Applications Whitepapers


Sort by: Date | Company | Title


The state of application delivery in 2015 report
By F5 Networks | 17/4/2015
F5 surveyed customers from more than 300 organisations across a broad spectrum of vertical markets such as banking and finance, telecommunications, public sector, and consumer products.
Download this now


PowerEdge R630 Delivers 10x the performance for Microsoft SQL Server
By Dell | 23/3/2015
When selecting a server for running your applications, a number of factors come into play, such as performance, response time, reliability, and available rack space. Those businesses seeking a space-efficient platform that provides excellent performance and mirrored resiliency would do well to consider the new Dell PowerEdge R630, a dense, 1U server designed to handle your complex and demanding enterprise applications.
Download this now


Solve the application visibility challenge
By Citrix Systems Asia Pacific | 12/1/2015
This report demonstrates how enterprises can leverage their existing footprint of market-leading application delivery controllers for both instrumentation and policy enforcement. · The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential · The challenge of establishing an effective application visibility and control function is only growing as tech trends become more widespread · A next-generation application visibility solution can efficiently and economically deliver unprecedented insight into virtual desktops, mobile and cloud services
Download this now


A revolution in cloud networking
By Citrix Systems Asia Pacific | 12/1/2015
This whitepaper explores how a multi-dimensional scaling strategy is requisite to building a service delivery fabric for optimising the delivery of web, mobile and cloud-based applications. · An enterprise cloud network is one that embodies the characteristics and capabilities that define public cloud services · Only software-based architecture enables businesses to scale up, scale out and scale in · Businesses can leverage the network as an enabling technology to improve IT agility and responsiveness when delivering applications and services
Download this now


Solve the application visibility challenge with NetScaler Insight Centre
By Citrix Systems Asia Pacific | 12/1/2015
The ability to observe, diagnose, and subsequently improve the performance of business-critical applications is essential to ensuring a positive user experience, but there are challenges to doing this effectively. •The challenge of establishing an effective application visibility and control function is only growing •The primary factor in the visibility challenge is a lack of correlation of the network to applications •Combining and streamlining these two factors will help troubleshoot existing performance problems and avoid future ones
Download this now


Application-Aware Storage for Virtual Environments
By Tintri | 9/1/2015
The main benefit of an application-aware storage model is that it allows the storage for each individual application to be managed and optimized independently, regardless of what other workloads and applications are present. Storage system features like high performance, balanced scalability, data reduction, and an application-aware management paradigm are critical to the efficient use of storage resources.
Download this now


Backup and recovery best practices with Symantec NetBackup and Tintri Vmstore
By Tintri | 9/1/2015
This Tintri Best Practices Guide for Backup and Recovery will assist individuals who are responsible for the design, deployment, and DR of Tintri VMstore™ Systems. This document will discuss best practices for deploying Symantec NetBackup for data protection leveraging vStorage APIs for Data Protection (VADP) for backups. It also discusses the use of Tintri’s SnapVM™, CloneVM™ and ReplicateVM™ features to complement data protection of virtual machines and critical applications hosted on Tintri’s VMstores with Symantec NetBackup.
Download this now


Application Usage and Threat Report
By Palo Alto Networks | 5/1/2015
The Application Usage and Threat Report (June 2014) provides a global view into enterprise application usage and the associated cyber threat landscape. Accomplished by summarizing network traffic assessments conducted across more than 5,500 organizations worldwide between March 2013 and March 2014. This version of the report will analyse the relationship between threats and their application vectors. The most surprising data points being both the diversity of applications displaying threat activity and the high concentration of activity surrounding only a few key techniques.
Download this now


The new rules of enterprise mobility
By IBM Australia | 28/11/2014
This white paper outlines the driving forces behind businesses establishing corporate application stores, the benefits of such an approach, and what to seek in a solution that supports this strategy. • The next wave of mobility is coming at us in the form of mobile applications. • Savvy companies are deploying commercial and custom mobile applications for their lines of business • Organisations must devise a viable strategy for managing the applications that employees will use on mobile devices
Download this now


A simplified application acceleration architecture
By F5 Networks | 12/11/2014
This whitepaper gives an overview of networks and applications, describes basic principles of web application optimization, and then examines the benefits and drawbacks of various acceleration techniques to ultimately improve web application performance. •Most organisations want to improve web application performance for their users, but they can’t always justify the cost of implementing acceleration techniques •A simplified web application acceleration solution that lowers the operational and commercial barriers and improves user experience is idea •F5 offers a simple, low-risk, and low-cost acceleration solution that can significantly improve the end-user experience
Download this now