critical application

Results 301 - 325 of 454Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 02, 2018
Oracle Database powers your business’s mission-critical applications. Their downtime and data loss can have a devastating impact on your company’s bottom line and productivity—not to mention the damage to your company’s (and your) reputation, because outages and data losses make headlines.
Tags : 
    
Oracle
Published By: Oracle Corp.     Published Date: Jan 16, 2013
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : 
oracle, database, 11g release, microsoft sql server 2008
    
Oracle Corp.
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
Learn how Outsourcery achieved their goal of expanding the hosting business by deploying a state-of-the-art virtualized cloud platform.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, data center
    
HP - Intel® Xeon® processors
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
To achieve greater productivity, employees at headquarters, telecommuters, business partners and customers must all have unhindered access to critical applications. Any delay in delivering these applications can cause user productivity to suffer and adversely affect business profitability. WAN link controllers are an affordable solution for ensuring the optimum performance, reliable delivery and protection of applications. They optimize network bandwidth and ensure the delivery of critical applications. Download this white paper to learn how to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN link controllers.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management, firewalls
    
HP - Enterprise
Published By: Internap     Published Date: Mar 30, 2015
Selecting an Infrastructure-as-a-Service (IaaS) provider can be a complex exercise that involves an array of considerations including business needs, budget, and application requirements. Buyers frequently respond to this complexity by filtering vendors based on variables that are more easily comparable, usually product features, location, and price. By contrast, performance, which is a critical factor to ensuring fit with business needs and ultimately satisfaction with the service, is often ignored. Virtual machine (VM) performance can be challenging to assess because it can vary drastically across vendors, instance sizes and prices, as well as in terms of a particular application’s unique requirements.
Tags : 
infrastructure, benchmarking, cloud computing, database, storage management, business intelligence, database development, software compliance
    
Internap
Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : 
ibm ouncelab, application security tools, best practices, database management, network security, security management, application security, security, security administration, network security appliance, database development, database security, data warehousing
    
IBM Software
Published By: HP - Intel®     Published Date: Nov 13, 2012
Watch this 7 minute podcast to learn more about HP Departmental Private Cloud and how HP and Microsoft partner to go beyond virtualization.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, data center
    
HP - Intel®
Published By: Polycom     Published Date: Mar 13, 2015
Dynamic work environments are made-up of people on the move and virtual teams across different time zones. This makes it challenging to access an expert or to secure information. You need a communication solution that anchors fast-moving teams and enables communication from any device, anywhere; and critical to your success, and ease of use and HD quality voice and video to help drive user adoption. And communication tools that integrate with applications you use daily that are managed through a single interface to streamline deployment and speed your return on investment (ROI).
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality, enterprise applications, data management
    
Polycom
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18
Published By: InMage     Published Date: Feb 18, 2009
Business-critical data and applications must be available around the clock or serious business disruption could result.
Tags : 
inmage, practical business protection, dr-scout, continuous data protection, cdp, encryption support, host-agents, control servers, data management, servers, data protection, database security
    
InMage
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
Learn how Priceline accommodated significant year-over-year data growth while speeding time to offer new services, boosting storage utilization, and maintaining constant availability.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, data center
    
HP - Intel® Xeon® processors
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
    
HPE
Published By: Red Hat     Published Date: Jul 16, 2010
This paper tells managers evaluating middleware how it's done and why JBoss Enterprise Middleware products are an ideal platform for deploying mission-critical applications.
Tags : 
red hat, open source, jboss enterprise middleware, deployment platform, software localization, soa, application integration, enterprise software, middleware, service oriented architecture
    
Red Hat
Published By: CDW Vmware     Published Date: Aug 02, 2012
As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
Tags : 
quick, start, data, recovery, vmware, enterprise, data, center, components, protect, recover, secure, threat, intruders, natural disaster, recovery, plan, event, disaster, critical
    
CDW Vmware
Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This whitepaper illustrates how HP Integrity virtualization technologies on the HP Integrity i2 servers play a key role in high-end UNIX® servers.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, data center
    
HP - Intel® Xeon® processors
Published By: Xiotech     Published Date: Apr 13, 2007
Well-publicized disasters highlight the need for an effective and timely data recovery solution. While current tape and disk backup provide some peace of mind, they do not keep up with the demands placed on your business. You cannot afford to wait hours (or days) to recover your critical applications and data.
Tags : 
disaster recovery, disaster plan, data backup, backup and recovery, data recovery, disk backup, tape backup, offsite storage, data protection, continuous data protection, xiotech, storage
    
Xiotech
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
    
Lenovo - APAC
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This document is intended to provide pointers for administrators who are currently running HP-UX Virtual Partitions on legacy, cell-based systems, and who are considering upgrading to HP-UX vPars version 6.1.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, data center
    
HP - Intel® Xeon® processors
Published By: HireVue     Published Date: Feb 09, 2018
Unilever is a global player in the fast-moving consumer goods (FMCG) sector, with nearly a third of the world’s population using its products every day. The company has more than 169,000 employees working around the world, and its leaders estimate that within three years, as many as 60 percent of those employees will be Millennials. Critical to Unilever’s ongoing success will be its ability to attract these recent college graduates. For its signature Future Leaders Programme, the company wanted its recruitment efforts to get ahead of the curve. The existing process was rooted in paper-based applications, phone interviews with recruiters, and manual assessment tests. It took four to six months to sift through 250,000 applications and ultimately hire 800 individuals. The company sought to radically transform this process using online gamification, digitally recorded interviews, and science-based assessment tests and data analysis. In this case study, we: • Explain the challenges facing U
Tags : 
    
HireVue
Published By: HireVue     Published Date: May 16, 2018
OVERVIEW Unilever is a global player in the fast-moving consumer goods (FMCG) sector, with nearly a third of the world’s population using its products every day. The company has more than 169,000 employees working around the world, and its leaders estimate that within three years, as many as 60 percent of those employees will be Millennials. Critical to Unilever’s ongoing success will be its ability to attract these recent college graduates. For its signature Future Leaders Programme, the company wanted its recruitment efforts to get ahead of the curve. The existing process was rooted in paper-based applications, phone interviews with recruiters, and manual assessment tests. It took four to six months to sift through 250,000 applications and ultimately hire 800 individuals. The company sought to radically transform this process using online gamification, digitally recorded interviews, and science-based assessment tests and data analysis. In this case study, we: • Explain the chal
Tags : 
    
HireVue
Published By: Red Hat     Published Date: Feb 25, 2019
Business-critical applications need a platform that is proven to be stable. Red Hat®Enterprise Linux® frees you to deliver meaningful business results through technology by providing exceptional reliability and military-grade security. With a Red Hat Enterprise Linux Server subscription, you gain access to the industry's most extensive ecosystem of partners, customers, and experts that supports and accelerates your success. Read the datasheet to learn more.
Tags : 
    
Red Hat
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.