> Technology > Enterprise Applications
 

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 1 - 25 of 1489Sort Results By: Published Date | Title | Company Name
By: Lenovo     Published Date: Jan 29, 2015
This paper begins with an examination of BYOPC and its shortcomings. It closes with a look toward the future – Consumerization – and how cloud and web services are combining to finally deliver on the advantage of the new realities of BYOD.
Tags : consumerization, advantage, byod, cloud, web services
     Lenovo
By: Kenandy     Published Date: Jan 28, 2015
Manufacturing and product companies are facing critical challenges. To survive in the new global economy, companies need to continuously reinvent themselves. They need to rapidly add new products and acquire new businesses. They need to build new partnerships and channels. They can’t depend on the same set of suppliers tomorrow that they do today. And they can’t expect to do business the same way in new and emerging markets. For these reasons, enterprises need a new kind of ERP, one that’s faster to deploy and can: Adapt very quickly Go into the hands of employees, customers and partners immediately, with little or no training Provide continuous visibility into their operations It’s no surprise that CIOs, manufacturing managers and operational executives are looking for new solutions. They have to ?nd solutions to get the three strategic capabilities they need to succeed: greater operational agility, the ability to collaborate and continuous visibility. You need to position your com
Tags : cloud erp, enterprises, continuous visibility, collaboration, enterprise applications
     Kenandy
By: Kenandy     Published Date: Jan 28, 2015
What do Star Trek and Enterprise Resource Planning (ERP) have in common? Apart from each being a bold adventure, both have experienced a rebirth as a next generation. In recent reports, Mint Jutras describes the next generation of ERP in terms of new technology that enables: new ways of engaging with ERP custom configuration without programming more innovation better integration
Tags : next generation erp, custom configuration, innovation, integration, erp for manufacturing
     Kenandy
By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : it trends, it environments, smarter physical infrastructures, data protection, it management
     IBM
By: IBM     Published Date: Jan 23, 2015
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics
     IBM
By: Cobalt Networks     Published Date: Jan 23, 2015
7 Best Practices for Buying Colocation is a step-by-step handbook for organizations actively selecting a colocation provider. It offers tips and tricks from experienced colocation buyers to help you narrow down your choices, see through the sales pitches, and select the colocation vendor who will best suit your needs.
Tags : buying colocation, business needs, experience buyers, sales pitches, enterprise applications
     Cobalt Networks
By: Verisign     Published Date: Jan 22, 2015
As a leader in domain management and internet security, Verisign’s network supports more than 82 billion transactions on a daily basis, enabling nearly 50 percent of the internet’s domains. Building networks to survive the largest DDoS attacks on the internet is part of Verisign’s heritage, and Verisign has been using DDoS mitigation techniques for more than 16 years while protecting the .com and .net infrastructures. This gives Verisign the ability to flex its entire 1+ tbps infrastructure as needed in real-time response to attack scenarios against itself and its customers.
Tags : network capabilities, ddos attack mitigation, domain management, internet security, it infrastructure
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Cyber security threats have become more pervasive and damaging than ever, ranging from advanced persistent threats to massive distributed denial of service (DDoS) attacks. By moving toward a more holistic, proactive approach to addressing all potential DDoS security threats, you help ensure the availability and security of your business-critical network even as zero-day threats emerge and known threats evolve.
Tags : ddos protection, cyber security threats, cloud-based protection, best practices, it management
     Verisign
By: Verisign     Published Date: Jan 22, 2015
To tackle the advanced DDoS threats of today and tomorrow, it is increasingly clear that cloud DDoS mitigation providers must rapidly innovate solutions and implement them quickly on a global scale. To help meet the performance, availability and functional requirements of operating critical Internet infrastructure, Verisign developed its innovative DDoS mitigation platform, called Athena. This technical report describes the Athena platform, a globally distributed DDoS mitigation system that provides comprehensive protection against network- and application-layer attacks, and specializes in mitigating Layer-7 and Secure Sockets Layer (SSL)-based attacks
Tags : mitigation platform, ddos threats, internet infrastructure, ssl based attacks, application-layer attacks
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Download this important report and learn why utilizing the expertise and resources of a cloud-based provider is the only sound solution.
Tags : cloud defenses, ddos attacks, cloud-based provider, cyber attacks, it management
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Versign OpenHybridTM is a Verisign DDoS Protection Services architecture that enables interoperability between on-premise and cloud-based platforms. An easy to use tool (Open API), allows customers to leverage existing security perimeter devices to signal threat information to the Verisign DDoS protection cloud, when the capabilities of the device are exceeded. Verisign OpenHybrid™ can also be applied to monitor and protect services hosted within other public and private cloud services.
Tags : api specification, cloud signaling, ddos attacks, threat visibility, risk mitigation
     Verisign
By: Verisign     Published Date: Jan 22, 2015
Distributed Denial of Service (DDoS) attacks are a threat to businesses worldwide and the attacks are getting larger and more sophisticated. The industry’s approach to protecting against DDoS attacks must change, and change fundamentally, to stay ahead of this growing threat. Read this blog today to find out how to stay ahead of these attacks!
Tags : ddos, ddos attacks, it security risk, risk mitigation, it management
     Verisign
By: Workfront     Published Date: Jan 22, 2015
Are workplace zombies killing productivity? Is frustration and discouragement spreading through your team like a virus? The Working Dead can show up in any workplace. You need to identify these zombies in your workplace and cure them before you have a workplace zombie apocalypse on your hands. Use this guide and learn how to: • Turn chaos into process • Unite team members around strategic priorities • Transform confusion into clear-eyed efficiency Bring your team back from the undead—back to doing the work they enjoy. Get this guide and start defending your office today!
Tags : workplace environment, strategic priorities, clear-eyed efficiency, productivity, time management
     Workfront
By: Workfront     Published Date: Jan 22, 2015
Does your team have enough time in the day? Is productivity difficult to define? Download this ebook to learn how to be more efficient as a team. In today’s fast-paced marketing environment, you are constantly being asked to increase productivity, report on what you’re working on, when it’ll be done and what’s next. At the same time there are frequent interruptions and new work requests while you’re juggling multiple tasks for multiple campaigns in various stages of completion. Sound familiar? Check out this ebook to learn about the top 10 productivity problems marketing teams face and strategies for how to solve them. Learn how to: • Manage interruptions effectively • Streamline approval processes • Efficiently juggle multiple work requests • Know resource availability to plan future work without overcommitting • Provide work measurement and accountability without breaking a sweat Get the ebook today!
Tags : productivity issues, marketing environment, increase productivity, team efficiency, enterprise applications
     Workfront
By: JumpCloud     Published Date: Jan 21, 2015
Learn how modern organizations are now easily implementing innovative directory services and the consequences some organizations face by not implementing one.
Tags : ldap, active directory, user management, iam, ssh access
     JumpCloud
By: SugarCRM     Published Date: Jan 20, 2015
After an initial rollout to more than 45,000 sales users, IBM wanted even greater insights. Thanks to the high usability of Sugar, IBM was able to increase sales data quality - which has gone on to power predictive sales analytics. Learn how IBM and SugarCRM are driving more effective sales teams.
Tags : sales analytics, data quality, sales, high usability, enterprise applications
     SugarCRM
By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : workforce mobility, manage and secure, business data, enterprise, collaboration solution
     Intralinks
By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : collaboration solutions, risk management, business productivity, it efficiency, business users
     Intralinks
By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : electronic communications, hipaa requirements, social networks, compliance, it management
     Actiance, Inc.
By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : electronic communications, public sector, social networking platforms, compliance, real-time communication
     Actiance, Inc.
By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : collaboration, social media risk and reward, retention regulations, data, business requirements
     Actiance, Inc.
By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : firewall, next generation, networks, computing, cloud
     Cisco
By: IBM     Published Date: Jan 09, 2015
Every organization must put a plan in place for recoverability after an outage, but testing your enterprise resilience without full business and IT validation is ineffective. Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading; understand why validating resilience demands involvement from IT and the business; and get details on the checks and balances you need to maintain and validate business resilience.
Tags : resiliency testing, it validation, business resilience, small-scale recovery simulations, it management
     IBM
By: IBM     Published Date: Jan 09, 2015
Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery, performance and scalability within its disaster recovery processes, and maximize backup performance and disaster recovery capabilities.
Tags : cloud computing solutions, service teams, cloud-based technology, it performance, it recovery capabilities
     IBM
By: IBM     Published Date: Jan 09, 2015
Organizations are largely relying on TCO and ROI models in determining whether or not to invest in a unified communications (UC) solution. But what other factors are they considering? You’ll better understand the value that firms are deriving from UC, the status of its adoption, and the barriers to full implementation.
Tags : ibm, mobile, network, capabilities, solutions
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search