RSS feed Get our RSS feed

News by Topic

application focused

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
By: Anaplan     Published Date: Mar 12, 2019
Financial planning and analysis (FP&A) professionals have witnessed evolutionary changes in budgeting, planning, forecasting, and analysis processes. Through innovative advancements in technology and the application of big data within these processes, the FP&A function is empowered to transform into a strategic business partner. In “The Rise and Rise of FP&A,” a paper written by FSN and sponsored by Anaplan, you will learn about: -The evolution of the FP&A function -How FP&A teams harness big data and close the talent gap -Why FP&A can become a top contributor to forward-focused decision-making
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 12, 2019
Financial planning and analysis (FP&A) professionals have witnessed evolutionary changes in budgeting, planning, forecasting, and analysis processes. Through innovative advancements in technology and the application of big data within these processes, the FP&A function is empowered to transform into a strategic business partner. In “The Rise and Rise of FP&A,” a paper written by FSN and sponsored by Anaplan, you will learn about: -The evolution of the FP&A function -How FP&A teams harness big data and close the talent gap -Why FP&A can become a top contributor to forward-focused decision-making
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 12, 2019
Financial planning and analysis (FP&A) professionals have witnessed evolutionary changes in budgeting, planning, forecasting, and analysis processes. Through innovative advancements in technology and the application of big data within these processes, the FP&A function is empowered to transform into a strategic business partner. In “The Rise and Rise of FP&A,” a paper written by FSN and sponsored by Anaplan, you will learn about: • The evolution of the FP&A function • How FP&A teams harness big data and close the talent gap • Why FP&A can become a top contributor to forward-focused decision-making
Tags : 
     Anaplan
By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
     Cisco
By: Adobe     Published Date: Aug 30, 2017
Web content management now constitutes mission-critical software to help drive successful communications with customers. Application leaders focused on enabling effective digital experiences should use this document to help them in selecting the most appropriate vendor and solution.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 27, 2018
Web content management now constitutes mission-critical software to help drive successful communications with customers. Application leaders focused on enabling effective digital experiences should use this document to help them in selecting the most appropriate vendor and solution.
Tags : 
     Adobe
By: rPath     Published Date: Jan 10, 2012
Applications are what business lines really care about. Read this white paper to find out how you can make sure you're delivering an application cloud laser-focused on improving business outcomes.
Tags : cloud application deployment, rpath, rpath inc, cloud, clouds, cloud servers, cloud application, cloud deployment
     rPath
By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
     Akamai
By: Quick Base     Published Date: Dec 18, 2017
IT leaders are in a tough spot. Business leaders need help improving processes, but IT needs to focus resources on its own mission-critical innovation projects. Over the past 18 months IT backlogs have risen by 29%, resulting in growing tensions between IT and the business. Across industries, IT leaders are increasingly turning to no-code application development to free themselves from the burden of the backlog. In this 30-minute webinar, Adam Hoover, Solutions Engineer at Quick Base, Inc. will discuss how a no-code application development platform can enable you to drastically reduce your backlog and keep your team focused on the projects that have the greatest impact. He’ll cover how to identify partnership opportunities between the business and IT – and share three effective models for working together while maintaining high quality across the IT ecosystem.
Tags : 
     Quick Base
By: Schneider Electric     Published Date: Jan 26, 2018
The 4th and final event in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." Customers have lots of decisions to make as they feel their way through the changing IT landscape. Which infrastructure and applications should stay on their own premises (if any) and what can they safely move to the cloud? Fill out your information and click "Register" to watch the fourth and final event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Should I Stay or Should I Go?” This webinar originally aired on December 7th, 2017. This final webinar in our webinar series is focused on ways partners can help customers answer the types of questions above and, in the process, become trusted advisors. We’ll go over how to use tools including the EcoStruxure IT suite to analyze customer traffic and help them decide the best home for each application, whether on-premises or in the cloud. (Hopefully we’ll figure out a way to work in the classic Clash tune as well!)
Tags : 
     Schneider Electric
By: Rackspace     Published Date: Mar 28, 2018
Building a cloud operations team isn’t a new concept. But what if you need to build an operations team from the ground up for your applications that are running on Google Cloud Platform? Over the course of eight years at Rackspace, I’ve had the opportunity to build operations teams that have supported thousands of customers. When given the opportunity to build out a new operations team focused on managed services for Google Cloud Platform, I knew we needed to approach things a little differently.
Tags : 
     Rackspace
By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : application protection, app protection, security, cloud, cloud computing, public cloud, security application
     F5
By: AppDynamics     Published Date: Sep 21, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
     AppDynamics
By: Okta     Published Date: Aug 03, 2016
Within 6 months of purchasing Okta, the average customer connects 10 applications, and once up and running, the number increases quickly. But, the average customer could be using twice as many provisioning integrations than they are. Using Okta for single sign-on and a centralized view of your cloud apps isn’t nearly enough. Watch this webinar for a live demo of Okta’s new Access Request Workflow and Access Discovery Report features and learn how Okta Provisioning can bring sanity to your IT processes. Learn about: • Provisioning Workflows • Role & Rule-based Access Control • Security-focused Compliance Reporting
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
     Okta
By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : security, defense, cloud, threats, attack, symantec, enterprise, endpoint
     Symantec
By: Tricentis     Published Date: Mar 13, 2018
Testing is critical to the success of any application. In fact, your software is only as good as the testing team behind it and their ability to identify bugs before they find their way into production. Practically speaking, that means that building and nurturing an effective testing team is mission critical. But, of course, doing so is a lot easier said than done. That's because to be successful, today’s testing teams need to be cross-functional, efficient, and focused on the right things. They also have to be fully bought in and worthy of deep trust. As a result, finding the right candidates can be a challenge, so you have to get creative. Not only that, to attract and retain the best talent, you need to keep them motivated by giving them ample opportunities to learn and advance their career, while not weighing them down with the burden of time-consuming and unnecessary administrative tasks. Instead, you want to equip your team with the right tools to enable and empower them.
Tags : 
     Tricentis
By: Oracle     Published Date: Jan 28, 2015
Oracle Retail delivers best-in-class commerce applications focused on scalability, performance and personalized experiences. Explore 8 case studies in this scanable eBook to see how we are increasing revenue, customer engagement, and operational efficiency for industry-leading B2C and B2B brands in hardlines, fashion and grocery worldwide.
Tags : 
     Oracle
By: AppDynamics     Published Date: Nov 02, 2017
Microservices are a type of software architecture where large applications are made up of small, self-contained units working together through APIs that are not dependent on a specific language. Each service has a limited scope, concentrates on a particular task and is highly independent. This setup allows IT managers and developers to build systems in a modular way. In his book, “Building Microservices,” Sam Newman said microservices are small, focused components built to do a single thing very well.
Tags : 
     AppDynamics
By: SolarWinds     Published Date: May 18, 2015
Learn how to prevent application downtime and optimize performance with this EMA Whitepaper “It’s All About the App: Application-Centric Systems Management” that provides the methodology an IT admin needs to utilize an application-focused approach.
Tags : application downtime, performance optimization, it admin, it infrastructure, application performace
     SolarWinds
By: CA Technologies EMEA     Published Date: Apr 10, 2018
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps. It is vital that all stakeholders understand that the business goals and technical challenges of an API program are intimately related. Program managers must take responsibility for clearly communicating the key business goals of a proposed API to the architects who will actually build the interface. This eBook outlines best practices for designing results-focused APIs that will form the cornerstone of your API program’s success.
Tags : 
     CA Technologies EMEA
By: Oracle     Published Date: Dec 13, 2011
Read this white paper to learn how a lightweight mobile CRM application - more task - than system-focused - can actually provide useful information and encourage salespeople to utilize it.
Tags : on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
     Oracle
By: F5 Networks Inc     Published Date: Feb 18, 2015
In this article, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve when it comes to securing apps in a mobility-focused world.
Tags : application security, mobility-focused world, application solutions
     F5 Networks Inc
By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
     Dell Software
By: XO Communications     Published Date: Apr 13, 2015
Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers Digital Business. Part 2 of the series, this guide focuses on best practices and creating a master implementation plan. Interested in crafting your strategy and business case for using multiple clouds, watch for Part 1 in the series "The Evolution from Network to Multi-Clouds."
Tags : 
     XO Communications
By: IBM     Published Date: Mar 28, 2008
Many of today’s businesses have already moved from rigid siloed application approaches to more flexible business process focused solutions. This is driving the need for transparency in the underlying technologies, and for better levels of standardization and virtualization of the infrastructure, along with consideration of the value chain that includes a company’s suppliers and customers.
Tags : 
     IBM
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics