business applications

Results 226 - 250 of 1098Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: AppDynamics     Published Date: Sep 20, 2017
Cloud computing has been gaining momentum for years. As the technology leaves the early adopter phase and becomes mainstream, many organizations find themselves scrambling to overcome the challenges that come with a more distributed infrastructure. One of those difficulties is getting through a major cloud migration. It is one thing to roll out a few applications and cloud pilot projects, it is an entirely different challenge to start using the cloud across multiple lines of business at massive scale. That is the point that organizations are beginning to reach, and the time has come to take a serious look at cloud migration best practices.
Tags : 
migration, business, cloud, workload, performance applications
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 20, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
secure, performance, portable, architecture, software, hardware, java
    
AppDynamics
Published By: Telstra - APAC     Published Date: Mar 05, 2020
The evolving landscape of enterprise applications in multi-cloud and software-defined networks is changing the parameters for enterprise network connectivity. Network architects and managers are being challenged to review and update their network configurations to meet the needs of agile business processes. They are under pressure to do 'more with less' yet also have to ensure successful transitions to the cloud and high performance for business-critical applications. Register to receive 'The Buyer Guide' developed for Telstra by Ovum to address your current and future connectivity needs.
Tags : 
    
Telstra - APAC
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: TIBCO Software     Published Date: Mar 17, 2020
Your business teams need to manage and share vast amounts of data assets—master data, reference data, conformed dimensions, hierarchies, and metadata. The dynamism and sophistication of your data means you can no longer rely on simple office automation tools or outdated data management tools to manage these assets. You need TIBCO EBX™ software because it makes it so much easier to manage your data assets: Custom applications and purpose-built master data management (MDM) solutions are hard to change, but EBX software is flexible and agile. It uses a unique what-you-model-is-what-you-get design approach, with applications generated on-the-fly and fully configurable, eliminating the need for long, costly, and endless development projects. It includes all the enterprise-class capabilities you need to create data-driven applications. Data stewardship, workflow, data quality, and data integration are built right in. Get this whitepaper to explore all the features of EBX™ software and how i
Tags : 
    
TIBCO Software
Published By: CA Mainframe     Published Date: Sep 12, 2008
This White Paper discusses end-to-end application performance management in the context of the impact to the business. It then highlights CA’s application quality and performance manage­ment solutions for both Web and mainframe applications, with particular focus on the integration of CA Wily with AQM Solutions’ TRILOGexpert APCTM for TriTuneTM with Performance Desktop.  It concludes with the Enterprise Management Associates (EMA) perspective on the market in general, and on the CA solution in particular.
Tags : 
ca mainframe, application performace management, quality management, application quality, mainframe
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Business and IT executives should not have to choose between their desire to innovate for future growth and the desire to avoid disrupting current operations. Enterprise innovation that embraces and extends existing infrastructure and applications is possible through modern software architectures such as web services and SOA – as long as those investments perform competitively when measured against alternative platforms and they are able to be modernized to participate in these architectures.
Tags : 
ca mainframe, mainframe, infrastructure, architecture, platforms
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : 
srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe, ibm mainframe, storage optimization, mainframe storage, networking, platforms, storage
    
CA Mainframe
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : 
mobile, cloud, applications, apps, mobile apps
    
HP - Enterprise
Published By: Intermec     Published Date: Jun 20, 2013
Millions of new smart phones continue to ship every month, and many of them find their way into businesses to help workers do their jobs in innovative new ways. However, many of these same phones will be replaced within a year because they are not durable enough to work reliably in new enterprise work environments. In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
Tags : 
smart phones, durability, enterprise applications, ruggedness, reliability
    
Intermec
Published By: NetApp and VMware     Published Date: Jan 06, 2012
Experts discuss how customers can virtualize business-critical apps leveraging common resource pools as key elements to delivering IT as service and cloud computing.
Tags : 
netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection
    
NetApp and VMware
Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications, data management
    
Teradata
Published By: Genesys     Published Date: Oct 16, 2013
Earlier this year, Gartner released the 2013 Magic Quadrant for Call Center Infrastructure, an annual report that analyzes call center infrastructure vendors for completeness of vision and ability to execute. Explore and compare contact center solutions from today's top vendors and decide which solution is right for you. This is the fifth consecutive year that Genesys has been named a worldwide Leader for Contact Center Infrastructure. The Genesys Customer Engagement platform (referred to as the Customer Interaction Management or ‘CIM’ platform in the report), is the industry’s most complete platform on which companies can deploy an all-in-one, end-to-end scalable contact center Get the 2013 Gartner Magic Quadrant for Contact Center Infrastructure now!
Tags : 
contact centers, business value, functions, applications, inbound, outbound calling, social media analytics, integration tools, mobile crm tools, gartner magic quadrant, technology, enterprise applications, business technology
    
Genesys
Published By: NetApp     Published Date: Nov 20, 2014
As business requirements drive the need for a hybrid cloud strategy, companies must determine how best to run their applications and manage their data—whether in their private data center, near the cloud, or in the cloud. Hyperscale cloud providers offer excellent flexibility by allowing customers to buy raw resources in a consumption model by the hour.
Tags : 
hybrid cloud, applications, data management, private data center, consumption model, data center
    
NetApp
Published By: Dell     Published Date: Feb 02, 2018
Digital transformation is the process of creating value, growth, and competitive advantage through new offerings, business models, and business relationships that are data centric and data driven. It’s about changing the way that business gets done. This transformation also places IT at the forefront when making strategic business decisions related to redefining business processes and operational efficiencies, shifting work and employee productivity, changing customer relationships, increasing buyer loyalty, and transforming product and service revenue streams. IDC believes that IT organizations must assume a critical role in the forthcoming digital reinvention by assuming the position of being a critical business innovation platform.
Tags : 
    
Dell
Published By: Dell     Published Date: Feb 02, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives
Tags : 
    
Dell
Published By: Dell     Published Date: Feb 02, 2018
VxRail appliances, now leveraging industry leading Dell PowerEdge servers, support business critical applications and workloads in many configurations providing required reliability, availability, flexibility and performance. Every organization has its own set of business critical applications. For instance: - Database applications such as Microsoft SQL server and Oracle - Customer Relationship Management (CRM) applications such as SAP - E-mail applications such as Microsoft Exchange -Collaboration applications, such as Microsoft SharePoint Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta
Published By: Okta     Published Date: May 11, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
    
Okta
Published By: AWS     Published Date: Jun 15, 2016
The cloud is now the center of most enterprise IT strategies. Many enterprises find that a well-planned “lift and shift” move to the cloud results in an immediate business payoff. This whitepaper is intended for IT pros and business decision makers in Microsoft-centric organizations who want to take a cloud-based approach to IT and must modernize existing business-critical applications built on Microsoft Windows Server and Microsoft SQL Server. This paper covers the benefits of modernizing applications on Amazon Web Services (AWS) and how to get started on the journey.
Tags : 
    
AWS
Published By: Oracle ODA     Published Date: Aug 15, 2016
Businesses understand more than ever that they depend on data for insight and competitive advantage. And when it comes to data, they have always wanted easy access and fast performance. But how is the situation different now? Today, organizations want those elements and more. They want IT to strip away the limitations of time with faster deployment of new databases and applications. They want IT to reduce the limitations of distance by giving remote and branch offices better and more reliable access. And in a global world where business never stops, they want IT to ensure data availability around the clock. If IT can deliver databases and applications faster, on a more automated and consistent basis, to more locations without having to commit onsite resources, IT will be free to focus on more strategic projects.
Tags : 
    
Oracle ODA
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.