end users and provides direct access to networks and cloud providers. By deploying Performance Hubs, the customer created a high-performance services platform for its business. The result was a dramatic decrease in network latency, improvements in application performance and an enhanced user experience.
Tags : 
financial services, cloud-enabled environment, cloud providers, network latency, application performance, enhanced user experience, it management, enterprise applications
    
Equinix
By: Microsoft Azure     Published Date: Apr 10, 2018
Take a structured approach to designing your cloud applications. This cloud computing architecture e-book focuses on architecture, design, and implementationconsiderations that apply no matter which cloud platform you choose. The guide includes steps for: Choosing the right cloud application architecture style for your app or solution. Selecting appropriate compute and data store technologies. Incorporating 10 design principles to build a scalable, resilient, and manageable application. Following the five pillars of software quality to ensure your cloud app is successful. Using design patterns that specifically apply to the problem youre trying to solve. Download the 300-page cloud architecture e-book to explore these best practices, and get access to design review checklists, reference architectures, and more.
Tags : 
    
Microsoft Azure
By: VMware AirWatch     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : 
data management, business practices, data center. data application, enterprise applications, security, best practices, business intelligence, business management
    
VMware AirWatch
By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net, windows 7, web services, visual user interface, datawindow, j2e, win32, .net frameworks, business application, wpf, application integration, application performance management, best practices
    
Sybase PowerBuilder
By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution thats both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, its even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
Intralinks
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but theres much more to the story. And youll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organizations network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension
By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApps Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApps SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp
By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApps Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service, enterprise applications
    
BubblewrApp
By: VMware AirWatch     Published Date: Dec 09, 2016
When employees have the ability to access their apps anytime, anywhere, and on any device, employee satisfaction improves and employees become more productive. Workspace transformation with virtual desktops and applications offers employees the access that they require, but choosing amongst a wide range of solutions can be a demanding task. This guide is designed to help create a Request for Proposal (RFP) in support of virtual desktop and application delivery. Read on and explore three key areas to a successful workspace transformation people, process, and technology and important questions to keep in mind when looking at each area.
Tags : 
    
VMware AirWatch
By: Rackspace     Published Date: Mar 08, 2016
In this world of always-on services, the systems that support them must be designed to be both highly available and resilient. Today, many IT leaders are looking for their applications and infrastructure to be covered by the following: Defined SLAs for workloads and applications Mapped failure points and impact of these on the business Regularly measure application and Infrastructure health Access this white paper to discover your resiliency, and learn how to create a resilient architecture on Microsoft Azure cloud platform.
Tags : 
rackspace, resilient architectures, microsoft azure, network infrastructure, cloud computing, distributed computing, infrastructure, network architecture, network performance, network performance management
    
Rackspace
By: SnowFlake     Published Date: Jul 08, 2016
Todays data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywherenot just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of todays data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media, storage, business intelligence
    
SnowFlake
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter