• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

applications

Results 351 - 375 of 3641Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
By: Cisco     Published Date: Mar 17, 2017
This paper considers how IT must meet the challenge of devising a datacenter strategy that transforms the datacenter for a multicloud world.
Tags : 
digital transformation, hybrid cloud, data centers, infrastructure, architecture, operations, cloud applications
    
Cisco
By: Cisco     Published Date: Mar 17, 2017
We evaluate enterprise LAN vendors providing wired and wireless access layer connectivity. Network leaders should evaluate vendors based on their ability to offer the same network applications across both the wired and wireless infrastructure and address new IoT challenges.
Tags : 
connectivity, wireless, infrastructure, iot, internet of things, network applications, wireless infrastructure
    
Cisco
By: NetApp     Published Date: Dec 05, 2016
Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.
Tags : 
    
NetApp
By: NetApp     Published Date: Dec 05, 2016
Realizing market penetration and a fast path to revenue comes with a unique set of challenges for SaaS vendors looking to provide cloud-based software applications. Download the white paper to see if your infrastructure is up to the task.
Tags : 
    
NetApp
By: Oracle     Published Date: Oct 17, 2016
This new digibook is specifically designed to help you make digital business a reality in your enterprise.
Tags : 
    
Oracle
By: CA Technologies     Published Date: Jun 27, 2014
Ce livre blanc explique pourquoi les plates-formes d’automatisation de la mise en production et du déploiement des applications deviennent toujours plus essentielles pour les départements IT dans les multinationales. Il analyse les exigences spécifiques auxquelles une plate-forme de ce type doit satisfaire afin d’être efficace et de générer un retour sur investissement important.
Tags : 
application release, software development, application integration, application performance management, performance testing, project management
    
CA Technologies
By: CA Technologies     Published Date: Jun 27, 2014
Cet article examine deux approches du Zero Touch Deployment : une solution basée sur les scripts et une plate-forme d’automatisation de la mise en production. Il indique comment chacune de ces approches peut résoudre les principaux défis technologiques et organisationnels face auxquels se trouvent les organisations agiles lorsqu’elles décident d’implémenter un système de déploiement automatique.
Tags : 
application release automation, deploying releases, zero touch deployment, software development, application performance management, business process automation, performance testing
    
CA Technologies
By: CA Technologies     Published Date: Jun 27, 2014
Dans un contexte commercial en constante évolution, caractérisé par une compétitivité extrême, l'époque où les entreprises passaient des mois, voire des années, à élaborer, tester et lancer une application, un service ou un nouvel ensemble de fonctionnalités, est bel et bien révolue. Les clients, les utilisateurs de technologies et le marché dans son ensemble sont à l'origine de ces changements : ils sont en effet plus réactifs que jamais et leurs attentes en matière de nouvelles fonctionnalités innovantes ont augmenté de concert. Autrement dit, les clients ne se contentent plus d'attendre la prochaine mise en production d'envergure. Ils ne souhaitent pas non plus se voir confrontés à des bugs ni à des défauts. En réponse à ce changement au sein même du marché, de nombreuses entreprises se sont tournées vers des méthodes permettant d'accélérer le cycle de mise en production de leurs applications, sans pour autant en impacter la qualité et le coût.
Tags : 
new application services, application testing, application releasing, devops, software development, application integration, application performance management, product lifecycle management
    
CA Technologies
By: Verint     Published Date: Jun 23, 2014
Many organizations struggle with a lack of visibility into how employees spend their time. What percent is spent in value-added activities, and what percent is spent idle or on activities not directly related to work objectives? Which applications do employees access, when, and for how long? Do the applications correlate with employee roles and assigned tasks?
Tags : 
verint, employee performance, desktop and process analytics, employee utilization
    
Verint
By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
By: rPath     Published Date: Jan 10, 2012
Applications are what business lines really care about. Read this white paper to find out how you can make sure you're delivering an application cloud laser-focused on improving business outcomes.
Tags : 
cloud application deployment, rpath, rpath inc, cloud, clouds, cloud servers, cloud application, cloud deployment, application logistics, application deployment, application update, application provisioning, system deployment, system update, system provisioning, release automation, release lifecycle, configuration management, devops, cloud strategy
    
rPath
By: MicroStrategy     Published Date: Aug 12, 2012
Mobile retail applications empower associates with store operations data, merchandising, and logistics.
Tags : 
microstrategy, mobile, retail, logistics, operations data
    
MicroStrategy
By: MicroStrategy     Published Date: Aug 12, 2012
Mobile retail applications empower associates with store operations data, merchandising, and logistics.
Tags : 
microstrategy, mobil, applications, logistics, customers
    
MicroStrategy
By: MicroStrategy     Published Date: Aug 12, 2012
A panel of industry experts, including Steve Cornett, Director of Enterprise Information Services with Lowe's Companies, Inc.,
Tags : 
microstrategy, mobile, steve cornett, lowe's, roi
    
MicroStrategy
By: Blue Coat Systems     Published Date: Jun 26, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
saas, application, line-of-business owners, lobs, software-as-a-service, technology, strategy, networking, it management, data management
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud, networking, security, enterprise applications, data management
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless, storage
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
strategies, saas, application, lob, bluecoat
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas, infrastructure, network performance management
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus, application security, email security, internet security, network security appliance
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure, business intelligence
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile, security, devices, users, bluecoat, mobile computing, mobile data systems, smart phones, wireless application software, wireless security
    
Blue Coat Systems
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter