RSS feed Get our RSS feed

News by Topic

management applications

Results 301 - 325 of 516Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
     CA Technologies
By: IBM     Published Date: Jan 02, 2014
"The Cincinnati Zoo & Botanical Garden is one of the nation’s most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent’s Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000 plant species. Although the Zoo is a non-profit organization and is partially subsidized by Hamilton County, more than two thirds of its $26 million annual budgetis generated through its own fundraising efforts."
Tags : ibm, case study, botanical garden, increase revenues, customer experience, boost sales, effective marketing, effective promotions
     IBM
By: IBM     Published Date: Jan 02, 2014
The data center is challenged. Many midsize businesses simply do not have designated personnel to care for their data center; they have only a standard room to host the company server and storage infrastructure and have no luxury to expand. In short, they must work within their constrained space.
Tags : ibm, virtualization, midsized businesses, consolidation, optimize virtualization, workload management, automation, increase innovation
     IBM
By: IBM     Published Date: Dec 06, 2013
Data workloads are rapidly evolving and changing. Today's enterprises have many different types of applications, with different usage patterns, all constantly accessing data. As a result, data services need to be more robust and scalable. IBM PureApplication System and IBM PureData™ System for Transactions are designed to meet these needs. This paper shows how the latest technology and expertise built into these systems gives businesses an innovative approach to rapidly create and manage highly scalable data services, without the complexity of traditional approaches.
Tags : ibm, ibm puredata system, ibm pureapplication system, data, data center, data management, applications, workloads
     IBM
By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
     VMware, Inc
By: IBM     Published Date: Nov 08, 2013
Maximize asset productivity and process efficiency by gaining insight from your data.
Tags : ibm, predictive maintenance, asset productivity, asset-associated processes, maximize asset productivity, optimize asset-associated processes, consumer empowerment, strong financial returns
     IBM
By: CDW     Published Date: Nov 05, 2013
A software audit can be either an internal process, executed by an in-house team or consultants, or it can be done externally, by the vendor. If done internally, the results are used by the organization to check what software is installed across the network, how the software is being used and how this usage compares with the entitlements owned by the organization. If you haven’t already been audited—get ready; it’s not a case of if, but when.
Tags : cdw solutions, software audit, software publisher, end user license agreement, eula, asset management, conduct self-audits, desktop deployment
     CDW
By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
     Qualys
By: AppNeta     Published Date: Oct 28, 2013
6 things you should be doing today to assure fast availability and delivery of your critical web apps.
Tags : appneta, applications, application performance, application performance management, web applications, application delivery, network health, latency
     AppNeta
By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Storage plays a critical role in the datacenter. To keep up with the performance, capacity, availability, and efficiency needs of today’s enterprise, storage is undergoing a transformation by leveraging flash, high-capacity disks, and integrated data management. This paper discusses how Nimble Storage’s flash-optimized architecture is engineered to accelerate applications, scale performance and capacity, protect data, and make IT more productive and empowered.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Storage is a critical factor when virtualizing your business-critical applications like Exchange, SharePoint, SQL Server, and Oracle databases. What features should you look for when selecting a storage vendor? Download this tech overview to learn how flash-optimized Nimble Storage accelerates performance, maximizes utilization, and cost-effectively protects your mission-critical data.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Collaboration and email applications such as Microsoft SQL Server, Exchange, and SharePoint are critical for business productivity. But care needs to be taken in selecting the right infrastructure for hosting these applications. Download this technical overview and learn how VMware, Cisco, and Nimble Storage have developed a pre-validated reference architecture that delivers industry-leading performance, data protection, and management simplicity.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Understanding the latest developments in storage technology is crucial when planning a virtual server storage architecture, and choosing the wrong storage architecture can dramatically impair your ability to provide application resources and recoverability. This best practices guide will show you how to lay the foundation for an efficient, easy-to-manage storage environment.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Nimble Storage’s patented Cache Accelerated Sequential Layout (CASL™) is the industry’s first flash-optimized storage designed from the ground up to maximize efficiency. In this product brief, you’ll learn how Nimble Storage customers run more workloads with less storage infrastructure, protect more data, and streamline data management so they can focus on higher-value projects.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
It’s easy to underestimate the performance and capacity requirements for VDI storage, and missteps now can lead to expensive problems later. In “Risk-Free Storage for VDI,” you’ll learn how Nimble Storage delivers responsive performance to handle peak VDI workloads, integrated data protection, and instant backups and restores—all for dramatically less than you’re paying now.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Get this 36-page technical report and learn how to deploy 1,000 virtual desktops using VMware View 5.1 with VMware vSphere 5, Cisco UCS, and a single 3U Nimble Storage array. This validated solution provides efficient infrastructure, adaptive performance, rapid provisioning, linear scalability, and dramatically simplified management.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: VMTurbo     Published Date: Oct 25, 2013
Businesses receive a number of benefits from running their IT operations within virtualized cloud environments, including: automation, economics and efficieny. Yet, as more mission-critical applications and workloads are run within cloud environments, IT staff lack the means for effective management. Businesses need new tools that meet cloud-era demands and deliver the same benefits as cloud computing itself: automation, economics and efficiency.
Tags : vmturbo, operations manager, vmturbo operations manager, it management, cloud, cloud computing, applications, workload
     VMTurbo
By: IBM     Published Date: Oct 24, 2013
Learn how automating 'Last Mile of Finance' processes can help CFOs and their finance teams meet expanded reporting requirements--including XBRL tagging.
Tags : ibm, cognos disclosure management, business intelligence, data collection, last mile of finance, account reconciliation, internal management, financial reporting
     IBM
By: IBM     Published Date: Oct 22, 2013
Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change.
Tags : ibm, integration testing, optimize test efficiency, incremental integration, employ test virtualization, system-level testing, asset sharing, effective data management
     IBM
By: ServiceNow     Published Date: Oct 18, 2013
Three IT transformations can help IT get its own house in order to become the proactive partner of the business. By applying these concepts, IT departments at major enterprises are changing the way they engage with their business peers.
Tags : technology, service automation, it workload, it infrastructure, service consolidation, it globalization, managing service relationships, consumerized service experience
     ServiceNow
By: ServiceNow     Published Date: Oct 18, 2013
To reach the customers of IT services, you have to abandon long-entrenched models of IT thinking & replace them with a customer-focused model that focuses on value, experience & context. Join the webinar to understand the issues internal customers face with IT, & see how IT can evolve from being the department of no to the department of now.
Tags : servicenow, enterprise it, service automation, applications, webinar, customer relationships, perception of it, change management
     ServiceNow
By: ServiceNow     Published Date: Oct 18, 2013
Certifying the accuracy of a CMDB with inconsistent, manual methods is unreliable. ServiceNow's built-in data certification gives you the ability to automate the process. Learn how data certification works with the ServiceNow CMDB to deliver a trustworthy single system of record you can rely on.
Tags : configuration management, data certification, product management, servicenow, enterprise it cloud, it cloud company, infrastructure applications, management applications
     ServiceNow
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics