Home > White Papers > Technology > Enterprise Applications

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Published By: Hitachi Data Systems     Published Date: Feb 19, 2015
As companies mature in their use of public cloud environments, many realize they need to augment security availability services as well as formulate best practices in determining which data is appropriate for public cloud environments.
Tags : 
hitachi data systems, hds, cloud storage, cloud computing, cloud applications
    
Hitachi Data Systems
Published By: Cask     Published Date: Feb 04, 2015
It’s time for business applications to include Big Data functionality, and it’s time for developers to get on the Big Data train. This webinar will focus on how to make that happen.
Tags : 
cask, hadoop, big data, application development, big data application development
    
Cask
Published By: IBM     Published Date: Jan 29, 2015
Mobility is no longer an IT trend: It is the new reality for how technology is deployed for business benefit. Research and consulting firm Forrester refers to this tidal wave of change as the “mobile mind shift” and emphasizes that it is more important than ever for enterprises to get it right the first time. But getting it right means more than just launching a customer app, implementing enterprise mobile policies, improving mobile device security or creating campus-wide hot spots. It means developing and continuously delivering mobile applications that truly make a difference for employees, business partners and customers. Increasingly, that means adopting new ways of thinking about how best to develop and manage mobile applications.
Tags : 
mobile mind shift, it trends, mobility policies, mobile device security, security
    
IBM
Published By: Lenovo     Published Date: Jan 29, 2015
This paper begins with an examination of BYOPC and its shortcomings. It closes with a look toward the future – Consumerization – and how cloud and web services are combining to finally deliver on the advantage of the new realities of BYOD.
Tags : 
consumerization, advantage, byod, cloud, web services
    
Lenovo
Published By: Avalara     Published Date: Jan 29, 2015
Reducing transactional risk in your retail business.
Tags : 
avalara, profits, compliance, fees, audit
    
Avalara
Published By: Avalara     Published Date: Jan 29, 2015
This report uncovers the direct and indirect costs of managing sales and use tax compliance that your organization may be experiencing and provides a strategy for reducing these costs through cloud software.
Tags : 
avalara, business, finance, compliance, tax
    
Avalara
Published By: Kenandy     Published Date: Jan 28, 2015
Manufacturing and product companies are facing critical challenges. To survive in the new global economy, companies need to continuously reinvent themselves. They need to rapidly add new products and acquire new businesses. They need to build new partnerships and channels. They can’t depend on the same set of suppliers tomorrow that they do today. And they can’t expect to do business the same way in new and emerging markets. For these reasons, enterprises need a new kind of ERP, one that’s faster to deploy and can: Adapt very quickly Go into the hands of employees, customers and partners immediately, with little or no training Provide continuous visibility into their operations It’s no surprise that CIOs, manufacturing managers and operational executives are looking for new solutions. They have to ?nd solutions to get the three strategic capabilities they need to succeed: greater operational agility, the ability to collaborate and continuous visibility. You need to position your com
Tags : 
cloud erp, enterprises, continuous visibility, collaboration, enterprise applications
    
Kenandy
Published By: Kenandy     Published Date: Jan 28, 2015
What do Star Trek and Enterprise Resource Planning (ERP) have in common? Apart from each being a bold adventure, both have experienced a rebirth as a next generation. In recent reports, Mint Jutras describes the next generation of ERP in terms of new technology that enables: new ways of engaging with ERP custom configuration without programming more innovation better integration
Tags : 
next generation erp, custom configuration, innovation, integration, erp for manufacturing
    
Kenandy
Published By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : 
it trends, it environments, smarter physical infrastructures, data protection, it management
    
IBM
Published By: IBM     Published Date: Jan 23, 2015
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics
    
IBM
Published By: Cobalt Networks     Published Date: Jan 23, 2015
7 Best Practices for Buying Colocation is a step-by-step handbook for organizations actively selecting a colocation provider. It offers tips and tricks from experienced colocation buyers to help you narrow down your choices, see through the sales pitches, and select the colocation vendor who will best suit your needs.
Tags : 
buying colocation, business needs, experience buyers, sales pitches, enterprise applications
    
Cobalt Networks
Published By: Internap     Published Date: Jan 23, 2015
Understanding new data center developments and how they can help you better serve your end users and driver operational efficiencies is an essential step in identifying the right colocation provider, so read this whitepaper today.
Tags : 
internap, colocation, data center, high power density, remote management
    
Internap
Published By: Verisign     Published Date: Jan 22, 2015
As a leader in domain management and internet security, Verisign’s network supports more than 82 billion transactions on a daily basis, enabling nearly 50 percent of the internet’s domains. Building networks to survive the largest DDoS attacks on the internet is part of Verisign’s heritage, and Verisign has been using DDoS mitigation techniques for more than 16 years while protecting the .com and .net infrastructures. This gives Verisign the ability to flex its entire 1+ tbps infrastructure as needed in real-time response to attack scenarios against itself and its customers.
Tags : 
network capabilities, ddos attack mitigation, domain management, internet security, it infrastructure
    
Verisign
Published By: Verisign     Published Date: Jan 22, 2015
Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.
Tags : 
ddos protection, cyber security threats, cloud-based protection, best practices, security
    
Verisign
Published By: Verisign     Published Date: Jan 22, 2015
To tackle the advanced DDoS threats of today and tomorrow, it is increasingly clear that cloud DDoS mitigation providers must rapidly innovate solutions and implement them quickly on a global scale. To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena. This technical report describes the Athena platform, a globally distributed DDoS mitigation system that provides comprehensive protection against network- and application-layer attacks, and specializes in mitigating Layer-7 and Secure Sockets Layer (SSL)-based attacks
Tags : 
mitigation platform, ddos threats, internet infrastructure, ssl based attacks, application-layer attacks
    
Verisign
Published By: Verisign     Published Date: Jan 22, 2015
Download this important report and learn why utilizing the expertise and resources of a cloud-based provider is the only sound solution.
Tags : 
cloud defenses, ddos attacks, cloud-based provider, cyber attacks, security
    
Verisign
Published By: Verisign     Published Date: Jan 22, 2015
Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.
Tags : 
api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation
    
Verisign
Published By: Verisign     Published Date: Jan 22, 2015
Distributed Denial of Service (DDoS) attacks are a threat to businesses worldwide and the attacks are getting larger and more sophisticated. The industry’s approach to protecting against DDoS attacks must change, and change fundamentally, to stay ahead of this growing threat. Read this blog today to find out how to stay ahead of these attacks!
Tags : 
ddos, ddos attacks, it security risk, risk mitigation, security
    
Verisign
Published By: Workfront     Published Date: Jan 22, 2015
Are workplace zombies killing productivity? Is frustration and discouragement spreading through your team like a virus? The Working Dead can show up in any workplace. You need to identify these zombies in your workplace and cure them before you have a workplace zombie apocalypse on your hands. Use this guide and learn how to: • Turn chaos into process • Unite team members around strategic priorities • Transform confusion into clear-eyed efficiency Bring your team back from the undead—back to doing the work they enjoy. Get this guide and start defending your office today!
Tags : 
workplace environment, strategic priorities, clear-eyed efficiency, productivity, time management
    
Workfront
Published By: Workfront     Published Date: Jan 22, 2015
Does your team have enough time in the day? Is productivity difficult to define? Download this ebook to learn how to be more efficient as a team. In today’s fast-paced marketing environment, you are constantly being asked to increase productivity, report on what you’re working on, when it’ll be done and what’s next. At the same time there are frequent interruptions and new work requests while you’re juggling multiple tasks for multiple campaigns in various stages of completion. Sound familiar? Check out this ebook to learn about the top 10 productivity problems marketing teams face and strategies for how to solve them. Learn how to: • Manage interruptions effectively • Streamline approval processes • Efficiently juggle multiple work requests • Know resource availability to plan future work without overcommitting • Provide work measurement and accountability without breaking a sweat Get the ebook today!
Tags : 
productivity issues, marketing environment, increase productivity, team efficiency, enterprise applications
    
Workfront
Published By: JumpCloud     Published Date: Jan 21, 2015
Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.
Tags : 
ldap, active directory, user management, iam, ssh access
    
JumpCloud
Published By: Dell     Published Date: Jan 21, 2015
Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.
Tags : 
dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure
    
Dell
Published By: SugarCRM     Published Date: Jan 20, 2015
After an initial rollout to more than 45,000 sales users, IBM wanted even greater insights. Thanks to the high usability of Sugar, IBM was able to increase sales data quality - which has gone on to power predictive sales analytics. Learn how IBM and SugarCRM are driving more effective sales teams.
Tags : 
sales analytics, data quality, sales, high usability, enterprise applications
    
SugarCRM
Published By: Masergy     Published Date: Jan 20, 2015
This presentation will illustrate how IT leaders are leveraging Unified Communications (UC) to deliver real-world business impact and present a roadmap for moving from application- and device-specific infrastructures to a more flexible Unified Communications (UC) solution.
Tags : 
masergy, unified communications, ucaas, business communications, ip networks
    
Masergy
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution
    
Intralinks
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


SUB-CATEGORIES: Application Integration, Application Performance Management, Best Practices, Business Activity Monitoring, Business Analytics, Business Integration, Business Intelligence, Business Management, Business Metrics, Business Process Automation, Business Process Management, Call Center Management, Call Center Software, Change Management, Corporate Governance, Customer Interaction Service, Customer Relationship Management, Customer Satisfaction, Customer Service, eBusiness, Enterprise Resource Planning, Enterprise Software, eProcurement, Extranets, Groupware Workflow, HIPAA Compliance, Incentive Compensation, International Computing, IP Faxing, IT Spending, Manufacturing Execution Systems, Marketing Automation, Performance Testing, Product Lifecycle Management, Project Management, Return On Investment, Risk Management, Sales & Marketing Software, Sales Automation, Server Virtualization, Simulation Software, Spend Management, Supply Chain Management, System Management Software, Total Cost of Ownership, Video Conferencing, Voice Over IP, Voice Recognition, Workforce Management

Search White Papers