ca sm

Results 276 - 300 of 1759Sort Results By: Published Date | Title | Company Name
Published By: Epicor     Published Date: Apr 04, 2016
To succeed in today’s challenging climate, distributors must keep pace with change, manage the complexities of growth, and keep their current accounts happy while attracting new customers. Download this white paper to learn how you can smoothly and efficiently grow a modern, integrated distribution business that customers will love. You’ll discover the five goals you can pursue to ensure your company’s secure growth: • Attract and sell to eCommerce shoppers • Convert one-time shoppers into business accounts • Become the preferred supplier in your field • Optimize for business efficiency • Defend your current accounts
Tags : 
epicor, distribution, business efficiency, ecommerce, business technology
    
Epicor
Published By: Red Hat     Published Date: May 11, 2016
This IDC study represents a vendor assessment of the public deployment-centric cloud application platform component of the platform-as-a-service market through the IDC MarketScape model. This assessment discusses both quantitative and qualitative characteristics that explain a vendor's success in this market. This IDC MarketScape covers a variety of vendors participating in the deployment-centric subset of the overall platform-as-a-service market. The evaluation is based on a comprehensive and rigorous framework that assesses vendors relative to the criteria and one another and highlights the factors expected to be the most influential for success in the market, both short term and long term.
Tags : 
red hat, idc, paas, cloud, application, platform
    
Red Hat
Published By: CA Technologies     Published Date: Nov 02, 2016
Business moves fast. Customers demand now. You need to get ahead of it all. Markets are changing overnight, and the startups are disrupting the giants. The biggest risk you can take is to stand still. Do what you’ve always done and, you guessed it, you’ll be lucky to get the same results you’ve seen in the past. Odds are, those smaller, faster companies are going to sail right by.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Die Application Economy hat Unternehmen zu Umstellungen gezwungen. Unternehmen machen ausgewählte Daten und Anwendungen für Entwickler, Partner, Mobile Devices, die Cloud und das Internet of Things (IoT) zugänglich, um neue Wachstumschancen wahrzunehmen. Im Zuge dieser Umstellungen zeigte sich, dass Legacy-Daten in der Application Economy von Nutzen sein können, und zwar in einem solchen Ausmaß, dass sich durch die neue Art der Verwendung dieser Daten neue Umsatzchancen ergeben.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In recent years, the concept of “Anywhere, Anytime Computing” has become the common denominator in driving personal electronic device sales, as users are adopting to new categories of devices such as smartphones, tablets, and smartTVs. These devices enable consumers and employees to access information and services from almost any device at any time. Gartner studies show that the estimated mobile phone market is to reach 1.8 billion devices in 2013.
Tags : 
    
CA Technologies
Published By: Deluxe     Published Date: Mar 15, 2017
The financial services industry has been significantly impacted by the increasing use of technology from smartphones to wearables. This transformation in methods of transacting has enabled more personalized engagement, allowing customers to use multiple channels simultaneously to engage in seamless, multi-dimensional banking. This has also increased both the potential and complexity of creating a positive customer experience.
Tags : 
    
Deluxe
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
More than 400,000 workers at some 400 companies—including Polycom, Qantas and Toyota already use CA Project & Portfolio Management SaaS (CA PPM SaaS) to reduce costs, drive adoption and make smarter business decisions. Download this whitepaper today to find out more about how this solution can help your company today.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management. As we receive inquiry on this area increasingly, it makes sense to assess this market.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance To excel as resource manager, you need to quickly find the right talent to solve the right problems at the right time. CA Project & Portfolio Management (CA PPM) provides you with the modern resource management functions you need to maximize your company’s most valuable assets: the people. Modern, simple and powerful, CA PPM helps you work smarter by region, department, project, role and skill set.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Moderne Lösungen wie CA PPM bieten kontinuierlich Verbesserungen gegenüber IT-Anforderungsmanagementtools der vorigen Generation. Sie bieten immer wieder neue Funktionalitäten, um die Belastung des PMO, des Finanzmanagers, des Ressourcenmanagers und des Produktmanagers zu verringern. In den letzten Jahren haben neue Anbieter, die am großen und zunehmend einflussreichen Markt für das Projekt- und Portfoliomanagement (PPM) Fuß fassen möchten, Module entwickelt und in ihre SaaS-Plattformen integriert. Diese Anbieter behaupten, dass ihre Tools leicht zu installieren und leicht zu verwalten sind und ihren Kunden Geld sparen. Das klingt zu gut, um wahr zu sein. Und für die meisten Unternehmen ist es das auch.
Tags : 
    
CA Technologies EMEA
Published By: Excellus BlueCross BlueShield     Published Date: Aug 29, 2017
Learn how to protect your employees and your bottom line from poor oral health.
Tags : 
dental health, dental care, dental insurance, dental benefits, medical benefits, employee benefits, health insurance, employee health insurance, small business health insurance
    
Excellus BlueCross BlueShield
Published By: Cardinal Health     Published Date: Dec 28, 2017
Rising costs, declining reimbursements and the mandate to improve quality: these are key challenges that surgery centers face every day. For years, costs have continued to climb, while reimbursements have declined or, at best, remained stable. To address these issues and succeed in the future, surgery centers need to develop comprehensive plans that leverage both supply chain and clinical expertise. For many facilities, the next step is to conduct a clinical assessment that identifies new ways to improve inventory management and clinical practices. The heart of this approach from Cardinal Health is a clinical team that leverages OR and supply chain expertise to understand, prioritize and pursue opportunities for improving the health of patient and your practice alike. To learn more, read this case study and find out how two surgery centers have used a clinical assessment from Cardinal Health to improve performance.
Tags : 
    
Cardinal Health
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Applications and services are made up of more components and integrations today than they were just a few years ago. Coupled with a much more competitive business world, this complexity has changed everything for both development and operations. Devops is pressed to deliver more functionality at a faster pace, focusing on small, incremental changes and using agile methodologies and practices such as continuous integration. Download this white paper to find out more about how CA Technologies can help with many of the DevOps challenges your company currently face.
Tags : 
    
CA Technologies_Business_Automation
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Jul 07, 2015
This is the Key technical support considerations for smart IT infrastructures" White Paper.
Tags : 
infrastructure, big data, data center, scalability, reduce complexity, data management
    
IBM
Published By: IBM     Published Date: Oct 19, 2015
IBM InfoSphere Information Server connects to many new ‘at rest’ and streaming big data sources, scales natively on Hadoop using partition and pipeline parallelism, automates data profiling, provides a business glossary, and an information catalog, plus also supports IT.
Tags : 
ibm, infosphere, data profiling, business glossary, partition, pipeline parallelism, information server, data sources, hadoop, networking, data management, business technology
    
IBM
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus, business technology
    
Qualys
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
    
Optimizely
Published By: Rackspace     Published Date: Feb 01, 2019
Nearly nine in 10 enterprises have adopted a multi-cloud strategy, according to the latest RightScale State of the Cloud Report, and these enterprises use eight different clouds, on average. Increasingly, their cloud of choice is a public cloud. Every public cloud, however, is different. GCP is rapidly gaining users among companies of all sizes. Today, GCP’s customers include large global brands like Disney, eBay, HSBC, The Home Depot, Schlumberger and Verizon, and smaller ones like gaming platform Smash.gg and the Rhode Island School of Design, one of the nation’s leading arts and design institutions. Whether GCP is a good fit for your company depends on a multitude of factors. To find out what these are and how Rackspace can help your business, download this whitepaper today.
Tags : 
    
Rackspace
Published By: AppDynamics     Published Date: Sep 20, 2017
A microservice architecture provides benefits in the areas of service isolation and deployment as well as independent scalability. These benefits lead to more rapid release cycles and better use of available resources. But a microservice architecture also presents a host of new challenges in both deployment as well as performance management. The benefits to microservices far outweigh their challenges and, by identifying them early, you can plan for and ensure that your adoption of a microservices architecture goes smoothly.
Tags : 
microservice, management, business transactions, hybrid cloud, docker, environment
    
AppDynamics
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.