application management

Results 251 - 275 of 1111Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: Feb 03, 2014
Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision, requiring organizations to assess carefully the potential impact on their business operations, a growing number of companies are clearly finding the move worthwhile. This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer for enterprises. Topics include: The cost savings companies can achieve by deploying ITSM solutions via the cloud, which allows better management and optimization of consumption and costs. Improved alignment between IT to and business, as self-service, a service catalog, collaboration, and mobility help IT expose and provide its services more effectively. The ability to integrate cloud and on-premise solutions to leverage existing systems while leveraging new innovations via the cloud. The advantages of cloud
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: CA Service Assurance     Published Date: Sep 16, 2010
CA Technologies Newsletter featuring Gartner Research. This publication, enhanced by Gartner research, reveals how to take a proactive IT approach which ensures visibility and control during the adoption of virtualization and cloud environments.
Tags : 
apm, application performance, ca technologies, service delivery, application delivery, user experience, gartner, business services
    
CA Service Assurance
Published By: Okta     Published Date: Oct 01, 2010
Controlling who is granted secure access to which applications and data becomes a real challenge when users can get access from any browser, at any time, from any place.
Tags : 
okta, cloud area network, scaling saas applications, security, identity management, iam, active directory, google apps
    
Okta
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the users identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? Its time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
    
Ruckus Wireless
Published By: Red Hat     Published Date: May 05, 2015
In this Forrester report: How the infrastructure/operations (I&O) role changes in a hybrid cloud world. How they accelerate the cloud application delivery life cycle to exceed business expectations of cloud & Which management capabilities must be mastered to take on the role of hybrid cloud manager.
Tags : 
red hat, forrester, hybrid cloud, management, developers, infrastructure, operations, it management
    
Red Hat
Published By: Red Hat     Published Date: Jan 09, 2014
In this Forrester report: How the infrastructure/operations (I&O) role changes in a hybrid cloud world. How they accelerate the cloud application delivery life cycle to exceed business expectations of cloud & which management capabilities must be mastered to take on the role of hybrid cloud manager.
Tags : 
red hat, cloudforms, cloud management, hybrid cloud, infrastructure, operations, acceleration, application delivery
    
Red Hat
Published By: VMWare EMEA     Published Date: Oct 23, 2017
To meet the challenges of managing such a complex environment, IT teams need an enterprise-ready cloud management platform that can support multivendor environments, automate application and service delivery, and facilitate operations and governance. VMware provides an enterprise-ready cloud management platform that delivers the industrys most complete solution for managing a heterogeneous, hybrid cloud, and supports cloud management requirements across Day 1 and Day 2 operations for compute, storage, network and application level resources. The VMware solution is in use today across a wide range of industries and use cases, delivering benefits such as faster provisioning, optimized IT operations, and lower capital spending. To learn more about the VMware cloud management platform, visit http://www.vmware.com/virtualization/ cloud-management.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : 
liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes
    
Liaison Technologies
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Founded in 1992 as a provider of integrated network, voice and data centre solutions, Colts business today has grown to encompass a wide range of IT services, spanning enterprise application hosting, business critical cloud and end-user computing solutions. Colt has 29 data centre locations supporting thousands of customers across 28 countries in Europe and Asia, including Swiss International Airlines, Shurgard, Berenberg, and Jaguar Land Rover. Colts award-winning solution portfolio is based on end-to-end data centre, network and IT services capabilities; its aim is to help its customers compete and win in their markets without being held back by hardware, licensing and resource limitations.
Tags : 
network management, best practices, network optimization, network applications, application management, technology, telecommunications, network architecture
    
SolidFire_NetApp
Published By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : 
palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
Palo Alto Networks
Published By: Oracle Global Marketing     Published Date: Nov 16, 2011
Learn how to meet expectations on the evolving consumer journey through the cross-channel commerce landscape of today, driven by technical trends.
Tags : 
ecommerce, business research, enterprise technology, it solution, retail applications, oracle, oracle retail applications, atg commerce
    
Oracle Global Marketing
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Heres what you need to know about memory-based attacksand how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Lumension
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
    
Commvault
Published By: Success Factors     Published Date: Aug 02, 2012
This free Ventana Research report shows SuccessFactors to be a top supplier of applications that support the management and operations of compensation. According to Ventana, SuccessFactors Compensation (part of SuccessFactors BizX Suite) achieved the top overall ranking due to its scores in Reliability and Capabilities. In addition, the growing number of SuccessFactors customers and the company's commitment to cloud computing contributed to its top ranking in the Validation and TCO/ROI categories. Easy for managers at all levels to use, the application has capabilities for compensation reviews and adjustments, as well as an embedded analytic view-which shows the handling of promotions and support across pay ranges. Find out what else Ventana has to say about SuccessFactors in this complimentary report. Download it today.
Tags : 
successfactors, sap, ventana research, value index, total compensation management, benchmark research, human capital, vendors
    
Success Factors
Published By: Oracle     Published Date: Apr 03, 2012
Oracle Exalogic is a standard data center building block of integrated compute, storage and network components designed to provide a ready to deploy, out of the box platform for a range of enterprise application workloads. Learn more now!
Tags : 
application development, software, oracle exalogic, oracle corp., hardware, enterprise software, enterprise application, data management
    
Oracle
Published By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you cant escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: Adopt and scale containers faster. Move existing services to containers. Eliminate the friction between development, QA, and production environments.
Tags : 
    
Puppet
Published By: IBM     Published Date: Jan 13, 2016
With deep integration of matching and linking capabilities, application development tools and workflow components, IBM InfoSphere Master Data Management can help deliver a seamless transition from a virtual architectural style to a physical architectural style.
Tags : 
ibm, mdm, linking, data, infosphere, data management
    
IBM
Published By: IBM     Published Date: Feb 18, 2015
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere - which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere - which allows for management of WAS configurations. When combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Tags : 
application delivery, websphere, ibm, urbancode, application server, it management, knowledge management, enterprise applications
    
IBM
Published By: CA Technologies EMEA     Published Date: Sep 30, 2018
If youre relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices, youll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile deviceswithout bogging down workersis one of todays biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: Enables continuous management, so your employees are more productive. Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. Guards against data leakage. Provides security after loss or theft of mobile devices. Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management, business intelligence, business management, productivity
    
Microsoft
Published By: IBM     Published Date: Aug 28, 2014
Equipping IT with the resources that they need to optimize the user experience to match that of consumer applications can help you achieve the business outcomes you want, while making the most of your enterprise content management (ECM) investments.
Tags : 
user experience, ecm, consumer applications, business analytics, content management system, productivity, project management
    
IBM
Published By: IBM     Published Date: Oct 22, 2014
Equipping IT with the resources that they need to optimize the user experience to match that of consumer applications can help you achieve the business outcomes you want, while making the most of your enterprise content management (ECM) investments.
Tags : 
consumer applications, content management, ecm, it management, knowledge management, data management, application performance management, business intelligence
    
IBM
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
New Belgium Brewing, a Colorado-based craft brewery with origins in the Belgian style of ale making, has grown steadily from a home-based operation to a thriving company with distributors across the western United States. The company was using a Novell-based networking and e-mail system, which it found increasingly challenging to integrate with its business and IT applications from other vendors.
Tags : 
microsoft, microsoft exchange, exchange, exchange server, networking, application management, infrastructure, novell
    
Microsoft Exchange
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.