app data

Results 176 - 200 of 2453Sort Results By: Published Date | Title | Company Name
By: BMC ESM     Published Date: Aug 19, 2009
The paper discusses the agility enabled by virtualization, the resulting control challenges, and a way to meet those challenges. It describes seven major requirements for success and reviews how the BMC/VMware approach helps IT ensure control over the virtualized data center and maintain compliance with corporate policies and government regulations.
Tags : bmc software, virtualization, vmware, virtualized data center, networking, storage
     BMC ESM
By: BMC ESM     Published Date: Aug 20, 2009
See the highlights of BMC’s Application Performance and Analytics; a predictive, resourceful and intelligent solution that empowers IT Operations to reduce mean time to repair (MTTR), avoid problems with early warning, find problems faster using fewer resources, ensure applications meet business requirements and put the right person on the right problem, every time.
Tags : bmc, application performance and analytics, it operations, mttr, mean time to repair, data center, enterprise applications
     BMC ESM
By: BMC Software     Published Date: May 28, 2014
"In the paper, “Integrate Big Data into Your Business Processes and Enterprise Systems” you’ll learn how to drive maximum value with an enterprise approach to Big Data. Topics discussed include: • How to ensure that your Big Data projects will drive clearly defined business value • The operational challenges each Big Data initiative must address • The importance of using an enterprise approach for Hadoop batch processing
Tags : it management
     BMC Software
By: BMC Software     Published Date: May 28, 2014
This paper, "Workload Automation – From Application Development to Digital Service Delivery," describes how a workload automation solution can eliminate the manual processes developers now use to define batch workflows and communicate them to schedulers.By extending the use of workload automation to developers, organizations can implement applications faster, slash costs, and increase service quality.
Tags : big data, hadoop, it management, enterprise applications
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
This white paper discusses three key principles for creating a new approach to change management—one that allows the IT department to manage change more effectively. -Automate with purpose: eliminate risk and do it sooner rather than later -Move from data to insight: make better decisions with contextual data -Empower the occasional user: make the experience simple and intuitive
Tags : change management, risk, automation, contextual data, user experience
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
This CIO eBook explores how to deploy Hadoop applications faster and easier with a workload automation solution that simplifies and automates Hadoop batch processing and connected enterprise workflows. Read the eBook to learn: • The role—and challenges—of Hadoop in Big Data application development • Six considerations for a Hadoop proof-of-concept initiative • How to connect Hadoop to other enterprise data sources and applications
Tags : big data, hadoop applications, hadoop development
     BMC Software
By: BMC Software     Published Date: Jul 22, 2015
In this white paper, you’ll discover an enterprise approach to Big Data that leverages workload automation to: - Integrate Hadoop workflows into your enterprise processes to deliver new applications faster - Resolve issues faster with predictive analytics, automated alerts, and early problem detection - Achieve compliance and governance adherence
Tags : big data, business processes, enterprise systems, hadoop, compliance
     BMC Software
By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : data protection, network security, software agent, agentless, bocata, bocada
     Bocada
By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
     Box
By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
     Box
By: Box     Published Date: Jun 22, 2018
There’s more to your content than you might think. Beyond the differences of enterprise vs. web vs. cloud content management, new changes in intelligent machine-to-machine apps are reinventing the content management market. In this expert e-guide, we explore a flexible, API-led approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to: • Power content with machine learning and metadata • Drive intelligent capabilities like smart search • Modernize content-based processes • And more
Tags : 
     Box
By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending
     Brainloop
By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
     Brainloop
By: Brandwatch     Published Date: Nov 03, 2016
Learn how social media intelligence can fill gaps in your research mix. We provide six unique benefits of social media research, four key layers of the social intelligence stack and eight core applications of social media data for modern businesses.
Tags : social media, consumer insights, market research, b2b marketing, consumer market insights, social data, social insights, social listening, social intelligence, business intelligence, voice of the customer, social intelligence platforms, social listening platforms
     Brandwatch
By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery, data protection, data management, breece hill
     Breece Hill, LLC
By: BrightEdge     Published Date: Nov 13, 2014
BrightEdge tapped into its massive Data Cube repository to provide a comprehensive view into the channels that drive traffic and the types of content that perform best. BrightEdge created this report to help brands understand the actual performance of site content by channel and by industry.
Tags : brightedge, content marketing, data analytics, marketing data, marketing platform, market intelligence, business intelligence
     BrightEdge
By: Bronto     Published Date: Jul 16, 2012
Email marketers should be leveraging the use of Recency, Frequency, Monetary (RFM) analysis to uncover optimal segments and untapped opportunities within their email marketing program. Email marketing provides real time data about subscriber behavior, which is ideal for RFM analysis. In order to use each metric fully we will focus on the undeniable power of Recency first.
Tags : bronto, marketing, email marketing, marketing campaigns, social media, customer
     Bronto
By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : systems management, customer data centers, network operation centers, secure access service, enterprise applications
     BubblewrApp
By: Business Software     Published Date: Apr 04, 2013
An ERP system combines methodologies with software and hardware components to integrate numerous critical back-office functions across a company. Made up of a series of “modules”, or applications that are seamlessly linked together through a common database, an ERP system enables various departments or operating units such as Accounting and Finance, Human Resources, Production, and Fulfillment and Distribution to coordinate activities, share information, and collaborate. In this white paper, Business-Software.com profiles the leading ERP software vendors. Download this white paper to learn more!
Tags : business-software.com, erp systems, methodologies, top 20, coordination, business software, enterprise applications
     Business Software
By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
     Butler Technologies
By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe, storage
     CA Mainframe
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Performance Management Handbook for DB2 for z/OS by renowned tuning experts Susan Lawson and Dan Luksetich of YL&A covers information to enhance your skills and raise awareness for databases performance management issues and tuning strategies. This supplement to the CA Performance Management Handbook provides specific information on which technologies apply to which issues and how CA Database Management addresses your most pressing database performance management challenges.
Tags : ca mainframe, mainframe, apm, application performance management, data management
     CA Mainframe
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service, security
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
     CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com