new application services

Results 76 - 100 of 108Sort Results By: Published Date | Title | Company Name
By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises seeking to become application-centric, with many modern data centers now running a combination of cloud-native applications based on microservices architectures alongside traditional applications. With application owners seeking publiccloud- like simplicity and flexibility in their own data centers, IT teams are under pressure to deliver services and resolve application issues quickly, while simultaneously reducing provisioning time for new applications and lowering costs for application services.
Tags : 
     Avi Networks
By: Citrix     Published Date: Oct 26, 2017
Today, new application architectures like Devops microservices are opening great opportunities for innovation. But you still have traditional IT-managed applications to provide for.
Tags : 
     Citrix
By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking, security, it management
     Cisco
By: MuleSoft     Published Date: Jan 16, 2018
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Apr 15, 2019
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
     MuleSoft
By: Progress Software BTA Financial     Published Date: May 14, 2007
Modern distributed, interconnected applications provide a new level of agility to businesses and IT. In these applications, the software for a business process is composed of "services," components consisting of discrete business functionality that can be recombined and reused in different business processes, enabling rapid business change. This white paper examines the challenges of, and solutions for, effectively managing their operations.
Tags : soa, itil, progress, reliability, service management, operations, operational excellence
     Progress Software BTA Financial
By: Progress Software BTA Telecommunications     Published Date: May 14, 2007
Modern distributed, interconnected applications provide a new level of agility to businesses and IT. In these applications, the software for a business process is composed of "services," components consisting of discrete business functionality that can be recombined and reused in different business processes, enabling rapid business change. This white paper examines the challenges of, and solutions for, effectively managing their operations.
Tags : soa, itil, progress, reliability, service management, operations, operational excellence
     Progress Software BTA Telecommunications
By: IBM     Published Date: Dec 15, 2016
The new IBM MQ Appliance M2001 provides an optimized version of IBM MQ V8 that runs in a hardware appliance. IBM MQ provides universal messaging that allows applications, systems and services to connect and exchange information securely, reliably, rapidly and simply. Offering MQ capability in hardware appliances, additional features are provided, as well as some appliance benefits. This on-demand webcast will help you understand how your business can benefit from the IBM MQ Appliance, and where it can fit into your business today.
Tags : ibm, middleware, mq appliance, ibm mq appliance m2001, enterprise applications
     IBM
By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : ibm, bluemix, cloud-computing, middleware, networking, security, software development, it management
     IBM
By: Masergy     Published Date: Nov 04, 2019
Driven by the need to save money, improve agility, and take rapid advantage of emerging technologies to improve internal collaboration and customer engagement, organizations are quickly adopting Unified Communications-as-a-Service (UCaaS) and Contact Center as a Service (CCaaS). UCaaS and CCaaS enable businesses to deliver a modern communications environment, without large capital investment, and in a manner that provides for rapid scaling, easy expansion into new sites and geographies, and deployment flexibility. Unfortunately, many enterprise networks are not optimized to deliver the performance and reliability required to support cloud-based applications, including UCaaS and CCaaS. As a result, IT leaders are rapidly adopting Software-Defined Wide-Area Network (SD-WAN) technologies. With SD-WAN’s ability to virtualize underlying network services and to build enterprise-grade WANs using both public (Internet) connectivity and private WAN connectivity, IT leaders can leverage it to su
Tags : 
     Masergy
By: CA Technologies     Published Date: Sep 11, 2014
This white paper discusses why application release and deployment automation platforms are becoming increasingly vital for IT operations in global enterprises and explores the specific requirements of such a platform in order for it to prove beneficial, and effective, and offer a substantial return on investment.
Tags : new application services, application testing, application releasing, devops, software development
     CA Technologies
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IDC strongly believes that the days of homogenous compute, in which a single architecture dominates all compute in the datacenter, are over. This truth has become increasingly evident as more and more businesses have started to launch artificial intelligence (AI) initiatives. Many of them are in an experimental stage with AI and a few have reached production readiness, but all of them are cycling unusually fast through infrastructure options to run their newly developed AI applications and services on.
Tags : 
     Group M_IBM Q2'19
By: CA Technologies     Published Date: Jun 27, 2014
Dans un contexte commercial en constante évolution, caractérisé par une compétitivité extrême, l'époque où les entreprises passaient des mois, voire des années, à élaborer, tester et lancer une application, un service ou un nouvel ensemble de fonctionnalités, est bel et bien révolue. Les clients, les utilisateurs de technologies et le marché dans son ensemble sont à l'origine de ces changements : ils sont en effet plus réactifs que jamais et leurs attentes en matière de nouvelles fonctionnalités innovantes ont augmenté de concert. Autrement dit, les clients ne se contentent plus d'attendre la prochaine mise en production d'envergure. Ils ne souhaitent pas non plus se voir confrontés à des bugs ni à des défauts. En réponse à ce changement au sein même du marché, de nombreuses entreprises se sont tournées vers des méthodes permettant d'accélérer le cycle de mise en production de leurs applications, sans pour autant en impacter la qualité et le coût.
Tags : new application services, application testing, application releasing, devops, software development
     CA Technologies
By: Riverbed     Published Date: Jul 15, 2014
In January 2012, Riverbed® Technology announced version 9.5 of its Cascade® network performance management solution, which included a number of major enhancements. Collectively, the new capabilities are designed to improve visibility into the health and activity of applications and services traversing networks from the branch to the data center.
Tags : advnace, visibility, virtual data centers, technology, solution, management
     Riverbed
By: Intel     Published Date: Mar 19, 2019
Technology has drastically transformed the banking industry and the way in which consumers transact. Mobile banking is now the new normal. Many consumers, especially millennials prefer to do most if not all of their financial transactions via smartphone due to the convenience in which it offers. Even so, the popularity of mobile banking does not imply that the end of retail banking is near as research has shown that consumers still prefer retail banking for complex services such as loan applications, new account openings and advisory services. Download the whitepaper to learn— • How to build a bank of the future by leveraging the Internet of Things • How to increase security, ease system management and reduce operational costs • The benefits of migrating to a thin-client infrastructure and going paperless
Tags : 
     Intel
By: Blue Coat     Published Date: Mar 11, 2016
The cloud creates new risks and compliance issues for organizations already struggling with traditional threats. Get Blue Coat’s new E-Book, “Securing Cloud Applications & Services.”
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application
     Blue Coat
By: Akamai Technologies     Published Date: Aug 30, 2019
Attacks on financial services institutions are growing in both quantity and sophistication. Our new State of the Internet/Security report studies criminal behavior across this advanced and expansive financial services attack economy: from a popular authentication mechanism for staging credential stuffing attacks to the use of stolen identities to cash out ill-gotten gains. The report identifies leading DDoS and application-layer attack vectors, lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets. Attacks that prove successful in financial services often move on to other industries. Download the report, and see what petabytes of data tell us.
Tags : 
     Akamai Technologies
By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
     Avi Networks
By: Avi Networks     Published Date: Mar 17, 2016
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling applications to be re-architected into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : avi networks, load balancing strategy, best practices, software defined architecture, application centric, application performance, application services, application delivery controller, automation, networking
     Avi Networks
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"In today’s Idea Economy, businesses need to turn ideas into services faster. Every new business and established enterprise is at risk of missing a market opportunity and being disrupted by a new idea or business model. It has never been easier, or more cru cial, to turn ideas into new products, services, or applications —and quickly drive them to market. But IT needs an infrastructure that enables them to partner with the business to speed the delivery of services."
Tags : 
     Hewlett Packard Enterprise
By: Citrix Systems     Published Date: Nov 13, 2018
Today, new application architectures like Devops microservices are opening great opportunities for innovation. But you still have traditional IT-managed applications to provide for. How do you bridge the gap between these different architectures? Download “The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery” to learn more. Fill out the form below to receive this eBook. This eBook identifies ADC considerations for: -Managing traditional and microservices apps in a unified environment -Monitoring and troubleshooting your entire application delivery infrastructure -Delivering consistent features and capabilities for all applications
Tags : 
     Citrix Systems
By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
     Citrix
By: Dell EMC     Published Date: Feb 14, 2019
Artificial intelligence (AI) is a transformative technology that will change the way organizations interact and will add intelligence to many products and services through new insights currently hidden in vast pools of data. In 2017 alone, venture capitalists invested more than $11.7 billion in the top 100 Artificial Intelligence startups, according to CB Insights1, and the breadth of Artificial Intelligence applications continues to grow. While human-like intelligence will remain the stuff of novels and movies for the near future, most organizations can and should explore practical Artificial Intelligence projects. This technology has the potential to: • Improve productivity of internal applications • Increase revenue through enhanced customer interacton and improved customer acquisiiton • Reduce costs by optimizing operations • Enhance products and services with "smart" functionality such as vision and voice interaction and control This paper provided by Dell and Intel® gives executi
Tags : 
     Dell EMC
By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : criminal, justice, information, services, cjis, compliance
     MobileIron
By: Pivot3     Published Date: Sep 27, 2017
Over the last several years, there have been some dramatic changes in enterprise computing. Not only have there been new applications introduced such as business analytics, there have also been important developments in the infrastructure components used to enable these critical application services.
Tags : 
     Pivot3
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com