RSS feed Get our RSS feed

News by Topic

back end

Results 76 - 100 of 300Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jun 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : security, technology, security tactics, data
     Cisco
By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : technology, infrastructure management, security
     Cisco
By: Cisco     Published Date: Apr 11, 2016
Los atacantes y los responsables de la seguridad están desarrollando tecnologías y tácticas cada vez más sofisticadas. Por su parte, los atacantes están creando infraestructuras back-end sólidas para el lanzamiento y soporte de sus campañas. Los ciberdelincuentes están perfeccionando sus técnicas para obtener dinero de sus víctimas y para evitar ser detectados mientras continúan robando datos y propiedad intelectual.
Tags : 
     Cisco
By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : hyperflex, systems, data platform, storage efficiency, business, cisco
     Cisco EMEA
By: Acronis     Published Date: Apr 26, 2011
Closing the Virtualization Loop white paper identifies the objectives in the next phase of virtual machine backup and recovery and provides recommendations on how to improve backup and disaster recovery in a hybrid IT environment.
Tags : acronis, virtualization, backup and recovery, disaster recovery, roi, tco, virtual server backup, virtual server
     Acronis
By: Salesforce.com     Published Date: Apr 16, 2013
Successful mobile apps, especially enterprise mobile apps, typically need to interact with a well-architected set of back-end services, but most mobile app developers are more skilled at client-side front-end development. Enter mobile back-end-as-a-service (BaaS), a new set of hosted platforms that addresses the gap between front-end development proficiency and back-end infrastructure requirements. Enterprise-class back-end-as-a-service addresses scalability while providing an integration platform into existing enterprise services. Use this research as your guidebook to navigating the emerging BaaS landscape.
Tags : cloud mobile development, applications, baas, back end as a service, mobile application development, apps, mobile applications, enterprise
     Salesforce.com
By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM
By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
     Cohesity
By: Commvault     Published Date: Jul 06, 2016
Forget about the complex task of building your own solution. Commvault offers a portfolio of integrated backup appliances that allow you to go from power-up to backup in less than an hour. Each appliance combines Commvault’s industry-leading software with pre-configured and optimized hardware, including an option that uses NetApp’s category-leading NetApp E-Series storage system. To further simplify ordering and deployment, the appliances include a licensing option aligned to the usable storage capacity (e.g., 36TB of NetApp E-Series storage includes 36TB of Commvault back-end terabyte licensing). Or you can purchase the hardware separately and use it with Commvault’s traditional front-end terabyte capacity licensing. Either way, Commvault serves as the single point of contact for software and hardware support issues, and the installation wizard allows you to be up and running quickly regardless of the option you choose.
Tags : commvault, backup appliances, netapp e-series, backup, industry leading software, netapp, turnkey solution, converged
     Commvault
By: BMC Software     Published Date: Jan 31, 2014
With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well articulated interfaces defining the data that is traveling back and forth. With the right integration strategy, SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.
Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, bmc
     BMC Software
By: BMC Software     Published Date: May 19, 2014
With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well-articulated interfaces defining the data that is traveling back and forth. With the right integration strategy SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.
Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration
     BMC Software
By: EMC Corporation     Published Date: Dec 19, 2014
IT infrastructure is the backbone of today's modern business. Find out how Vblock System implementations sped deployments, simplified operations, improved business-support agility, saved money, and freed staff to launch new applications, extend services, and improve user/customer satisfaction.
Tags : it infrastructure, deployments, simplified operations, user/customer satisfaction
     EMC Corporation
By: Possible EMC     Published Date: Dec 22, 2014
IT infrastructure is the backbone of today's modern business. Find out how Vblock System implementations sped deployments, simplified operations, improved business-support agility, saved money, and freed staff to launch new applications, extend services, and improve user/customer satisfaction.
Tags : it infrastructure, deployments, simplified operations, user/customer satisfaction, it management
     Possible EMC
By: Storiant     Published Date: Apr 27, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : storage technologies, it storage vendors, storiant, storage infrastructures, automated storage
     Storiant
By: Druva     Published Date: Jan 04, 2016
Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.
Tags : enterprise, endpoints, backup, vendor comparison, cloud, on premise
     Druva
By: Datastax     Published Date: May 15, 2017
Customer experience might be a relatively new term, but the concept goes back millennia. In Ancient Greece, the retailer’s relationship with the customer was deep and personal, and that’s because the seller knew almost every customer extremely well. What happened? Mass distribution and mass marketing, for one. But now, thanks to technology, we are returning to being able to form a deep, personal relationship with the customer. Read this eBook to learn about the retailer’s journey from knowing the customer to depersonalization to using powerful technology to go back to the types of vendor-buyer relationships that existed thousands of years ago.
Tags : datastax, customer experience, buying initiatives
     Datastax
By: Castlight Health     Published Date: Feb 14, 2017
Tired of year after year of healthcare cost increases, Steel Dynamics decided to fight back. They partnered with Castlight Health, a cloud-based provider of healthcare management services. Castlight Health’s health benefits platform armed employees with buying information — when and how they needed it. As a result, Steel Dynamics cut healthcare spending by approximately $500,000 in their first year with Castlight Health.
Tags : 
     Castlight Health
By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
     Code42
By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : dedupe, 2.0, store, once, enterprise, strategy, group, client
     Intel Corp.
By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
     Citrix Systems
By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
     Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration.
Tags : citrix, netscaler, security, mobile, applications
     Citrix Systems, Inc.
By: Oracle     Published Date: Feb 21, 2018
A basic chatbot isn’t that hard to build. In JavaScript, write a public REST endpoint to connect a Facebook page to some chat logic (botly is a popular option) and deploy the whole thing to run on a cloud platform. Zoom out to the bigger picture, though, and you see that Facebook is just one channel. If you use Skype, Slack, Kik, and digital voice assistants, you’ll have to build six or eight of these endpoints straight away. And chatbots are being asked to handle ever more complex responses, so you better build on a platform of machine learning and natural language processing to keep up. That’s why the question enterprise developers should be asking is not “Which chatbot service do I start with?” but “Which platform will let me crank out a chatbot today and also support multiple channels and integrate with back-end systems as these chatbots take off?”
Tags : 
     Oracle
By: Dell Software     Published Date: Jun 04, 2013
Dell AppAssure is the backup, replication and recovery solution that works across your virtual, physical and cloud environments. In this informative white board video, learn more about AppAssure’s power and ease of use, and how end-to-end data protection ensures all your critical data is safe. Watch it now.
Tags : dell software, dell appassure, recovery solution, data protection
     Dell Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics