legacy

Results 276 - 300 of 578Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 25, 2018
A collaboration between IBM and CLS, the largest provider of settlement and risk mitigation services for the global foreign exchange market, showed how financial institutions can reap blockchain’s benefits by managing and minimizing risks to the existing business. Instead of a wholesale approach of replacing existing systems, new functionalities were gradually embedded into current processes, moving data from legacy systems to the new blockchain solution operating in parallel. Read this report to learn more about the ongoing CLS-IBM blockchain initiative and what drives the success of its commercial implementation. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: Intel     Published Date: Sep 20, 2019
More data means more opportunities to discover powerful, actionable insights around customers, internal processes, and the broad market. Unfortunately, legacy IT architectures and approaches can block progressive analytics efforts. That leaves a lot of room for improvement, and the learning and investment curve for starting in analytics can be steep. However, tending to three core steps will prove immensely helpful on this journey: • Establishing an organizational foundation • Mapping the data pipeline • Transitioning analytics proofs of concept into production
Tags : 
    
Intel
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
Ongoing shifts in labor trends have made people strategy a top priority for business success. This Brandon Hall Group brief reveals that disjointed legacy HR systems stitched together and packaged as “cloud” don’t meet the needs of today’s mobile workforce. Are you leveraging a truly complete HCM cloud suite to meet modern business needs?
Tags : 
    
Oracle HCM Cloud
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
Palo Alto Networks
Published By: Amazon Web Services     Published Date: Jan 23, 2018
SAP® customers who have long envied the many operational and cost benefts promised by cloud computing can now confdently pursue “cloud-frst” strategies. Companies that have made this move in collaboration with a leading company like Amazon Web Services (AWS) aren’t looking back. No longer bound by the constraints and overhead of legacy infrastructure, they’re pursuing new ways in which AWS-based SAP deployments can further their strategic goals and increase their competitiveness. Provided by: AWS & Intel
Tags : 
sap, customers, aws, cloud, organizations, applications
    
Amazon Web Services
Published By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon® support for published applications provides exciting new opportunities for customers running Citrix XenApp. Tightly integrated with Microsoft Remote Desktop Services (RDS), VMware Horizon is a new option for delivering not just published applications and shared desktops, but also virtual desktops, software as a service (SaaS), and virtualized applications to the devices your end users want to use. This white paper provides guidance for planning and undertaking a migration from Citrix XenApp to VMware Horizon. Four approaches to XenApp migration are detailed, including the major steps required for their implementation. Whether the goal is to migrate an existing XenApp infrastructure to Horizon, replace it with a new system, or simply integrate legacy Citrix infrastructure with your Horizon virtual desktop deployment, VMware has the innovative products and technology you need.
Tags : 
citrix, xenapp, vmware, horizon, applications, customers, integration, software
    
VMware Citrix
Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Your goal is high availability for the applications, databases, virtual machines (VMs), servers, and data that run your business. When access is lost or interrupted, recovery speed is critical, and must be measured in minutes and seconds, not hours of days. And if your backup and recovery strategy includes point solutions with limited coverage, legacy approaches that don't support today's modern technologies, or manual proc cesses that are time-consuming and complex, you may not be ready when disaster strikes.
Tags : 
    
Commvault ABM Oct
Published By: Cisco     Published Date: Jul 08, 2016
Whirlpool Corporation had to transform its business. A legacy network stood in the way. Read more to learn how standardization on a Cisco® platform opened innovation floodgates.
Tags : 
    
Cisco
Published By: MarkLogic     Published Date: Nov 07, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
    
MarkLogic
Published By: Oracle OMC     Published Date: Nov 30, 2017
Since the theme of this brief is to keep things simple, let’s be as simple and plain as possible: The customer experience (CX) is broken because the marketer experience is broken. However, it’s not entirely marketing’s fault. Legacy technology provides only a distorted view of the customer. That’s what creates the broken experiences. It’s the same technology that—while providing rich behavioral, demographic, and preference data—does not allow for silos of data to be shared across channels.
Tags : 
    
Oracle OMC
Published By: BMC ESM     Published Date: Aug 20, 2009
IT infrastructures have become exceedingly complex, resulting in a highly interconnected network of old and new technologies. In a world where IT budgets are shrinking and mergers are common, how do you get the most value from your IT resources?
Tags : 
it costs, it resources, it infrastructure, it budget, spend management, bmc, mergers, podcast
    
BMC ESM
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
This informative guide highlights valid reasons for considering a fixed asset solution and offers advice and useful tips for each stage throughout the evaluation process.
Tags : 
fixed asset management solution, ram, evaluation guide, risk analysis assessment, planning, erp, ledger, spreadsheets
    
Real Asset Management Inc.
Published By: nimsoft     Published Date: Apr 10, 2012
In the past few years, the enterprise computing landscape has changed dramatically. Changes such as virtualization and cloud computing are rendering legacy monitoring tools virtually useless. This paper explores today's computing trends and their monitoring implications in detail. It also introduces solutions that address the monitoring needs of tomorrow's enterprises.
Tags : 
nimsoft, monitoring, business technology, technology, it management, service, application, analytics
    
nimsoft
Published By: Infoblox     Published Date: Nov 07, 2013
Network management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today’s complex networks. Read this white paper to learn why implementing network automation is critical to managing your network
Tags : 
infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
Automation tools are available to network teams, but most still use legacy techniques to manage their network. Read this white paper to learn how network automation helps organizations automatically detect, track and archive change and configuration of their network.
Tags : 
infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri
    
Infoblox
Published By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : 
virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi
    
AMD
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This document is intended to provide pointers for administrators who are currently running HP-UX Virtual Partitions on legacy, cell-based systems, and who are considering upgrading to HP-UX vPars version 6.1.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors
Published By: Plex Systems     Published Date: Jun 06, 2014
Manufacturers have legitimate questions when contemplating a transition from a legacy, on-premise ERP solution to a cloud ERP system. Cloud ERP solutions have proven their viability and superiority when compared to on-premise competitors when it comes to security, businesscontinuity, cost and other factors.
Tags : 
plex systems, faster usability, operations, erp, cloud, production, manufacturing
    
Plex Systems
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Epicor     Published Date: Jul 06, 2017
It’s hard to make good decisions without good information. Having access to data, and the tools to quickly analyze that data, is essential. Without data, you are blind to how your business is performing and areas for improvement—all you have to go on is instinct. A robust business intelligence (BI) system can provide new insights to help steer your distribution organization clear of obstacles that impede growth—and toward the opportunities that enable it. A monthly report just doesn’t cut it anymore. You need real-time information, and if you’re running legacy software, it’s probably slowing you down.
Tags : 
erp software, enterprise resource planning software, business intelligence, distribution, inventory management, distribution software
    
Epicor
Published By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. “Legacy” manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: • Duplicate or inaccurate data • Clunky system performance • Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : 
erp, manufacturing, industry 4.0
    
Epicor
Published By: CA Technologies     Published Date: Feb 13, 2015
Service management platforms have a vital role to play, but in most organizations, they’re not living up to expectations—delivering far too much complexity and cost, and far too little business value and time savings. This proves true even in organizations that have migrated to new solutions in recent years. This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desk, service management, service platforms, cloud service, cloud service manegement, business value
    
CA Technologies
Published By: NextGen     Published Date: Jan 29, 2015
Congratulations! You're on the right path toward a more flexible, powerful HIE solution (and greater peace of mind). The thought of moving to a new HIE solution can be tough. But as one of our new replacement clients, Rob Hack, Executive Director at HealtheConnections, recently said "The risk of doing nothing was far greater than the risk of making a switch." Hear some real client examples in our next communications.
Tags : 
mirth, data, healthcare, practitioners, insurers, billing/scheduling, systems, health
    
NextGen
Published By: NetApp     Published Date: Sep 22, 2017
Native all-flash arrays offer a number of benefits over flash appliances or legacy array retrofits. These software-centric solutions help eliminate the bottlenecks created by traditional disk architectures that have only been adapted for flash. This video presents six key architectural design decisions and tradeoffs to help you choose the right native all-flash array for your business.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, all-flash
    
NetApp
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching
    
Waratek
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.