back end

Results 201 - 225 of 290Sort Results By: Published Date | Title | Company Name
Published By: Salesforce.com     Published Date: Apr 16, 2013
Successful mobile apps, especially enterprise mobile apps, typically need to interact with a well-architected set of back-end services, but most mobile app developers are more skilled at client-side front-end development. Enter mobile back-end-as-a-service (BaaS), a new set of hosted platforms that addresses the gap between front-end development proficiency and back-end infrastructure requirements. Enterprise-class back-end-as-a-service addresses scalability while providing an integration platform into existing enterprise services. Use this research as your guidebook to navigating the emerging BaaS landscape.
Tags : 
cloud mobile development, applications, baas, back end as a service, mobile application development, apps, mobile applications, enterprise, scalability, mobile computing, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless phones, application integration, application performance management, best practices
    
Salesforce.com
Published By: MobileForce Software     Published Date: Nov 19, 2014
GigaOm is seeing a new breed of services that promise to accelerate the mobilization of existing enterprise applications and business processes. Early mobile-application development solutions (MADP) were resource-intensive, requiring custom client code for each supported platform, as well as an on-premise middleware layer to connect mobile clients to enterprise backend systems. In this new model, code-free, configuration solutions - aimed at business analysts and lines of business- are revolutionizing the landscape, consolidating tools and services to simplify cross-platform enablement, and reducing time to deploy and cost tremendously. This report describes mobile-application configuration (MAC) tools, articulates their business value and suggests conditions under which they may be a good choice for an organization.
Tags : 
mobilization, enterprise applications, business processes, development solution, resource-intensive, client code, platform, middleware, backend system, cross-platform, costs, development, wireless
    
MobileForce Software
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 08, 2019
Respond to customer feedback faster Organizations are demanding greater flexibility from the software they use. Yet, most line-of-business applications are built on top of rigid commercial databases that make them difficult and expensive to deploy. By building applications on top of Amazon Aurora, a cost-effective database solution from Amazon Web Services (AWS), independent software vendors (ISVs) can get away from commercial databases and the hassles they create for end customers. In this webinar, AWS Partner Network (APN) Premier Consulting Partner Onica will show you how to leverage Amazon Aurora to make it easier for customers to operate your software, in turn increasing sales. You will also learn how to leverage the breadth and depth of AWS services to improve developer productivity and become more responsive to customer feedback as a result.
Tags : 
    
AWS
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Die Cloud ist in fast jedem Bereich des Enterprise Computing zur Normalität geworden. Sie ist ein wesentlicher Bestandteil der Geschäftswelt und sollte als neuer Standard betrachtet werden. Datensicherung – insbesondere Backup, Archivierung und Disaster Recovery – steht zurzeit ganz oben auf der Liste der Cloud-Aktivitäten. Doch haben Sie auch Ihren Public Cloud Vertrag vor der Unterzeichnung sorgfältig durchgelesen und ausgehandelt, sodass er Ihren Geschäftsanforderungen entspricht? Oder haben die zahllosen Seiten mit rechtlichen Bestimmungen Sie dazu verleitet, zu schnell zu unterschreiben Ihre Rechtsabteilung muss selbstverständlich das gesamte Dokument umfassend prüfen. Im Folgenden finden Sie zudem drei wichtige Punkte, die Sie bei der Zusammenarbeit mit Ihrem Cloud-Anbieter berücksichtigen sollten.
Tags : 
unterzeichnung, public, cloud, vertrages, beachten, sollten
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Sie suchen eine einheitliche Datensicherungslösung, die in der Cloud ebenso zuverlässig funktioniert wie in virtuellen und physischen Umgebungen. Doch das ist Ihnen noch nicht genug – die digitale Transformation, die Ihr Unternehmen zurzeit durchmacht, erfordert ein Enterprise-Datenmanagement, das neben Datensicherung auch Datenverfügbarkeit und Datentransparenz bereitstellt. Commvault® behauptet, ein Datenmanagement für Unternehmen zu bieten, doch es fehlen entscheidende Funktionalitäten. Lesen Sie im Folgenden, warum Veritas™ und NetBackup™ die führende Lösung für einheitliche Datensicherung bereitstellen, die eine ideale Grundlage für das Datenmanagement in Unternehmen darstellt.
Tags : 
360, datenmanagement, veritas, backup, anforderungsgerechte, einfaches, marktfuhrer
    
AstuteIT_ABM_EMEA
Published By: Astute IT DACH     Published Date: Feb 28, 2018
Die Cloud ist in fast jedem Bereich des Enterprise Computing zur Normalität geworden. Sie ist ein wesentlicher Bestandteil der Geschäftswelt und sollte als neuer Standard betrachtet werden. Datensicherung – insbesondere Backup, Archivierung und Disaster Recovery – steht zurzeit ganz oben auf der Liste der Cloud-Aktivitäten. Doch haben Sie auch Ihren Public Cloud Vertrag vor der Unterzeichnung sorgfältig durchgelesen und ausgehandelt, sodass er Ihren Geschäftsanforderungen entspricht? Oder haben die zahllosen Seiten mit rechtlichen Bestimmungen Sie dazu verleitet, zu schnell zu unterschreiben Ihre Rechtsabteilung muss selbstverständlich das gesamte Dokument umfassend prüfen. Im Folgenden finden Sie zudem drei wichtige Punkte, die Sie bei der Zusammenarbeit mit Ihrem Cloud-Anbieter berücksichtigen sollten.
Tags : 
unterzeichnung, public, cloud, vertrages, beachten, sollten
    
Astute IT DACH
Published By: Astute IT DACH     Published Date: Feb 28, 2018
Sie suchen eine einheitliche Datensicherungslösung, die in der Cloud ebenso zuverlässig funktioniert wie in virtuellen und physischen Umgebungen. Doch das ist Ihnen noch nicht genug – die digitale Transformation, die Ihr Unternehmen zurzeit durchmacht, erfordert ein Enterprise-Datenmanagement, das neben Datensicherung auch Datenverfügbarkeit und Datentransparenz bereitstellt. Commvault® behauptet, ein Datenmanagement für Unternehmen zu bieten, doch es fehlen entscheidende Funktionalitäten. Lesen Sie im Folgenden, warum Veritas™ und NetBackup™ die führende Lösung für einheitliche Datensicherung bereitstellen, die eine ideale Grundlage für das Datenmanagement in Unternehmen darstellt.
Tags : 
360, datenmanagement, veritas, backup, anforderungsgerechte, einfaches, marktfuhrer
    
Astute IT DACH
Published By: Appcelerator     Published Date: Jun 20, 2012
Find out about two of the hottest topics surrounding mobile app development right now-social media and HTML5. Educate yourself on the backend of mobile app strategy and use your knowledge to stay in front of the competition.
Tags : 
html5, social media, mobile app, development, backend, strategy, competition, trends, dynamtic, survey, wireless
    
Appcelerator
Published By: VSS Monitoring     Published Date: Aug 01, 2014
Learn how to make a case for bringing network data into the big data infrastructure and see why such a move will allow for resources to be shared more easily across disparate data sets.
Tags : 
bid data, network data, data infrastructure, backend architecture, bid data deployments
    
VSS Monitoring
Published By: Unitrends     Published Date: Aug 18, 2015
There are always a few "secrets" in any industry—and the backup and restore business has its share. Our secrets are widely known within the industry but are less well-known outside of it—for the obvious reason that none of these secrets helps the majority of the vendors in this space. In this white paper, we will reveal these secrets to you.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server, vps, virtual server, data management, data center
    
Unitrends
Published By: Unitrends     Published Date: Aug 18, 2015
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or, if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users? This white paper is to help you understand the various approaches to deduplication, the strengths and weaknesses of each, and to introduce a different approach to deduplication, Adaptive Deduplication.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server, vps, virtual server, dedupe, it management, data management, data center
    
Unitrends
Published By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
    
SAS
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
With continued expansion of organizational storage allocation requirements, the time required for file-based data backup also continues to increase yet the time allotted for this data backup remains constant, exposing a critical issue. Though backup software vendors continue making advancements in technology to speed up the process, disk fragmentation will continue to remain an unresolved issue that must be addressed on the file system level to solve this bottleneck.
Tags : 
storage, storage management, backup, data backup, disk backup, defrag, defragment, defragmentation, optimize backup, optimizing backup, diskeeper, diskkeeper, disk keeper, network management, backup and recovery, desktop management
    
Diskeeper Corporation
Published By: GFI     Published Date: Jun 12, 2007
In a survey conducted throughout November and December 2004, SERVO asked 100 of their top customers which projects they were most likely to accomplish in 2005. Interestingly, email archiving made it to the top 5 corporate priorities and this finding can easily be backed up as recent market trends show a six-fold increase in demand for email archiving solutions.
Tags : 
email archiving, archive, archiving, email management, email, sarbox, sarbanes oxley, sarbanes-oxley, sox, gfi, mail archiver, mailarchiver, storage, storage management, sarbanes oxley compliance
    
GFI
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, knowledge management, enterprise applications
    
Arcserve
Published By: Esker     Published Date: Jun 29, 2015
Read the new independent research report from Ardent Partners, ePayables 2015: State of the Market Report. Drawing on the feedback of hundreds of AP and finance professionals, this unique report offers a comprehensive snapshot into what’s happening in AP, including insights on: • How the role of AP is continuously evolving • Key drivers that shape AP leaders’ plans and priorities • How automation technology is impacting AP • Operational benchmark statistics and recommended strategies
Tags : 
epayables, accounts payable, exception-handling, root cause analysis, ap operations, ap strategy, finance
    
Esker
Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise, strategy, group, client, deduplication, dedupe, awareness, backup, server, storage, device, data, it management, data management, backup and recovery, blade servers
    
Intel Corp.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.