> Research Library > Technology > Enterprise Applications
 

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 351 - 375 of 2738Sort Results By: Published Date | Title | Company Name
White Paper Published By: NEC     Published Date: Aug 12, 2014
We consolidated nine legacy servers into one NEC Express5800/A2040b enterprise server, and proved real benefits of doing so. In this infographic, you’ll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel® Xeon® processor E7-4890 v2, offers just that.
Tags : 
consolidation, lab validation, report, servers, virtualization
    
NEC
White Paper Published By: ZSL Inc.     Published Date: Jul 20, 2009
Organizations have implemented enterprise applications such as ERP and CRM for business process execution but have failed to address the key enterprise asset: data. In the current economic environment, enterprises that fail to capitalize on their data assets jeopardize their cost structures and their earnings potential. It is vital for organizations to leverage their data assets to measure their business performance, identify the weak poles and strategic improvement spots to scale their business to new heights. Business Intelligence (BI), the recent innovation in IT, has emerged to be a potential hope for the organizations to build a strong business milieu without any new asset investments and utilizing the existing key assets of the organizations.
Tags : 
business intelligence, zsl, erp, crm, enterprise application
    
ZSL Inc.
White Paper Published By: Dynatrace     Published Date: May 20, 2016
The 2016 Digital Experience Report provides a comparative performance assessment for the largest companies across six major industries — banking, brokerage, insurance, media, retail, and travel.
Tags : 
dynatrace, devops, digital experience, customer experience, digital interactions
    
Dynatrace
White Paper Published By: VMware AirWatch     Published Date: Nov 12, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : 
mdm, containerization, security, enterprise mobility, enterprise applications
    
VMware AirWatch
White Paper Published By: IBM     Published Date: Jan 09, 2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Tags : 
best practices, it security, cloud infrastructure services, it business solutions, knowledge management
    
IBM
White Paper Published By: ShoreTel     Published Date: Oct 26, 2012
Today's IT investments require bottom-line, quantifiable truths and Unified communications (UC) is no exception. This whitepaper covers best practice tips on building a comprehensive business case for UC systems.
Tags : 
shoretel, unified communications, return on investment, uc solution, productivity
    
ShoreTel
Webinar Published By: IBM Smarter Analytics     Published Date: Sep 04, 2013
Organizations that have virtualized their environments are discovering that the journey's not over. In many ways, it's just beginning. The full benefits of virtualization -- from cost savings and increased speed to resource transparency and control -- can only be fully realized by optimizing all of the interdependent components. In this webcast, IBM leaders discuss how organizations can get more from their virtualization investments with best practices gleaned from years of transforming traditional data centers and building world-class clouds.
Tags : 
virtualization, best practices, optimizing, ibm webinar, traditional data
    
IBM Smarter Analytics
White Paper Published By: F5 Networks Inc     Published Date: Nov 20, 2008
Best practices for a Microsoft Hyper-V Dynamic Data Center in an HP BladeSystem environment.
Tags : 
microsoft hyper-v dynamic data center, hp bladesystem, hyper-v, microsoft, adaptive infrastructure
    
F5 Networks Inc
White Paper Published By: Oracle     Published Date: Aug 15, 2013
RightNow's focus on integration; streamlined handoffs between low-assisted, medium-assisted, and high-assisted interactions; and focus on agent productivity arm companies with what they need to improve their customer service on an ongoing basis.
Tags : 
best practices, customer service, oracle, crm, rightnow
    
Oracle
Webinar Published By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices
    
Salesforce
Webinar Published By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices
    
Salesforce
White Paper Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs
    
Alert Logic
White Paper Published By: Red Hat     Published Date: Nov 30, 2015
A step-by-step guide for adopting software-defined storage as part of a practical, proactive strategy for managing enterprise data. Flexibility is inherent in this technology, and now more than ever, a flexible IT architecture might be the key to facing the once unthinkable challenges of big data.
Tags : 
software-defined storage, enterprise data, it architecture, big data, enterprise applications
    
Red Hat
White Paper Published By: SolarWinds     Published Date: Aug 04, 2015
How-to easily manage storage performance, capacity, and cost.
Tags : 
storage management, multi-vendor storage, data center, optimize storage, storage capacity
    
SolarWinds
White Paper Published By: Oracle Corporation     Published Date: May 11, 2012
By using the Oracle Exadata Database Machine as your data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading.
Tags : 
oracle, data warehousing, database, exadata, database machine
    
Oracle Corporation
White Paper Published By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance
    
Smarsh
White Paper Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration
    
Quest Software
White Paper Published By: Soffront     Published Date: Aug 21, 2009
In the decade since customer relationship management (CRM) software first appeared on the market, implementation of the enterprise application suite that helps businesses find new customers, retain existing customers and otherwise increase revenues have gained a reputation as being risky ventures, subject to user rejection, cost overruns, and missed deadlines.
Tags : 
crm, customer relationship mangement, crm software, crm application, crm app
    
Soffront
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : 
maas360, ibm, fiberlink, mobile application, lifecycle management
    
IBM MaaS360
White Paper Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload
    
Evident.io
White Paper Published By: Qualys     Published Date: May 07, 2014
Learn the 8 best practices for selecting a Vulnerability Management solution and see how you can select the right solution for your organization’s needs.
Tags : 
qualys, vulnerability management, vm solution, security solutions, vm choices
    
Qualys
White Paper Published By: Qualys     Published Date: Jun 03, 2015
Learn the 8 best practices for selecting a Web Application Scanning solution and see how you can select the right solution for your organization’s needs.
Tags : 
qualys, web application scanning, was solution, security solution, was choices
    
Qualys
White Paper Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication
    
Actiance, Inc.
Webinar Published By: Polycom     Published Date: Oct 31, 2014
Description: Microsoft Solution Architects discuss the top considerations when adding Microsoft Lync video to your network. You have Microsoft Lync for IM and Presence. Maybe you also use Lync for Enterprise Voice. Video is a logical next step. This webinar will cover how to prepare your network and your organization for Lync video. Topics covered were: What to consider when deploying video, learn about real customer successes and missteps with Lync video deployment and services available to assist with the readiness of your network.
Tags : 
best practices, network, services, topics, architects
    
Polycom
White Paper Published By: VMware AirWatch     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : 
mdm, containerization, security, enterprise mobility, enterprise applications
    
VMware AirWatch
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee