business applications

Results 301 - 325 of 1018Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: BMC Control M     Published Date: Sep 15, 2009
This paper, from industry analyst firm Enterprise Management Associates, explores how workload automation can help IT reduce outages, consolidate vendors, improve integration, and cut costs. Learn more. Download the white paper, "IT Automation: Going Beyond the Obvious to Find Real Cost Savings."
Tags : 
bmc control-m, enterprise management associates, workload automation, wla, peoplesoft, sap, oracle, as/400, openvms, extract-transfer-load, etl, business service managemen, bsm, service level managemen, slm, mainframe, windows, unix, linux, custom applications
    
BMC Control M
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security
    
Fortinet, Inc.
Published By: Citrix Systems     Published Date: Jul 28, 2015
In this white paper we will discuss: • Why data center limitations are restricting business agility. • How Cisco Application Centric Infrastructure (ACI) supports frequent changes in applications and infrastructure. • How Cisco and Citrix® have integrated NetScaler® with ACI to improve data center agility.
Tags : 
    
Citrix Systems
Published By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Published By: Data Stax     Published Date: Oct 14, 2016
Financial services companies engage with customers across multiple channels and across a range of financial products. This wealth of customer information is often stored in isolated data silos. Building a 360° view of the customer can directly impact customer experience and help banks grow customer retention, upsell products and provide compelling interactions. This paper examines the challenges these institutions face when creating a 360° view of every customer interaction, what database requirements the lines of business should look into, and use cases to benefit from by leveraging DataStax Enterprise, the database platform purpose built to power cloud applications.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Data Stax
Published By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : 
microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications, data-centric business, microsoft office, microsoft sharepoint, mission-critical enterprise, business processes, bring-your-own-device, line-of-business, .net framework
    
Microsoft
Published By: Red Hat     Published Date: Jul 17, 2014
As a strategic partner in your business, you need to respond to growing business demand. Unfortunately, you face several challenges. Your complex IT environment is costly to manage and has a high downtime risk. Most of your resources and budget likely go to maintaining the stability, security and reliability of your IT system. Your organization might lack the processes needed to confidently manage support issues, IT transitions and new application deployments. In this whitepaper you will read about how to maximize uptime, reduce management costs, and quickly respond to business demands.
Tags : 
business demand, security, it transitions, new applications, it systems, efficiency, maximize uptime, manage costs, enterprise applications
    
Red Hat
Published By: NetApp     Published Date: Sep 11, 2014
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications.
Tags : 
workload characterization, mission-critical applications, usable capacity, ssd rebuild times
    
NetApp
Published By: AppDynamics     Published Date: Sep 21, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet-accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
    
AppDynamics
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Oct 06, 2015
A detailed TCO evaluation shows cloud-based solutions can deliver significant savings compared to on-premises business applications.
Tags : 
mid-market enterprises, small business, cloud-based solutions, tco benefits, cloud computing, business applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: ServiceNow     Published Date: Mar 24, 2015
Your organization, like every other, must grow to survive, and is dependent upon its IT infrastructure to do that. Your organization, like every other, is also dependent upon some custom-built applications, since none can survive or grow by relying solely on unmodified off-the-shelf solutions. And custom applications require IT guidance and resources to be built, deployed and maintained. But your organization must also curb or eliminate growth in IT related costs and operational challenges.
Tags : 
it infrastructure, custom-built applications, it guidance, it related costs, business applications, it management, enterprise applications
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 24, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use the Web apps they use at home. Integration remains difficult, because it's sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
future it, service automation, it workload, integration, data centers, mobile devices, software-as-a-service, web apps, it management, enterprise applications
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 24, 2015
Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services and other resources, and then to consolidate those worth keeping, migrate those worth updating, and retiring the rest. And that consolidation delivers multiple business benefits. Key among these: a single interface to multiple tools and resources, and more agile global operations. With the right practices, policies and technology platform, your enterprise can accomplish these goals in ways that accelerate growth, cut costs and complexities, and enhance competitiveness.
Tags : 
consolidation, business transformation, single interface, business applications, business benefits, it management, enterprise applications
    
ServiceNow
Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron
Published By: K2     Published Date: Aug 24, 2015
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud-hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
    
K2
Published By: K2     Published Date: Oct 08, 2015
Read to learn more about how K2 blackpearl can help make the challenge of rebuilding your business applications more manageable.
Tags : 
    
K2
Published By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management
    
MuleSoft
Published By: MuleSoft     Published Date: Jan 25, 2016
APIs are a strategic business necessity, but with the rising cost of API security breaches, it's important to develop a security strategy alongside an API strategy. This whitepaper will lay out the top security concerns around APIs, how the IT industry is addressing them, and how Anypoint Platform, MuleSoft's enterprise application integration platform, can keep your APIs safe and secure.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
MuleSoft
Published By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture
    
MuleSoft
Published By: MuleSoft     Published Date: May 17, 2016
MuleSoft surveyed 802 IT decision makers (ITDMs) globally to assess how organizations of all sizes are executing on digital transformation initiatives, IT challenges and the role of APIs to meet business goals. The survey results reveal challenges that are hindering IT’s ability to achieve digital transformation fast enough. Just 18% of ITDMs are very confident that they will succeed in meeting this year’s digital transformation goals. IT challenges are not only slowing down their ability to complete digital transformation goals this year, but they are also directly putting business revenue at risk. In fact, 66 percent of ITDMs said that their company’s revenue would be negatively impacted within six months. However, the survey found that IT teams are looking to APIs and reuse of existing applications, data and digital resources to speed up the pace of business.
Tags : 
mulesoft
    
MuleSoft
Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: IBM     Published Date: Nov 10, 2016
Within any organization, business content – applications, forms, reports, office documents, audio, video, and social media – is poorly managed and often out-of-reach of critical business processes. And, when business content is invisible, unclassified or unmanaged, it creates chaos. Content chaos causes a breakdown in the flow of information between an organization and its customers, its partners and even within itself – failures that often impact customer engagement, business agility, and the capacity to collaborate securely and effectively. It's time you learn how to put your business content to work.
Tags : 
ibm, analytics, ecm, business cost, business process, enterprise applications, business technology
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee