HIT Consultant Insightful coverage of healthcare innovation
 

legacy applications

Results 76 - 96 of 96Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability
    
MuleSoft
Published By: Riverbed     Published Date: Jun 02, 2015
Learn about the 3 critical evaluation activities to ensure migration success.
Tags : 
the cloud, legacy application, implementation, integration costs, legacy services, cloud migration, operational expenditure, capital expenditure
    
Riverbed
Published By: Delphix     Published Date: Mar 24, 2015
Many data centers are aging and organizations still use legacy applications, which drives up operational costs and limits the ability to upgrade software. Download this white paper to find out how Delphix Data as a Service can remove the biggest constraints and bottlenecks of your modernization projects.
Tags : 
    
Delphix
Published By: EMC Corporation     Published Date: Dec 01, 2014
Data is changing the way organizations manage, consume, and deliver storage. Many legacy applications, however, are still in traditional storage silos, where data is tied to specific vendor storage and not easily configurable and monitored. EMC ViPR is the lightweight, software-only solution that centralizes, automates, and transforms storage into a simple, extensible and open platform.
Tags : 
data protection, availability, disaster recovery, easy configurable, vendor storage
    
EMC Corporation
Published By: VMware, Inc     Published Date: Oct 30, 2014
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud solution built on vSphere®, which empowers government customers to leverage existing investments in applications and infrastructure. As a result, government agencies can avoid the cost and complexity of re-architecting and retraining sta for public cloud infrastructure that is radically dierent from what is in place today. Instead of operating a combination of onsite and osite IT environments and struggling to maintain both new and legacy applications and infrastructure, vCloud Government Service provides the right mix of internal controls with the ability to securely scale to meet demand for IT resources. As you contemplate migrating basic workloads and/or mission-critical and sensitive data to the cloud, be sure to address these top 5 considerations.
Tags : 
hybrid cloud solution, enterprise-class hybrid, applications and infrastructure, it environments, sensitive data
    
VMware, Inc
Published By: Micro Focus     Published Date: Aug 28, 2014
This white paper examines key approaches to application modernization and evolution for certain IBM mainframe applications with long life spans. It discusses the challenges of legacy applications and the available modernization approaches to handle these challenges. The paper also analyzes in some depth specific approaches that keep application logic largely intact or allow it to evolve incrementally and productively.
Tags : 
application modernization, mainframe applications, legacy applications
    
Micro Focus
Published By: Attachmate     Published Date: Feb 07, 2014
It’s time to rethink your move to mobility. Now your legacy mainframe applications—despite their infamous obstacles to integration—can play an active role in the mobility mix. And with Attachmate Verastream you don’t have to start from scratch, even when it comes to the most locked-down host applications. Watch this demo and learn three ways to exploit business mobility while your established mainframe systems continue to perform their everyday operations.
Tags : 
attachmate, verastream, mobility, legacy applications, host applications, business mobility, mobile enablement, legacy modernization
    
Attachmate
Published By: Attachmate     Published Date: Feb 05, 2014
Watch this video and find out how easy it can be to make your legacy mainframe applications work with new technologies. Using Attachmate Verastream, you can roll out integrated, fully functional applications tailored to each line of business. They get the modern capabilities they need and you get quick development cycles because you don’t have to change host application code. The demo breaks the process down into some basic steps that will help you breathe new life into your legacy mainframe assets.
Tags : 
attachmate, verastream, functional applications, development cycle, best practices, legacy applications, legacy systems, legacy modernization
    
Attachmate
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
In this case study, a company needed to find a way to update and improve a legacy trade portal application. With the help of Collaborative, using domestic resources, the company completely replaced several legacy trade portal applications, allowing for the retirement of several application platforms and legacy databases.
Tags : 
collaborative consulting, trade portal, right price, infrastructure, better application, business documentation, inspire engagement, financial metrics
    
Collaborative Consulting
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps
    
Palo Alto Networks
Published By: ExtraHop     Published Date: Jul 25, 2013
ExtraHop enables healthcare IT organizations to harness the massive amounts of wire data flowing through their environments. See how ExtraHop can help to manage departmental and legacy applications while also supporting new initiatives such as meaningful use, compliance, VDI, EHR/EMR, and mobile applications.
Tags : 
operations, wire data, extrahop, applications, storage, compliance, vdi, mobile applciations
    
ExtraHop
Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
What’s needed today is storage that’s flexible enough to be used for both legacy IT and virtual systems environments and repurposed as new needs arise. Storage must be quickly expandable and must enable data and applications to be easily and securely migrated, with workloads automatically rebalanced. Applications need to be online 24 x 7, so high availability is paramount. Management of the entire storage pool, as well as coordination with virtualized servers and networking, must be streamlined and simplified. This Tech Dossier reveals how HP Converged Storage can meet your organizations storage requirements.
Tags : 
converged storage, optimize, virtualization, cloud deployment, high availability
    
HP - Intel® Xeon® processors
Published By: HP - Intel®     Published Date: Oct 05, 2012
To cut costs and increase productivity, the Italian Ministry of Instruction, University and Research (MIUR) transforms its business-critical legacy applications with the help of HP.
Tags : 
application modernization, it infrastructure
    
HP - Intel®
Published By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : 
virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi
    
AMD
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning
    
Shavlik Technologies
Published By: ZSL Inc.     Published Date: Dec 16, 2008
This paper explains the constraints in using the legacy systems and the essential of modernizing the legacy systems and strategic alignment of IT with business. We have discussed different approaches towards modernizing the legacy systems and the ways to make your legacy modernization a success. Along the way, we have explained the benefits and possibilities of maximizing ROI and lowering TCOs by effectively modernizing your legacy applications and aligning IT and business practices.
Tags : 
zsl, legacy modernization, roi, soa, data management
    
ZSL Inc.
Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive
    
Aerohive
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
    
GlobalSCAPE
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : 
email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform
    
ColdSpark
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection
    
Secure Computing
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.