application management

Results 526 - 550 of 1109Sort Results By: Published Date | Title | Company Name
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Os dispositivos da Zebra com Android oferecem aos clientes experincias de compras consistentes e gratificantes que criam fidelidade, enquanto os associados se beneficiam de maneiras muito mais eficientes de se comunicar e gerenciar o estoque.
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Oct 04, 2017
Los dispositivos Zebra con Android le proporcionan a los clientes experiencias de compras consistentes y gratificantes que crean lealtad, mientras los asociados se benefician de formas mucho ms eficientes de comunicarse y administrar el inventario.
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies
Published By: MemSQL     Published Date: Nov 15, 2017
FREE O'REILLY EBOOK: BUILDING REAL-TIME DATA PIPELINES Unifying Applications and Analytics with In-Memory Architectures You'll Learn: - How to use Apache Kafka and Spark to build real-time data pipelines - How to use in-memory database management systems for real-time analytics - Top architectures for transitioning from data silos to real-time processing - Steps for getting to real-time operational systems - Considerations for choosing the best deployment option
Tags : 
hardware trends, data pipelines, database management, architectures, technology
    
MemSQL
Published By: MemSQL     Published Date: Nov 15, 2017
Pairing Apache Kafka with a Real-Time Database Learn how to: ? Scope data pipelines all the way from ingest to applications and analytics ? Build data pipelines using a new SQL command: CREATE PIPELINE ? Achieve exactly-once semantics with native pipelines ? Overcome top challenges of real-time data management
Tags : 
digital transformation, applications, data, pipelines, management
    
MemSQL
Published By: Jelecos     Published Date: Aug 02, 2018
We work with our clients on a foundation of steps to make your Windows workload migration of Windows Servers, SQL, .Net applications and Sharepoint to AWS smooth and successful. Relying on an experienced partner means that you can have confidence to get started with AWS, and Management and Optimization to help your business thrive.
Tags : 
    
Jelecos
Published By: Oracle     Published Date: Nov 16, 2017
Two trends are pushing all lines of businessacross all industriestoward cloud IT. First, IT is being stretched more than ever. IT organizations are expected to expand services and meet tighter SLAs while having fewer resources, personnel, and skills to work with. With the IT queue growing longer than ever, both IT and LOB leaders are interested in using the cloud to quickly deploy the services users need. For most IT organizations, the current way of doing business does not map to growth or enable the flexibility to compete in the digital age. Rigid and periodic hardware-refresh cycles cannot adequately scale, and applications built for on-premises resources using traditional development and management tools are no longer flexible enough to deliver the agility businesses need to grow or compete.
Tags : 
    
Oracle
Published By: Ensighten     Published Date: Jul 17, 2012
Learn how Tag Management Systems optimize deployment, performance and ROI of digital marketing, while accelerating page load. Add, remove and modify all third-party services like web analytics and conversion pixels via a single interface.
Tags : 
tag management, digital marketing, web marketing, web analytics, digital advertising, online advertising, javascript tags, web page optimization
    
Ensighten
Published By: Riverbed     Published Date: Nov 02, 2016
"Visibility into the live mix of network and application activity being hosted and delivered by the IT infrastructure has always is a 'must-have' for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are blended together into one unified view. This paper reviews the primary challenges that IT teams face in establishing unified visibility, the key requirements that management solutions must meet to address those challenges, and examines a Riverbed solution that has been specifically designed to offer a path to success."
Tags : 
    
Riverbed
Published By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : 
security, security application, siem, siem architecture, it security managers, application security, security management, security policies
    
Logrhythm
Published By: Logrhythm     Published Date: Feb 24, 2016
This guide focuses solely on SIEM solutions that are available as appliances that include both the hardware and software needed to deploy them.
Tags : 
security, application security, siem, siem solutions, identity management, internet security, security management, security policies
    
Logrhythm
Published By: UNIT4 CODA     Published Date: Aug 22, 2011
Financial executives need to have a no-compromise approach to financial modeling and application choice, irrespective of where these applications are deployed.
Tags : 
unit4 coda, best-of-class strategy, cloud computing, saas, aberdeen group, financial executives, financial modeling, applications choice
    
UNIT4 CODA
Published By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : 
extreme networks, purview, application analytics, wifi/wireless, network solutions, business intelligence solutions, business intelligence, it operations
    
Extreme Networks
Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK
Published By: EMC Converged Platforms     Published Date: May 26, 2016
Land Rover BAR has sharpened its competitive edge with VCE VxRail Hyper-converged Infrastructure Appliance incorporating VMware virtualization and EMC VNX storage and Isilon, to accelerate collaboration on boat development and honing sailing tactics.
Tags : 
infrastructure management, business management, best practices, application performance, application management, network management, network performance, network performance management
    
EMC Converged Platforms
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations
    
Dell Software
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority -part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
    
Dell Software
Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good, wireless communications
    
Motorola
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Tags : 
watchguard application control, network app, p2p applications, network security appliance, watchguard xtm, firewall, threat management, application security
    
WatchGuard Technologies
Published By: Marketo     Published Date: Jun 08, 2017
Its an exciting, albeit challenging time for marketersnew channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders to involve across the organization How to identify, prioritize, and profile the right accounts What content you need to support an ABM strategy Which channels to leverage and how to coordinate them How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Tidal Software     Published Date: Sep 03, 2008
With 50+ percent of all business processes leveraging batch operations, it is essential to keep your batch production running smoothly in order to keep your business running smoothly. Whether you are consolidating datacenter operations, moving apps to more cost-effective platforms, or transitioning from customized to packaged applications, learn how you can simplify and lower the cost of batch management with a single interface to all batch processes across platforms and applications and more.
Tags : 
datacenter consolidation, application consolidation, application standardization, tidal, tidal software, network architecture, business process automation, enterprise resource planning
    
Tidal Software
Published By: HP SAS     Published Date: Oct 15, 2008
SAS Grid Computing delivers enterprise-class capabilities that enable SAS applications to automatically leverage grid computing, run faster and takes optimal advantage of computing resources. With grid computing as an automatic capability, it is easier and more cost-effective to allocate compute-intensive applications appropriately across computing systems. SAS Grid Manager helps automate the management of SAS Computing Grids with dynamic load balancing, resource assignment and monitoring, and job priority and termination management.
Tags : 
grid computing, sas grid computing, increase compute hardware, it infrastructure, enterprise computing infrastructure, data integration, grid monitoring, grid management
    
HP SAS
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Migrating data associated with Microsoft operating systems, applications, and other software can be a challenge administrators overlook when planning system upgrades. Del™ PowerVault™ and Dell EqualLogic™ storage and CommVault® Simpana® data management software enable flexible data migration and transparent, release-specific data object recovery and backup to help simplify upgrades in enterprise environments.
Tags : 
dell, commvault simpana, microsoft windows server 2008, data migration, microsoft operating systems, data management software, platforms, data management
    
Dell Windows Server
Published By: Cisco     Published Date: Apr 19, 2011
Download this white paper to learn how IT automation helps businesses make better decisions faster in addition to raising the bar in business innovation.
Tags : 
cisco, it automation solutions, application optimization automation, job scheduling, workload automation, network automation, private cloud infrastructure, data center automation
    
Cisco
Published By: Compuware     Published Date: May 10, 2010
If one of your servers went down today, would you know about it? Probably. But if an obscure service on a small server that is part of a much larger solution started transacting at a slower rate than normal, would you? Perhaps not. If that obscure service is responsible for a critical activity in your business, its slight reduction in performance might be a big deal that you need to know about!
Tags : 
compuware, cloud, computing, borderless applications, diversity chain, on-demand, virtualization, apm
    
Compuware
Published By: Okta     Published Date: Feb 24, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. Were seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
identity and mobility management, office 365, cloud, maximum user adoption, identity management
    
Okta
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.