shared applications

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation, business integration
    
Hewlett Packard Enterprise
Published By: MarkLogic     Published Date: Jun 09, 2017
This eBook explains how databases that incorporate semantic technology make it possible to solve big data challenges that traditional databases aren’t equipped to solve. Semantics is a way to model data that focuses on relationships, adding contextual meaning around the data so it can be better understood, searched, and shared. Read this eBook, discover the 5 steps to getting smart about semantics, and learn how by using semantics, leading organizations are integrating disparate heterogeneous data faster and easier and building smarter applications with richer analytic capabilities.
Tags : 
    
MarkLogic
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Alert Logic     Published Date: May 23, 2019
Securing web applications in the AWS cloud environment relies on the cloud service provider and the customer working together in a shared responsibility model. Effective security for web applications on AWS requires full visibility into the environment in which the apps live, while also proactively monitoring for attacks without causing delays in application development and delivery. For some customers this may be a challenge due to limited personnel resources or expertise. This is where Alert Logic can help. We will automatically show you why, where, and how to respond to vulnerability findings and provide you with short- and long-term recommendations to stop active attacks. To help guide the way, following are key considerations for providing sound web application security running on the AWS cloud.
Tags : 
    
Alert Logic
Published By: TeamQuest     Published Date: Sep 05, 2014
TeamQuest Director of Market Development Dave Wagner and Chris Lynn, Safeway's Capacity Manager and Performance Analyst, cover the application of automatic, exception-oriented analytics to a wide variety of IT and business metrics in order to simultaneously optimize service performance and IT cost. Multiple conceptual approaches are shared, including pros and cons. Most of the presentation includes real examples by which Safeway has integrated performance, capacity, business, and power data into an automated optimization process spanning 1000s of servers and virtual servers and their applications.
Tags : 
automated analytics, automated optimization, it cost, power data, application performance management, business intelligence, business process automation, productivity
    
TeamQuest
Published By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon® support for published applications provides exciting new opportunities for customers running Citrix XenApp. Tightly integrated with Microsoft Remote Desktop Services (RDS), VMware Horizon is a new option for delivering not just published applications and shared desktops, but also virtual desktops, software as a service (SaaS), and virtualized applications to the devices your end users want to use. This white paper provides guidance for planning and undertaking a migration from Citrix XenApp to VMware Horizon. Four approaches to XenApp migration are detailed, including the major steps required for their implementation. Whether the goal is to migrate an existing XenApp infrastructure to Horizon, replace it with a new system, or simply integrate legacy Citrix infrastructure with your Horizon virtual desktop deployment, VMware has the innovative products and technology you need.
Tags : 
citrix, xenapp, vmware, horizon, applications, customers, integration, software
    
VMware Citrix
Published By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon® 7 offers full-featured support for hosted applications and shared desktop sessions, expanding the capabilities of the leading virtual desktop infrastructure (VDI) platform. Tightly integrated with Microsoft Remote Desktop Services (RDS), Horizon can deliver hosted applications and desktop sessions, virtual desktops, and VMware ThinApp® virtualized applications, all supported on the devices end users want to use. This white paper provides guidance for adding support for hosted applications and desktop sessions to your VMware Horizon infrastructure. Whether the goal is to integrate an existing RDS environment for combined management with VMware Horizon virtual desktops or deploy hosted applications and desktop sessions for the first time, VMware Horizon provides the technology required and a simple path forward.
Tags : 
hosted, applications, horizon 7, virtual desktop, infrastructure, microsoft, remote, services
    
VMware Citrix
Published By: MarkLogic     Published Date: Nov 07, 2017
This eBook explains how databases that incorporate semantic technology make it possible to solve big data challenges that traditional databases aren’t equipped to solve. Semantics is a way to model data that focuses on relationships, adding contextual meaning around the data so it can be better understood, searched, and shared. Read this eBook, discover the 5 steps to getting smart about semantics, and learn how by using semantics, leading organizations are integrating disparate heterogeneous data faster and easier and building smarter applications with richer analytic capabilities.
Tags : 
    
MarkLogic
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : 
sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations
    
SAP Inc.
Published By: F5 Networks Inc     Published Date: Jun 24, 2015
To meet the challenges of IT organizations, Cisco and F5 have developed a shared architectural vision and joint solution to simplify networking and solve pain points in next-generation data centers. The solution extends the F5 Synthesis architecture and programmable Software-Defined Application Services (SDAS) within the Cisco Application Centric Infrastructure (ACI), helping customers efficiently deliver applications that are fast, secure and available. Read the whitepaper to learn more.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
F5 Networks Inc
Published By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : 
demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud
    
Stratus Technologies
Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable
    
HP
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: Esker     Published Date: Dec 08, 2014
Is your company looking to gain the efficiencies and savings of automated accounts payable processing? Find out how you can: • Quickly deploy one easy, web-based AP workflow solution for all users and systems • Ensure a continuous invoice audit trail • Simplify shared services setup In this white paper, you'll learn important cost and risk factors to consider with AP tools installed inside ERP applications — especially if you have multiple ERP instances or a mix of different enterprise applications. Download the white paper to learn more!
Tags : 
automation, best practices, ap workflow, cost, erp system, data recognition, applications, invoicing
    
Esker
Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace
Published By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
    
Vision Solutions
Published By: Citrix     Published Date: Oct 14, 2010
This planning guide provides best practices for virtualizing Citrix XenApp. Even though these best practices are based on the Hosted Shared Desktop model, they are still relevant in a non-desktop model where users only connect to published applications without the desktop interface.
Tags : 
citrix, xenapp, desktop virtualization, hosted shared desktop, windows servers, data centers, servers, storage virtualization
    
Citrix
Published By: AWS     Published Date: Oct 07, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.