app services

Results 1 - 25 of 696Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Dans cette ère de disruption numérique incessante, les entreprises doivent améliorer leur agilité pour être prêtes à saisir les opportunités. Pour certains observateurs, les technologies du cloud semblaient être la solution idéale, capables d'apporter des réponses en matière d'agilité, d'évolutivité et de coût. Mais après avoir adopté ces technologies, les entreprises ont souvent constaté que les caractéristiques de performances, de sécurité et de conformité du cloud ne répondaient pas pleinement à leurs besoins. En outre, une idée reçue tenace laissait à penser que le cloud public était moins coûteux que le cloud privé, alors que nous savons maintenant que ce n'est pas toujours le cas. Les entreprises les plus avisées ont réalisé depuis longtemps que la plus grande agilité est proposée par les solutions d'informatique hybride, qui associent des services hors site et sur site.
Tags : 
    
Hewlett Packard Enterprise
Published By: Amazon Web Services     Published Date: Apr 28, 2018
Les technologies d'intelligence artificielle telles que l'apprentissage machine et le Deep Learning permettent d'obtenir des informations et de la précision à deux marques majeures dans des secteurs très différents : la santé et les assurances. Des théories sur les futures incidences de l'intelligence artificielle (IA) sur les entreprises et la société vont florissantes. Mais la réalité du terrain aujourd'hui pour les entreprises et les dirigeants appliquant des technologies comme l'apprentissage machine et l'apprentissage profond à leurs enjeux majeurs est déjà très enthousiasmante. Les modèles de fonctionnement sont refondés en se basant sur les informations obtenues de puissantes capacités cognitives. De nouveaux produits et services améliorent l'expérience client, voire la condition humaine. D'une façon très concrète et significative, l'IA change le monde pour le meilleur.
Tags : 
    
Amazon Web Services
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Dell EMC     Published Date: Feb 07, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: Genesys     Published Date: Feb 27, 2018
Everyone says they’re “in the cloud,” but most technology leaders would agree that not all clouds are created equal. When evaluating a cloud contact center solution for your business, it’s important to understand the difference between a true Cloud 2.0 application and traditional software, including which features to look for and why those features are important. Download this eBook and learn: • How a true Cloud 2.0 model is built to provide levels of reliability, scalability, flexibility and security that far exceed those of previous generations • The benefits of utilizing a platform built on microservices architecture • How to take your business to the next level with a built to scale cloud contact center platform
Tags : 
cloud contact center, ebook, cloud 2.0 model, microservices architecture
    
Genesys
Published By: NetApp     Published Date: Mar 06, 2018
This Hyper Converged Infrastructure solution brief describes the key benefits of NetApp's next generation HCI solution including enterprise scale, efficient storage architecture, trustworthy data services, and IT operations transformation.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
À l’heure où les entreprises traditionnelles s’emploient à copier les pionniers d’Internet sur le terrain de l’agilité et de l’innovation, le développement d’applications devient de plus en plus complexe. Tout d’abord, les codes source monolithiques sur lesquels reposent traditionnellement les applications d’entreprise ralentissent le lancement de nouveaux services. Quant au cloisonnement et à la dispersion des équipes opérationnelles et de développement, ils provoquent un manque de coordination des actions de chacun en interne. Et pour couronner le tout, les utilisateurs sont plus exigeants que jamais sur les questions d’expérience et de performance. Les entreprises doivent donc assurer une scalabilité efficace et un suivi attentif de leurs environnements. Le tout, bien entendu, sur fond de disponibilité à 100 % des services.
Tags : 
    
AstuteIT_ABM_EMEA
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
"Chrome Browser provides secure, trusted access to data, apps, and cloud services, connecting employees on any device to a new generation of powerful tools for work. With proactive securitymeasures protecting them while they work, users get a consistent, customizable experience whenever and wherever they access it."
Tags : 
    
Google Chrome Enterprise
Published By: Adobe     Published Date: May 15, 2018
2017 Trends in Financial Services and Insurance: Customer is Priority The FSI sector is progressing with a digital, data-driven, marketing mentality, all centered around prioritizing customer experience and taking a more personal approach. The 2017 Digital Trends in Financial Services and Insurance compiles the information shared by over 800 FSI respondents to see what opportunities and obstacles are shaping the future of FSI. Read this report and find out: How data and personalization drive digital transformation How fintech is leading the FSI chase Tips to help future-proof your FSI busines
Tags : 
    
Adobe
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
It’s More Difficult Than Ever to Deliver a Five-Star Experience. To truly capture customer interest and loyalty, your applications and services have to deliver reliable experiences that delight users, scale to support their changing needs and regularly refresh with new innovations. As a result, you need ways to measure the metrics that really matter, namely: engagement, loyalty and satisfaction. It’s also imperative that you match agility with quality, making application performance a priority goal for everyone—from the business to marketing to IT. Finally, you need to future-proof your business by rapidly adopting the latest technologies and innovations that will meet—and exceed— customers’ expectations.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Il est plus difficile que jamais d’offrir une expérience parfaite. Pour véritablement capter l’intérêt et fidéliser vos clients, vous devez les combler en leur proposant des applications et services fiables et capables d’évoluer pour répondre à l’évolution de leurs besoins. Pour ce faire, vous devez pouvoir mesurer des métriques pertinentes, à savoir l’engagement, la fidélité et la satisfaction de vos clients. Il est également impératif que vous associiez agilité et qualité, pour faire des performances de vos applications l’objectif prioritaire pour toutes les parties prenantes au sein de votre entreprise, des équipes métier au marketing en passant par l’IT. Enfin, vous devez préparer votre activité pour l’avenir, en adoptant rapidement les technologies et innovations les plus récentes qui permettront de répondre aux attentes de vos clients, voire de les dépasser.
Tags : 
    
CA Technologies EMEA
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Spend more time building great apps and less time managing server infrastructure. Get your solutions to market faster using Azure Functions, a fully managed compute platform for processing data, integrating systems, and building simple APIs and microservices. In this e-book you’ll find use cases, hands-on steps, and tutorials for quickly configuring your own serverless environments. Explore best practices for Functions, and learn how to: Develop event-based handlers on a serverless architecture. Test, troubleshoot, and monitor Azure functions. Automate administrative tasks from development through to deployment and maintenance. Integrate Functions with other Azure services. Build stateful serverless apps and self-healing jobs using Durable Functions. Download the 325-page serverless computing e-book and get access to dozens of step-by-step recipes for quickly building serverless apps.
Tags : 
    
Microsoft Azure
Published By: Adobe     Published Date: Mar 05, 2018
Governments are close, but fall short when meeting constituents' experiential needs online. People expect compelling, convenient experiences when engaging with their government online. According to research conducted by Adobe and the WPP Government & Public Sector Practice, the current approaches to digital government services can be improved.
Tags : 
    
Adobe
Published By: HPE APAC     Published Date: Jun 16, 2017
The bar has been raised higher than ever, and the role of IT is evolving to meet it. As a result, IT must support applications and services that make it possible for the business to provide new, diverse customer experiences while generating expanding revenues via the emergent crown jewels of business: big data, cloud, and mobility. Read on to find out more.
Tags : 
    
HPE APAC
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
Published By: HPE Intel     Published Date: Mar 14, 2016
The ever-rising tide of demands on IT organizations is creating constant pressure on their leaders to upgrade or replace their outmoded legacy systems with new infrastructure technologies that will allow them to keep pace with the speed of business. It is no longer sufficient to manage basic business applications and resources such as ERP, email, and silos of heterogeneous data. The bar has been raised higher than ever, and the role of IT is evolving to meet it. As a result, IT must support applications and services that make it possible for the business to provide new, diverse customer experiences while generating expanding revenues via the emergent crown jewels of business: big data, cloud, and mobility.
Tags : 
    
HPE Intel
Published By: HPE Intel     Published Date: Mar 15, 2016
Accelerate your journey to an all-flash data center with Hewlett Packard Enterprise Storage Consulting solutions. Slash costs and double performance with HPE 3PAR StoreServ All-flash arrays. Now you no longer need to choose which apps to take to flash; take them all and you won’t regret it. We deliver maximum performance, highest availability, Tier-1 data services, ease of management, and robust data protection at the lowest total cost of ownership (TCO) on the market when you engage with HPE Storage Consulting to provide an end-to-end all-flash solution.
Tags : 
    
HPE Intel
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
These are no longer capitally strained organizations building an application on a one-off basis, with the cloud this is enterprise transition, this is enterprise applications being shifted to the cloud, new applications being developed in the cloud, and this requires a completely new way of building and consuming IT services for the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Businesses in every sector are increasingly reliant on applications to handle everything from back-end operations to the delivery of new products, services, and customer experiences. That is why infrastructure system availability and the elimination of unplanned downtime are more important than ever before. Recent research has shown that the average cost of an hour of downtime is about half-a-million dollars,1 and this will only increase with the continued digitization of industries.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee