> White Papers > Technology > Enterprise Applications
 

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 151 - 175 of 2725Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Nov 03, 2016
The more you invest in an internet hybrid infrastructure, the more exposed you can be to internet events. At the internet infrastructure layer, this can mean unavailable destinations, poor performing paths and security events such as DDoS attacks. The fact is that there are thousands of internet events that happen every day and when it comes to DDoS attacks 97% of them happen at the infrastructure layer. You shouldn't rely on a single DNS service to protect you from all of these potential problems. Just like everything else in your IT architecture you should always have a backup plan. How you implement a redundant DNS architecture is not a given. Watch this informative webinar and learn about different ways you can get the benefits of a hardened internet infrastructure layer that fits your existing and planned online architecture. Get insights and examples from our DNS experts on different key approaches.
Tags : dyn, dns, hybrid infrastructure, networking, enterprise applications
     Dyn
By: Mindtree     Published Date: Nov 01, 2016
Learn how to cut costs so you can self-fund growth initiatives. An expert Managed Services guide can help you map a smart path to streamlining processes, outsourcing services and rearchitecting systems. With a customized plan in place, your Managed Services provider can begin to optimize IT and increase efficiencies through continuous improvements. Discover how Managed Services providers: Guarantee savings every year so you can invest in growth opportunities such as digital and analytics Optimize the run-the-business side of IT to accelerate innovation Deliver continuous improvements to productivity, quality and time to market
Tags : mindtree, growth initiatives, managed services guide, managed services, analytics, enterprise applications
     Mindtree
By: CarbonBlack     Published Date: Nov 01, 2016
This checklist will help you assess the capabilities of your current antivirus solution and will provide the requirements you need to meet in order to shift to a more effective approach.
Tags : carbonblack, antivirus checklist, antivirus, security, enterprise applications
     CarbonBlack
By: CarbonBlack     Published Date: Nov 01, 2016
A SANS Guide to Evaluating Next-Generation Antivirus Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware.
Tags : carbonblack, sans, antivirus, security, enterprise applications
     CarbonBlack
By: Xactly Corp     Published Date: Oct 31, 2016
In the eBook, you will learn: - How best of breed and suite differ in capabilities and service - Why Xactly is important to all departments of your organization - Common myths associate with best of breed applications - Xactly’s best of breed partners
Tags : xactly, best of breed, software vendors, best of breed partners, enterprise applications
     Xactly Corp
By: Xactly Corp     Published Date: Oct 31, 2016
In this report, you will discover: - Why spreadsheets are working against you and de-motivating your team - A spreadsheet “health diagnosis” checklist - How incentive plans can drive behavior with better accuracy and objectivity
Tags : actly, strategy, spreadsheets, incentive spans, enterprise applications
     Xactly Corp
By: Adobe     Published Date: Oct 31, 2016
Invest in the future of every student. For a secure future, your students need to not only speak the language of digital, but they have to be well versed in it. Read Growing Digital and learn how you can give your students the skills to create opportunities that will pay dividends long after graduation.
Tags : adobe, education, digital, enterprise applications
     Adobe
By: Veracode     Published Date: Oct 28, 2016
The Ultimate Guide to Getting Started with Application Security Application-layer attacks are growing much more rapidly than infrastructure attacks. Yet many organizations remain hesitant to create an application security program, believing it will require excessive time and resources. The reality is that any organization, of any size, can and should develop an applications security program. Download the Ultimate Guide to Getting Started With Application Security now for details!
Tags : veracode, security, devops, appsec, application security, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : veracode, security, devops, appsec, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : veracode, security, devops, appsec, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.
Tags : veracode, security, devops, appsec, enterprise applications
     Veracode
By: IBM     Published Date: Oct 28, 2016
Interest in analytics and storytelling through data in HR is booming. But, much of HR is just beginning its journey to create an effective analytics function.
Tags : ibm, kenexa, talent insights, talent analytics, workforce analytics, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
Watch this complimentary, on-demand 30 minute demo to see how you can: - Use HR analytics to redefine the way you manage your talent and help drive better business results. - Gain deep insights from your talent data without having to dig through mountains of reports. - Know exactly what data to explore to get the very best answers to your talent questions. - Answer your CEO's questions about the workforce in minutes, not months.
Tags : ibm, kenexa, talent insights, talent analytics, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses? This is referred to as cognitive computing and is key to providing an analytics system that is easy to use but extremely powerful. Listen to this webinar, led by Jackie Ryan, the Director of Product Management for IBM's Smarter Workforce Portfolio, and learn about: The evolution of cognitive computing How cognitive computing transforms HR How to get started with cognitive talent analytics
Tags : ibm, kenexa, talent insights, talent analytics, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
Every job opening brings an opportunity for your business to build its brand. Giving job candidates great experiences could motivate them to become your brand ambassadors—regardless of whether you make an offer.
Tags : ibm, kenexa, talent acquisition, candidates, hiring, brand ambassadors, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
A retail perspective to raise rehire rates The IBM Smarter Workforce Institute has undertaken analyses of rehire rates as well as the use of hiring metrics to help HR professionals and hiring managers in the retail industry improve their recruitment performance. Read this paper and discover: - Which metrics impact rehire rates - Which hiring effectiveness metrics are being used in retail - How retail could increase rehire rates
Tags : ibm, kenexa, talent acquisition, retail, hiring, recruiters, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
Recruiters have to think like marketers. Just as a marketer needs to attract customers, a recruiter needs to attract the skilled employees the company needs. To do this, recruiters must become marketers. Marketers and recruiters must: - Research the market - Establish and nurture relationships - Build and promote the company's brand Read this for seven tips to help you think like a marketer.
Tags : ibm, kenexa, talent acquisition, marketer's playbook, recruiters, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
Download the report and learn: - What is driving interest in employee listening - How to build a program that employees will want to participate in - How organizations can build their listening capabilities - Recommendations for building an employee listening program
Tags : ibm, engagement social, employee engagement, kenexa, employee voice, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
This white paper highlights factors that have a decisive influence on the design and effectiveness of employee engagement programs.
Tags : ibm, engagement social, employee engagement, kenexa, engagement program, enterprise applications
     IBM
By: IBM     Published Date: Oct 28, 2016
In this webinar, you will learn: - How to create a safe environment for honest feedback so it’s an invitation, not an imposition - Best practices for collecting feedback, from unstructured conversations to regular pulse surveys - What to do with the data you’ve collected, and how to use insights to create action plans that result in happier employees and better business performance
Tags : ibm, engagement social, employee engagement, kenexa, enterprise applications
     IBM
By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : veracode, security, software security, application security, security benchmark, enterprise applications
     Veracode
By: IBM     Published Date: Oct 27, 2016
A unique point-of-view prepared by IBM Digital Foundation services on how we can help improve application and system performance while reducing costs
Tags : ibm, leadership, ibm digital foundation, innovation, system performance, enterprise applications
     IBM
By: IBM     Published Date: Oct 27, 2016
IBM Analytics for Apache Spark for Bluemix is an open-source cluster computing framework with in-memory processing to speed analytic applications up to 100 times faster compared to other technologies on the market today. Optimized for extremely fast and large scale data processing-you can easily perform big data analysis from one application.
Tags : ibm, apache spark, bluemix, analytics, enterprise applications
     IBM
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications
     Veracode
By: IBM     Published Date: Oct 26, 2016
Predictive analytics has come of age. Organizations that want to build and sustain competitive advantage now consider this technology to be a core practice. In this white paper, author Eric Siegel, PhD, founder of Predictive Analytics World, reveals seven strategic objectives that can only be fully achieved with predictive analytics.
Tags : ibm, predictive analytics, analytics tools, advanced analytics, enterprise applications
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com