• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

application server

Results 201 - 225 of 370Sort Results By: Published Date | Title | Company Name
By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus, server virtualization
    
Stratus Technologies
By: Stratus Technologies     Published Date: Dec 03, 2008
"Virtualization can be like putting all your eggs in one basket.  Ensure you have a resilient basket…"
Tags : 
stratus technologies, virtualization, application server, enterprise applications, server virtualization
    
Stratus Technologies
By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : 
demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud, x86, virtualization, server, disaster recovery, business agility, business continuity, it administration, failure, scalability, smp, symmetric multiprocessing, data integrity
    
Stratus Technologies
By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
By: Stratus Technologies     Published Date: Nov 11, 2009
You probably know Stratus Technologies' fault-tolerant ftServer systems and services for delivering uptime of nearly 99.9999% for the world's most essential applications. What you might not know is how effectively - and how simply - our mission-critical Support Services let your enterprise protect this industry-leading availability. Our focus on preventing downtime and data loss brings you much more than basic break-fix support. If you're used to average server support, get ready to experience meaningful differences. One example: It's not uncommon for Stratus Support Services to identify problems before our customers do. Stellar satisfaction ratings of 96% or higher show the value our clients place in these services.
Tags : 
activeservice, stratus, fault tolerance, ftserver, application management, virtual technician, application integration, application performance management, business activity monitoring, business management, project management
    
Stratus Technologies
By: PC Mall     Published Date: Mar 27, 2012
This eGuide highlights how to harness the benefits of Virtual Desktop Infrastructure using a robust data center that is optimized for virtualization.
Tags : 
virtual, virtualization, infrastructure, foundation, backbone, data center, desktop infrastructure, cisco, eguide, vdi, applications, data, servers, data security, total cost of ownership, optimization, it management, knowledge management
    
PC Mall
By: IBM Corp     Published Date: Jun 21, 2011
Creating a virtualized infrastructure with VMware and IBM System x enables business to end server sprawl while increasing IT flexibility.
Tags : 
virtualization, ibm, vsphere, ibm ex5, express seller, vmware, system x, flexibility, isv, superior services, business applications, investment, servers, blade servers, storage virtualization, windows server
    
IBM Corp
By: IBM     Published Date: Jul 05, 2012
IBM Cognos BI offers complete perspectives on business intelligence and analytics through a single, unified workspace. Read the white paper and see how Power Systems runs Cognos BI applications-on distributed or consolidated servers-for greater business value as well as improved availability, virtualization, performance and energy efficiency.
Tags : 
ibm, technology, sap, sofrware, technology, migration factory, storage, application integration, business analytics
    
IBM
By: IBM     Published Date: Oct 01, 2012
Read this data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
automated deployment, automated management, smbs, it solutions, server hardware, storage management, storage virtualization, server virtualization, total cost of ownership
    
IBM
By: IBM     Published Date: Nov 09, 2012
The next generation of application server solution has arrived but will you recognize them when you see them? It's time to take a look at how new technologies challenge the efficacy of traditional architecture approaches.
Tags : 
ibm, system z, hybrid computing, computing capability, it management, data management
    
IBM
By: IBM     Published Date: Jul 09, 2012
IBM PureFlex Systems combine advanced IBM hardware and software with "patterns of expertise" and integrate them into three optimized configurations that are simple to acquire and deploy. Read the data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
ibm, technology, software, customer, smb group research, storage, application performance management, business analytics, ebusiness
    
IBM
By: CDW     Published Date: Aug 28, 2015
ACCELERATE, CONSOLIDATE, AND SIMPLIFY All-Flash Arrays (AFAs) are the preferred choice to accelerate high-performance OLTP and decision support/analytics applications on Oracle and Microsoft SQL Server databases. But not all AFAs are equal. Performance is just one dimension. XtremIO excels in all.
Tags : 
storage, servers, cloud computing, architecture, convergence, infrastructure, data center design and management
    
CDW
By: Ipswitch     Published Date: May 02, 2014
With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.
Tags : 
ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server, secure file transfer    , ftp download, file transfer software, managed file transfer, enterprise application integration, ftp server software, workflow automation, b2b integration, enterprise file transfer, data transfer software, download ftp server, cloud file transfer
    
Ipswitch
By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable, applications, servers, storage, model, it management, cloud computing
    
HP
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-in—having only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability, it management
    
Equinix
By: LogicNow     Published Date: Mar 10, 2016
If you’re an MSP, you’ll likely already have endured significant grief migrating your customer’s business applications to Windows Server 2008 and Windows Server 2012. And while you won’t need us to tell you that solving the Windows Server 2003 ‘end-of-life’ problem is no easy task – maybe we can make it easier.
Tags : 
windows server 2003, logicnow, servers, migration, business integration, content integration, content management system, information management
    
LogicNow
By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
By: Zerto     Published Date: May 31, 2016
Download this case study today to learn more about how ARA was able to complete a datacenter migration in a compressed window, and how they continue to use ZVR to deliver aggressive service levels across their infrastructure with a product that is very easy to use.
Tags : 
zerto, virtual replication, medical imaging, datacenter, servers, infrastructure, disaster recovery, data replication, information management, records management, cloud computing, data center design and management
    
Zerto
By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion, identity management, internet security, intrusion detection, intrusion prevention
    
Rapid7
By: VMware AirWatch     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : 
data management, business practices, data center. data application, enterprise applications, security, best practices, business intelligence, business management
    
VMware AirWatch
By: Fortinet     Published Date: Nov 11, 2013
This whitepaper provides a step-by-step guide showing how easy it is to implement application and server load balancing using a Coyote Point Equalizer ADC.
Tags : 
load balancing, server load balancing, hardware load balancing, application delivery controller, adc, server optimization, coyote point, fortinet, kemp, a10, radware, enterprise applications
    
Fortinet
By: Neverfail Group     Published Date: Aug 21, 2009
This white paper discusses Windows high availability, with a focus on business drivers and benefits. Cost and real-world benefits are considered the two most important elements in choosing the right high availability solution.
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability, sql server, exchange server, ms exchange, microsoft exchange, neverfail, windows server, database security
    
Neverfail Group
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter