service applications

Results 1 - 25 of 566Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network. Read this white paper to learn how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers: • Simplified security • Lower latency and better performance • Fewer broken web pages and applications"
Tags : 
    
Akamai Technologies
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
The rise of microservices has been a remarkable advancement in application development and deployment. Moving to a microservices-based approach makes app development faster and easier to manage, requiring fewer people to implement more new features. Microservices are a critical part of a number of significant advancements that are changing the nature of how we work. Agile software development techniques, moving applications to the cloud, DevOps culture, continuous integration and continuous deployment (CI/CD), and the use of containers are all being used alongside microservices to revolutionize application development and delivery. In this ebook, you’ll take away with pro-tips on how to solve many potential development problems before you even start writing code.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Group M_IBM Q1'20     Published Date: Jan 03, 2020
Do you have a cohesive data strategy and architecture to derive insights from all your data sources? Watch the webinar to learn about the new IBM Cloud Pak for Data System, a cloud-native Data and AI platform-in-a-box that provides a pre-configured, governed and secure environment to collect, organize and analyze data. Built on the Red Hat® OpenShift® Container Platform, IBM Cloud Pak for Data System enables you to take advantage of a broad set of data and AI services and integrate them quickly into applications to accelerate innovation."
Tags : 
    
Group M_IBM Q1'20
Published By: Digital Realty     Published Date: Jan 15, 2020
Gartner research indicated 72% of organizations are planning to utilize cloud services for financial applications in the next three years.1 Financial organizations of all sizes are opting for cloud-based solutions that streamline business analytics, transactional systems of record, and enterprise business applications. But “moving to the cloud” is no small task and comes with its own set of unique challenges and considerations. As an industry, financial services has found balance by using a cloud strategy that blends both public and private cloud models. Hybrid cloud solutions have been hailed for optimizing efficiencies, cutting costs, and satisfying compliance and regulatory standards. Digital Transformation (DX) has been the driving force behind fastpaced changes in system infrastructure and processes, and financial services organizations have had to keep an open mind. While the prospects sound promising, it’s important to note that hybrid cloud implementation is not without obsta
Tags : 
    
Digital Realty
Published By: Genesys     Published Date: Jan 13, 2020
Centers are no longer “call centers.” They are “contact centers” operating in an omnichannel world. They must handle a growing array of contacts that go well beyond phone calls to include email, chat, text/SMS, social media and more. They need robust performance management capabilities that ensure a great customer experience and employee engagement. And they must move fast — with agility at the micro level for handling each contact and at the macro level to respond to new business needs and market trends. Contact centers must look at different customer service technologies that enable them to go far — fast — building applications that leverage APIs or extending solutions in a variety of ways through integrations and application marketplaces. Download this white paper to learn: How to overcome the legacy of “build vs. buy” Advantages and disadvantages of each approach Specific use cases for each option
Tags : 
    
Genesys
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union
    
Vision Solutions
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Speed time-to-value, improve end user experience of customer service applications.
Tags : 
user experience, time-to-value, customer service, applications, infrastructure, saas
    
HP AppPulse Mobile
Published By: HP     Published Date: Dec 03, 2015
Service virtualization tools simulate software components so end-to-end testing can proceed even when dependent components are not available. That means teams can perform integration tests sooner and more often, accelerating the delivery of high-quality, thoroughly tested applications.
Tags : 
service virtualization, software, testing, integration tests, applications, networking, it management, data management
    
HP
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"In today’s Idea Economy, businesses need to turn ideas into services faster. Every new business and established enterprise is at risk of missing a market opportunity and being disrupted by a new idea or business model. It has never been easier, or more cru cial, to turn ideas into new products, services, or applications —and quickly drive them to market. But IT needs an infrastructure that enables them to partner with the business to speed the delivery of services."
Tags : 
    
Hewlett Packard Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 22, 2019
Mirazon improves service delivery and customer experience for cloud and virtualization services supported with fiber Internet. A scalable cost model provides the flexibility to serve clients large and small. Mirazon also provides faster response and problem resolution for off-site client backup and managed service solutions, and uses reliable, high-network quality Unified Communications applications to improve customer collaboration.
Tags : 
    
Spectrum Enterprise
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Digital transformation (DX) — a technology-driven business strategy — enables firms to gain or expand their competitive differentiation by embracing data-driven decision-making processes, whether for increasing operational efficiencies, developing new products and services, increasing customer satisfaction and retention, or getting a better intelligence on the market. Big Data and analytics (BDA) applications form the foundation for enterprisewide digital transformation initiatives. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise
Published By: Red Hat     Published Date: Aug 22, 2018
In the emerging digital enterprise, there’s a good chance some application development will be taking place outside the information technology department. It’s not that the role of IT is in any way being diminished – in fact, IT managers are getting busier than ever, overseeing the technology strategies of their enterprises. Rather, the pieces are in place for business users to build and configure the essential business applications they need, on a self-service basis, with minimal or no involvement of their IT departments. As the world moves deeper into an era of ongoing disruption from digital players – be they startups, or teams within established enterprises – technology has become an essential part of every job, from the boardroom to the boiler room. Accordingly, the discipline of IT is no longer confined to the data center or development shop. Many business managers and professionals are building, launching or downloading their own applications to achieve productivity and respond
Tags : 
    
Red Hat
Published By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
Financial Force
Published By: Cisco     Published Date: Jun 21, 2016
The demands on IT today are staggering. Most organizations depend on their data to drive everything from product development and sales to communications, operations, and innovation. As a result, IT departments are charged with finding a way to bring new applications online quickly, accommodate massive data growth and complex data analysis, and make data available 24 hours a day, around the world, on any device. The traditional way to deliver data services is with separate infrastructure silos for various applications, processes, and locations, resulting in continually escalating costs for infrastructure and management. These infrastructure silos make it difficult to respond quickly to business opportunities and threats, cause productivity-hindering delays when you need to scale, and drive up operational costs.
Tags : 
    
Cisco
Published By: HPE     Published Date: Feb 11, 2015
Protecting your business-critical applications without impacting performance is proving ever more challenging in the face of unrelenting data growth, stringent recovery service level agreements (SLAs) and increasingly virtualized environments. Traditional approaches to data protection are unable to cost-effectively deliver the end-to-end availability and protection that your applications and hypervisors demand. A faster, easier, more efficient, and reliable way to protect data is needed.
Tags : 
    
HPE
Published By: HPE Service Virtualization     Published Date: Aug 18, 2016
Service virtualization offers a solution. Service virtualization tools simulate software components so end-to-end testing can proceed even when dependent components are not available. That means teams can perform integration tests sooner and more often, accelerating the delivery of high-quality, thoroughly tested applications.
Tags : 
service virtualization, software, testing, integration tests, applications, networking, it management, data management
    
HPE Service Virtualization
Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch
Published By: Pega     Published Date: May 25, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding each vendors’ CRM Customer Engagement Center solutions.
Tags : 
best practices, customer support, business intelligence, business optimization, customer engaement
    
Pega
Published By: Infosys     Published Date: May 30, 2018
The digital world has made it possible for enterprises to reach, and deliver services to customers near and far through mobile applications. However, regular and rapid rollout of features and new versions across geographies and different operating systems call for flawless applications and mobile app testing capabilities. A chemical giant wanted to deliver agriculture data and services to their farmer clients across geographies through their mobile applications. See how Infosys helped and the five key takeaways from the project.
Tags : 
    
Infosys
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
    
Dell EMC & Intel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.