• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

system

Results 6201 - 6225 of 6482Sort Results By: Published Date | Title | Company Name
By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
Learn more about Watson (as seen on Jeopardy!), the latest IBM Research Grand Challenge, designed to further the science of natural language processing through advances in question and answer technology. This paper explains Watson's workload optimized system design and why this represents a new computing paradigm.
Tags : 
ibm, technology, technology system, data system, answer technology, optimization, system design, new computing
    
IBM MidMarket Demand Generation
By: Gleanster Research     Published Date: Aug 30, 2013
WebSphere Commerce and content management integration allows retail marketers to quickly make changes in the ecommerce platform directly from within the content management system. No coding. No dependence on IT. Find out how with e-Spirit.
Tags : 
    
Gleanster Research
By: Akamai Technologies     Published Date: May 05, 2017
Web applications are valuable tools for businesses of all sizes. These applications enable businesses to communicate with customers, prospects, employees, partners, and other information technology (IT) systems. By definition, web applications must be open, interactive, and accessible at all times.. This report, authored by Frost & Sullivan analysts, takes a comprehensive look at the current Web Application Firewall (WAF) vendor landscape and analyzes the current web application threat landscape and how vendors will scale to face it.
Tags : 
web applications, waf, ips
    
Akamai Technologies
By: Citrix Systems     Published Date: Feb 10, 2016
Learn what traditional network security solutions can’t do and why your organization needs a web application firewall as a cornerstone of its IT security strategy
Tags : 
    
Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn what traditional network security solutions can’t do and why your organization needs a web application firewall as a cornerstone of its IT security strategy
Tags : 
citrix, web application, firewall, security, network security, remote access, firewalls, hacker detection
    
Citrix Systems, Inc.
By: Percussion     Published Date: Jun 11, 2013
Many leading organizations that have invested substantial time and money building a web content management (WCM) system to run their web site often face a crossroads. Do they continue to support their own custom-built application and extend it to address the needs of the business today, or do they look to purchase a commercial software product to address these requirements. This leads to a delicate stand-off between the web site business owners (usually marketing), the development team (usually in IT) and the Finance office.
Tags : 
cms, cms best practices, cms software, content marketing, content marketing platform, digital content management, content marketing platform, wcms
    
Percussion
By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam
    
Fortinet, Inc.
By: Data Guard Systems     Published Date: Aug 21, 2009
Web-based software automation is an essential part in managing business processes in today's cellular/wireless retail environment. An effective solution must have the ability to manage all of a company's operations simultaneously with virtually no interaction by an administrator. This document addresses key points that cellular retailers, wholesalers, and master agents need to know.
Tags : 
cellular retailer, business process management, bpm, software automation, data guard, data guard systems
    
Data Guard Systems
By: CDW     Published Date: Sep 29, 2015
This is a whitepaper about how the enterprise datacenter has gone through waves of disruption and transformation over the past couple of decades.
Tags : 
hyper-convergence, cloud, infrastructure, ecosystems, network, datacenter, storage, server
    
CDW
By: IBM     Published Date: Mar 17, 2009
Download this webcast replay to learn more about: Integrating Software Development and System Engineering, Integrated Requirements Engineering, Cross-Discipline Change and Configuration Management
Tags : 
ibm, telelogic, automotive system designs, mechatronics, electronic and software engineering, ptc, ibm rational, integrated requirements engineering
    
IBM
By: Oracle     Published Date: Jan 20, 2017
"Many large enterprises struggle to decide which workloads and systems should be deployed in the public cloud versus on premise. With a strong on-premises platform in place, organizations benefit from increased reliability, speed, and security. On the other hand, by leveraging the public cloud, they gain increased flexibility and recovery capabilities. So, what goes best where? Jim Rapoza, Senior Research Analysts at Aberdeen Group and Chuck Hollis, Senior VP at Oracle, will provide guidance aimed at helping organizations choose the right platforms for their critical workloads. They will analyze how Best-in-Class enterprises effectively integrate on-premises solutions and the public cloud, and recommend steps that businesses can take to become IT infrastructure leaders."
Tags : 
    
Oracle
By: IBM     Published Date: Sep 11, 2009
Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.
Tags : 
ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions, convergence, network management
    
IBM
By: HP Intel     Published Date: Sep 15, 2010
See Paul's checklist for assessing your data center needs for today - and for the future of your business.
Tags : 
hp intel, upgrade data center, hardware assessment, server age, storage, computing power, cooling system, server hardware
    
HP Intel
By: Pure Storage     Published Date: Feb 01, 2016
Hear from Senior Systems Administrator Richard Savage how USF Health is leveraging Unidesk and Pure Storage to successfully deploy VDI and deliver Epic EMR and GE Centricity apps.
Tags : 
vdi, business transformation, healthcare it, unidesk, pure storage, epic emr, centricity, it management
    
Pure Storage
By: Lawson     Published Date: May 11, 2011
Check out this Lawson Talent Management demo and see for yourself how Lawson Talent Management works and what it can do for your organization.
Tags : 
lawson hcm, spaces demo, talent management solution, human capital management system, strategy, execution, actionable content
    
Lawson
By: Quantcast     Published Date: Jan 25, 2016
With the onset of programmatic buying and real-time media, it is possible to run more targeted advertising than ever before. To effectively leverage these new technologies to drive the best performance and ROI, it's essential to understand how the real-time advertising ecosystem is evolving.
Tags : 
real-time advertising, programmatic buying, real-time media, targeted advertising, roi
    
Quantcast
By: CDW     Published Date: Sep 17, 2014
We now live in a flash centric world where all active data must be on flash. This doesn’t mean, however, that all data must be on flash. The best approach is to understand your application mix and workload requirements. Some key apps, like databases, are latency intolerant and should be pinned to flash. Others apps can benefit from fully-automated storage tiering. EMC’s market leading VMAX and VNX systems are flexible choices that can deliver all-flash and hybrid services. CDW and EMC has you covered!
Tags : 
data, market, flash, systems, key apps, centric, application, tiering
    
CDW
By: Progress     Published Date: Jan 22, 2019
Your consumers are multichannel mavericks. With the right content management system, marketers can create meaningful, multi-channel journeys. Delivering a compelling, personalized customer journey across multiple digital touchpoints has never been more important. At the same time, it’s also never been so complex—many organizations struggle to personalize their campaigns and build cohesive multichannel experiences that can engage prospects anytime, anywhere. With creativity and the right content management system at your side, you can create meaningful, multichannel journeys. Watch this webinar to learn more.
Tags : 
    
Progress
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
By: Red Hat     Published Date: Jan 20, 2011
In this session, Tim Burke will provide a high-level overview of Red Hat Enterprise Linux 6, setting the context for listeners to be prepared for the more detailed follow-on sessions. Tim will provide a description of the key themes of Red Hat Enterprise Linux 6, including datacenter operational efficiency, performance, scalability, virtualization, and green IT. He will also provide highlights of the key feature advancements in a wide variety of subsystems. Tim will close the session with a description of the product packaging approach.
Tags : 
red hat, enterprise linux 6, datacenter operation, performance, scalability, virtualization, green it, tim burke
    
Red Hat
By: Red Hat     Published Date: Jan 20, 2011
In this session, attendees will explore the new features of Red Hat Enterprise Linux 6 performance. John Shakshober (Shak) will share the scalability optimizations for larger SMP systems, > 1TB of memory, new transparent hugepage support, multi-q network performance of 10Gbit and Infiniband, and KVM enhancements that went into Red Hat Enterprise Linux 6. Shak will also share benchmark data from industry standard workloads using common applications such as database servers, Java engines, and various financial applications on the latest Intel and AMD x86_64 hardware.
Tags : 
red hat, enterprise, linux 6 performance, memory, storage, database servers, clustering, storage area networks
    
Red Hat
By: Red Hat     Published Date: Jan 21, 2011
Douglas O'Flaherty - Senior Manager, Product Marketing, Red Hat Red Hat Enterprise Linux is the proven leading enterprise open source operating system. Now, with cloud computing progressing into the enterprise and public clouds emerging as a viable alternative, Red Hat Enterprise Linux is well positioned to be leveraged as the cloud guest operating system of choice. In this session, Douglas O'Flaherty will cover the technical and business elements of Red Hat Enterprise Linux that are relevant when used in cloud computing infrastructures, emphasizing the unique challenge of public cloud deployments. Session topics will include: * Cloud-relevant technologies included within Red Hat Enterprise Linux * Release models for Red Hat Enterprise Linux on public clouds * ISV certifications * Security * Deployment flexibility & planning
Tags : 
red hat virtual tradeshow, live event, enterprise linux, operating system, cloud computing, isv certification, security, deployment flexibility
    
Red Hat
By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
    
Aria Systems
By: Citrix Systems     Published Date: Nov 10, 2014
Attend this webinar to learn how SDN helps address the challenges of virtualization. You will learn practical tips that can help you get started immediately. Agenda: • How virtualization impacts the underlying network infrastructure • Why and how SDN addresses the challenge of virtualization • How SDN enables “Just in Time” networks for L4-7 services
Tags : 
application, deployment, research, enterprise, data center, controller, network, security
    
Citrix Systems
By: Kaseya     Published Date: Aug 27, 2010
Register and attend this webinar and also receive a complimentary copy of Kaseya's Industry Alert entitled, "Top Ten IT Systems Management Pain Points" compiled from our interactions with thousands of customers worldwide.
Tags : 
kaseya webinar, it systems management, it automation, best practices, enterprise management, business management, business process automation, business process management
    
Kaseya
Start   Previous    242 243 244 245 246 247 248 249 250 251 252 253 254 255 256    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter