> White Papers > Technology > Enterprise Applications

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 1 - 25 of 5488Sort Results By: Published Date | Title | Company Name
By: CenturyLink     Published Date: Oct 30, 2014
DevOps is a hot topic inside many Enterprise IT organizations today, because of the operational and development efficiencies it can bring. Join Gigaom Research and our sponsor CenturyLink for “DevOps, Weaving Development and Operations Together in the Enterprise,” a free analyst webinar on Thursday, October 30th, 2014 at 10 a.m. PT.
Tags : devops, centurylink, application integration, knowledge management, operations
By: IBM     Published Date: Oct 17, 2014
In this first-release MQ, Gartner evaluates providers on service delivery, B2B Network/Collaboration, Integration Functionality and success in capitalizing on vision. Rated against an extensive 15-criteria evaluation, IBM earned one of only three Leader positions, and outpaced the competition in "completeness of vision," signifying our strength in delivering the most competitive solution to the marketplace.
Tags : integration brokerage, service delivery, integration functionality, competitive solutions, it management
By: IBM     Published Date: Oct 17, 2014
According to a study from the Aberdeen Group, the number of companies starting initiatives for collaboration has doubled in the last two years. Their research indicates that collaborating with customers and collaborating with partners are both in the top five actions being taken by survey respondents.
Tags : internal collaboration, b2b collaboration, visibility, globalization, data management
By: IBM     Published Date: Oct 14, 2014
Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how to develop the type of network that truly supports mobile devices, applications and unified communications programs, thereby establishing the foundation for stronger mobile solutions.
Tags : mobile collaboration, mobile applications, mobile solutions, mobile infrastructure, it management
By: IBM     Published Date: Oct 14, 2014
Gives an insight into distributed denial of service (DDoS) attacks and defines a five-step process including preparation, mitigation, around-the-clock monitoring, response and intelligence to help address DDoS attacks.
Tags : ddos attacks, it security, ddos mitigation, security, it management
By: IBM     Published Date: Oct 14, 2014
Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.
Tags : it security breach, csirp, cyber threats, security, it management
By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : security operations, deployment, service delivery, problem management, security
By: IBM     Published Date: Oct 14, 2014
Flexible workplace forward thinkers are reporting productivity increases and cost decreases of 20% or more. Learn to achieve these benefits for your business by downloading the IBM executive report Achieving success with a flexible workplace: Forward thinkers’ best practices to enhance productivity, spur innovation and reduce costs. The report contains findings from a recent IBM survey covering user mobility, user support, collaboration and security.
Tags : flexible workplace, user mobility, user support, productivity management, it management
By: IBM     Published Date: Oct 14, 2014
This white paper, based on original IBM research with analysis by IDC, offers a Mobile Infrastructure Maturity Model and documents the best practices and characteristics of organizations that are leaders.
Tags : mobile technology, it strategies, mobile infrastructure, it management, mobile data systems
By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : it risk management, it security, resilience investments, enhanced brand value, security
By: IBM     Published Date: Oct 14, 2014
Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.
Tags : disaster recovery, dr in-house, outsourcing, knowledge management, business activity monitoring
By: IBM     Published Date: Oct 14, 2014
This white paper explores IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : service optimization, software defined environment, next-generation data center, data management, business analytics
By: IBM     Published Date: Oct 14, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : disaster recovery operations, cloud technologies, cloud computing, critical business aplplications, it management
By: IBM     Published Date: Oct 14, 2014
Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : it trends, data center strategies, cloud computing, mobile technology, it management
By: IBM     Published Date: Oct 14, 2014
Capitalizing on the transformative potential of private cloud requires leveraging the differentiators that will drive exponential value down the road. This IBM white paper discusses the core differentiators that drive transformative business value and to how best incorporate them into your environment, based on the latest research, technologies and solutions.
Tags : private cloud, business value, business agility, hybrid era, it management
By: SugarCRM     Published Date: Oct 10, 2014
Sugar UX™ fuses the seamless simplicity, mobility, and social aspects of a consumer app with the business process optimization of conventional CRM.
Tags : product, simplicity, mobility, consumer app, business process optimization
By: Code42     Published Date: Oct 10, 2014
Enterprise endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods. Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Due to the exploding volume, mobility and compliance requirements of enterprise data, the need to collect and preserve that data for the purpose of e-discovery becomes more critical—and more difficult. Traditionally, enterprises look to multiples tools and technologies to support their information management strategies, but that's a chaotic and expensive approach. Read this white paper to learn how the common approaches to e-discovery miss the mark and how CrashPlan endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : leverage, e-discovery, method, enterprise, backup
By: Code42     Published Date: Oct 10, 2014
New research dives deep into the trends and drivers for enterprise endpoint backup. The mobile mind shift is here, and as employees increasingly favor using mobile devices—both personal and company-issued—for work, enterprise IT must ensure data protection and enable user productivity. Let's face it—we're beyond the data center. Relying on traditional firewalls and local file shares is no longer enough when it comes to securing and backing up this critical data ""on the edge"" on your endpoints. A comprehensive data protection strategy means backing up data across an exceedingly fast-growing number of devices and operating systems. Get the latest backup trends (and what to do about them) in this study conducted by Forrester Consulting on behalf of Code42 in March 2014.
Tags : endpoint, backup, research, mobile, device
By: Code42     Published Date: Oct 10, 2014
Users always store business data on laptops and desktops, even when they shouldn’t. The adoption of corporate laptops and “bring your own device” only increases the amount of data stored on these endpoint devices, creating more complexity and greater challenges for IT departments mandated to safeguard the business from crippling data loss. Here’s the good news: data loss incidents can be more bearable if you know you’re doing everything possible to minimize your organization’s risk—which means sufficiently protecting all the corporate data and intellectual property stored on endpoints. Read the CrashPlan overview to learn about key CrashPlan features and see how CrashPlan enterprise endpoint backup can support data governance initiatives like legal holds.
Tags : enterprise, crashplan, endpoint, backup, department
By: Code42     Published Date: Oct 10, 2014
Full disk encryption is the ultimate data guardian on corporate endpoints. But when deployed without endpoint backup, it can also be the ultimate nightmare. Many organizations rely on full disk encryption to make data unreadable to unauthorized users. But without endpoint backup, the value of endpoint data is perpetually at risk. The right endpoint backup solution is necessary to ensure authorized users retain access to data should software or hardware fail. Download the executive brief to learn 8 considerations for choosing an endpoint backup solution that complements full disk encryption.
Tags : disk, encryption, data, backup, endpoint
By: Code42     Published Date: Oct 10, 2014
ESG Research shows only 38% of organizations have a formal process to back up the endpoint devices employees use to do their jobs. Gone are the days when protecting data meant simply backing up the corporate file server. The IT landscape has shifted, and now data is ever-more distributed. IT organizations are responsible for data protection regardless of device type or owner. If it's company data, IT must protect it. Read as Jason Buffington, senior analyst at ESG, discusses the evolution and quandary of distributed data caused by BYOD and mobile workforce policies. You'll also learn important considerations that reveal the differences between consumer- and enterprise-grade backup.
Tags : data, employee, endpoint, device, demand
By: Code42     Published Date: Oct 10, 2014
Eliminate data loss risk by protecting all enterprise information. Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : data management, enterprise, protecting, ballooning, risk
By: IBM     Published Date: Oct 10, 2014
Agile Development and DevOps emphasize quick feedback cycles. But how do we test non-trivial applications with many components? What do we do when some components are outside of our control, expensive to access, or simply not ready to test against? Delaying integration testing or running the tests infrequently is can cause problems to linger, quality to fall, and delivery delays.
Tags : agile development, composite applications, integration testing, it management, knowledge management
By: IBM     Published Date: Oct 10, 2014
Today’s competitive marketplace requires the organization to frequently release and deploy applications at the pace of user demands, with reduced cost, risk, and increased quality.
Tags : application release, application control, application deployment, it management, best practices
By: IBM     Published Date: Oct 10, 2014
Business needs, market trends, and customer demands are forcing IT teams to deploy applications at a rapid rate. The frequency of the deployments can invoke human errors, failed deployments, and outages. This paper will guide you through seven best practices that will strengthen the way applications are released to production.
Tags : release management, application management, market trends, application deployment, it management
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Sub-Categories: Application Integration, Application Performance Management, Best Practices, Business Activity Monitoring, Business Analytics, Business Integration, Business Intelligence, Business Management, Business Metrics, Business Process Automation, Business Process Management, Call Center Management, Call Center Software, Change Management, Corporate Governance, Customer Interaction Service, Customer Relationship Management, Customer Satisfaction, Customer Service, eBusiness, Enterprise Resource Planning, Enterprise Software, eProcurement, Extranets, Groupware Workflow, HIPAA Compliance, Incentive Compensation, International Computing, IP Faxing, IT Spending, Manufacturing Execution Systems, Marketing Automation, Performance Testing, Product Lifecycle Management, Project Management, Return On Investment, Risk Management, Sales & Marketing Software, Sales Automation, Server Virtualization, Simulation Software, Spend Management, Supply Chain Management, System Management Software, Total Cost of Ownership, Video Conferencing, Voice Over IP, Voice Recognition, Workforce Management

Search White Papers      

Related Topics

Application Integration
713 Documents
Application Performance Management
699 Documents
Best Practices
945 Documents
Business Activity Monitoring
459 Documents
Business Analytics
569 Documents
Business Integration
405 Documents
Business Intelligence
818 Documents
Business Management
808 Documents
Business Metrics
251 Documents
Business Process Automation
426 Documents
Business Process Management
528 Documents
Call Center Management
164 Documents
Call Center Software
133 Documents
Change Management
204 Documents
Corporate Governance
110 Documents
Customer Interaction Service
398 Documents
Customer Relationship Management
601 Documents
Customer Satisfaction
486 Documents
Customer Service
497 Documents
Data Management
1584 Documents
213 Documents
Enterprise Resource Planning
451 Documents
Enterprise Software
506 Documents
61 Documents
26 Documents
Groupware Workflow
55 Documents
HIPAA Compliance
110 Documents
Incentive Compensation
35 Documents
International Computing
109 Documents
IP Faxing
47 Documents
IT Management
1795 Documents
IT Spending
255 Documents
Manufacturing Execution Systems
68 Documents
Marketing Automation
145 Documents
807 Documents
Performance Testing
100 Documents
177 Documents
Product Lifecycle Management
189 Documents
Project Management
248 Documents
Return On Investment
438 Documents
Risk Management
300 Documents
Sales & Marketing Software
183 Documents
Sales Automation
122 Documents
Server Virtualization
470 Documents
Simulation Software
46 Documents
Spend Management
162 Documents
Supply Chain Management
147 Documents
System Management Software
154 Documents
Total Cost of Ownership
249 Documents
Video Conferencing
206 Documents
Voice Over IP
236 Documents
Voice Recognition
74 Documents
Workforce Management
175 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.