RSS feed Get our RSS feed

News by Topic

web environment

Results 51 - 75 of 139Sort Results By: Published Date | Title | Company Name
By: Riverbed     Published Date: Oct 17, 2012
Microsoft SharePoint is a collaboration tool used in enterprises. Read this white paper to learn about the optimizing a web-based SharePoint environment and how to address the requirements across the technology stack to deliver ROI for the business.
Tags : microsoft sharepoint, enterprise applications, connectivity, it infrastructure
     Riverbed
By: Xangati     Published Date: May 20, 2015
The goal for organizations with eCommerce Web sites, application developers and IT infrastructure managers is to deliver a successful end-user experience. Xangati can help you scale environment and succeed in reaching that goal.
Tags : e-commerce, e-commerce web applications, citrix netscaler adc, web server, web application infrastructure, it administrator, it infrastructure, web application performance
     Xangati
By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
     AWS
By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : cyber threat, cyber risk, technology, best practices, security
     LogRhythm
By: Riverbed     Published Date: Nov 02, 2016
In its quest to increase agility and reliability, IT is adopting cloud services and related technologies like PaaS, micro-services, and containers to rapidly deliver applications that scale to real-world conditions. Application topology is often transient and unpredictably interrelated with countless other applications and services. This poses a serious challenge for performance monitoring since most techniques are still rooted to tiers or servers. During this webinar, discover: • The benefits and challenges of deploying apps across hybrid environments • Techniques that expose major, but often undiagnosed problems • Real-world examples where major performance issues were resolved"
Tags : 
     Riverbed
By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
     Dell Software
By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : dell, microsoft windows server 2008, structured solution designs, windows migration
     Dell Windows Server
By: NetApp     Published Date: Dec 12, 2013
This informative paper explores a partnership that extends how you can leverage the scalability and reliability of Amazon Web Services—in its own right, as backup, as a test/dev environment, or as an innovative extension of your  on premises IT infrastructure. Read on to learn more.
Tags : private cloud, virtualization, technology, best practices, enterprise cloud, netapp, cloud deployments, storage
     NetApp
By: Oracle Service Cloud     Published Date: Mar 24, 2016
Despite the array of new technologies enabling customer contact across web and mobile channels, most serious interactions still have to pass through an agent in order to be resolved. Enterprises can push customers toward self-service, but in the end, people often still need to talk to other people. This means that, even in the best of circumstances, the customer experience is highly dependent on the capabilities of the agent manning the phones. That person needs more than skills and a beneficial temperament; they require a software environment that provides maximum space for flexibility, problem solving, and intuitive task switching.
Tags : oracle, service cloud, customer interaction, customer support
     Oracle Service Cloud
By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications
     Kaspersky Lab
By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast will describe the new features of TSM 6.1 and will recommend strategies for assessing your current environment, upgrading to 6.1 and how to maximize the monitoring benefits. We will include lessons learned and advice for avoiding pitfalls.
Tags : ibm, tivoli, storage manager, tsm, data management, assessment, remote administration, conversion
     Mainline Information Systems
By: Red Hat     Published Date: Jul 14, 2010
This use case introduces Red Hat solutions that you can use to build a world-class web application infrastructure. Learn best practices that will scale as your company grows and find out how to increase your productivity while reducing costs.
Tags : red hat, web app infrastructure, productivity, web application environment, enterprise linux, open source, enterprise virtualization, jboss enterprise middleware
     Red Hat
By: NetApp     Published Date: Aug 19, 2010
Maximize Efficiency and Availability with Hyper-V R2 and NetApp. View this on-demand Webcast to learn how you can increase resource utilization, streamline management, and maximize uptime in your Microsoft environment.
Tags : netapp, virtualize sharepoint, sql server, hyper-v r2, microsoft environment, roi, green computing
     NetApp
By: NetApp     Published Date: Aug 19, 2010
View this on-demand webcast to gain insight into design considerations and deployment best practices for SharePoint in a virtualized environment.
Tags : netapp, hyper-v, virtualize sharepoint, storage, server investment, deployment best practices, microsoft, data storage
     NetApp
By: IBM     Published Date: Dec 03, 2008
Discover the IBM System x3650, a highly available and expandable, rack-dense, 2U dual-socket SMP server, ideal for application serving in Web environments. This product guide gives an overview of the x3650, as well as key features and specifications of this flexible, reliable, and simple-to-manage server.
Tags : intel, system x, system x3550, x3550, rack, rack-mounted, server, ibm x-architecture
     IBM
By: IBM     Published Date: Feb 03, 2010
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation.
Tags : ibm ep, empowering people, service provider, collaboration, web 2.0 environment, innovation factory, telecommunication
     IBM
By: IBM     Published Date: Feb 03, 2010
A recent IBM CEO study revealed innovation, along with global integration and a disruptive business model, to be among the key traits of the Enterprise of the Future.1 As to how that innovation will take place-CEOs include collaboration and the use of Web 2.0 tools at the top of the list.
Tags : ibm ep, empowering people, web 2.0, enterprise software, social networking environment, roi
     IBM
By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron
     Secure Computing
By: Microsoft Dynamics     Published Date: Jul 03, 2008
Get this webcast to discover a customer relationship management (CRM) solution that works the way you do, the way your business does, and the way technology should. We explore how Microsoft Dynamics CRM delivers a familiar Microsoft Office Outlook interface to create a productive work environment. We also illustrate the powerful workflow and integrated reporting capabilities in Microsoft CRM that help you drive business processes and results.
Tags : bpm, crm, microsoft crm, microsoft dynamics, microsoft
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 03, 2008
In this webcast, we discuss how companies excel when they empower their people to drive the business forward. While strategies, organization, motivation, and leadership all set the stage for business success, you also have to give your people the right tools, information, and opportunities to see results—because ultimately success is determined by your people. Learn why we call a business that fosters a winning environment a "people-ready business."
Tags : microsoft, business activity, business intelligence, business analytics, analytics, analytical, business strategy
     Microsoft Dynamics
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
How can a company decide what the right decision is when it comes to outsourcing? A growing percentage of companies are reaping the benefits of leveraging technology to streamline business operations and automate their business processes to create greater efficiencies by turning to outsourced web hosting. In today's economy, more and more small to medium sized businesses with no IT staff, or an already over-burdened IT staff, are finding there is no other choice. However, even with companies that have the resources necessary to host their own websites are looking to outsource their hosting needs. For these companies not resources, but the issue of ensuring that the hosting environment is secure, reliable, and scalable is why they look towards outsourcing. Learn the pros and cons of outsourcing and how NeoSpire can help.
Tags : web hosting, neospire, microsoft sql server, oracle, mysql, hosting options, security, costs
     NeoSpire Managed Hosting
By: Plantronics     Published Date: Oct 18, 2013
The following describes some typical UC usage scenarios, and how you can deploy products that will maximize productivity while minimizing downtime, excessive inventory costs, operational overhead, and unsatisfied users.
Tags : plantronics, solutions for uc users, solutions for uc applications, sound innovation, mobile and wired workers, web-based collaboration, voice communications, deploy products
     Plantronics
By: Plantronics     Published Date: Oct 18, 2013
As communication options and needs increase, clear preferences have emerged regarding the best ways to exchange specific types of information.
Tags : plantronics, global workforces, anywhere-anytime attitude, brainstorming, collaborating, communications tool belt, phone conferences, audio conferences
     Plantronics
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security
     CDW-Trend Micro
By: Microsoft Azure     Published Date: Apr 11, 2018
The 2017 study, The Total Economic Impact™ of Microsoft Azure IaaS, gives insight into both the costs and benefits of large-scale Azure infrastructure as a service (IaaS) implementation. This commissioned study conducted by Forrester Consulting analyzes the return on investment and business impact that several enterprises experienced when moving from a primarily on-premises environment to Azure. The companies interviewed come from a variety of industries and locations (global/multinational, North American, and European). In addition to a 435 percent overall return on an Azure IaaS investment*, the businesses also experienced: Reduced data center and outsourcing costs. Website scale and performance improvements. Ease of experimentation through virtualized environments. Developer and tester improvements. Download the study to learn about the potential ROI that could be realized by shifting some or all of your management and operations to Azure.
Tags : 
     Microsoft Azure
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics