RSS feed Get our RSS feed

News by Topic

ca technologies

Results 501 - 525 of 1770Sort Results By: Published Date | Title | Company Name
By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : cognizant, finance, digital
     Cognizant
By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : cognizant, banking, digital
     Cognizant
By: Cognizant     Published Date: Oct 23, 2018
Value-based care is the predominant model for enabling the healthcare industry to control costs and deliver better information to consumers. The basic idea is that reimbursements are based on the quality of the outcome of a procedure, episode of care, use of a device or therapy. Under this model, life sciences companies are rewarded for improving health outcomes and/or reducing the costs to achieve those outcomes. It requires life sciences companies to rethink many of their processes, from R&D through the commercial phase. Navigating those momentous shifts requires that life sciences companies embrace a range of digital technologies which will enable a holistic approach to value-based care. This white paper will examine the drive for value-based care, its impact on life sciences companies and how technology platforms can address the challenges the industry is facing.
Tags : cognizant, life sciences, digital
     Cognizant
By: Cognizant     Published Date: Oct 23, 2018
A group of emerging technologies is rapidly creating numerous opportunities for life sciences companies to improve productivity, enhance patient care and ensure regulatory compliance. These technologies include robotic process automation (RPA), artificial intelligence (AI), machine learning (ML), blockchain, the Internet of Things (IoT), 3-D printing and augmented reality/ virtual reality (AR/ VR). This whitepaper presents a preview of five pivotal technology trends remaking the life sciences industry: AI and automation, human augmentation, edge analytics/ processing, data ownership and protection, and the intermingling of products and services.
Tags : cognizant, life sciences, patient care
     Cognizant
By: Intapp     Published Date: Jan 09, 2019
New researchconducted by Intapp found that, while Mid Law firms attest that data-driven strategies are highly important in all areas of the client lifecycle, a significant gap exists as to how or whether they are currently deploying enabling technologies such as intelligent automation. Read the ebook to discover the full breadth of this gap, and learn best practices for how you can use technology to drive growth in the client-empowered era.
Tags : law firm time, law firm better time, law firm automated time, law firm time sheet, law firm timesheet, law firm better time sheet, law firm better timesheet, law firm automated time sheet
     Intapp
By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
     F5 Networks Singapore Pte Ltd
By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
     Intel
By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
     BeyondTrust
By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
     Fidelis Cybersecurity
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
     Fidelis Cybersecurity
By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
     Fidelis Cybersecurity
By: CA Technologies     Published Date: Aug 24, 2017
Dans son ouvrage intitulé « The Psychology of Science » publié en 1966, le psychologue américain Abraham Maslow s’est penché sur l’idée selon laquelle la psychologie devait être abordée sous plusieurs angles, faire place à des idées nouvelles et ne pas se limiter aux techniques et théories développées il y a bien longtemps par Freud et ses disciples. Conscient du fait qu’il n’est pas simple de changer de point de vue, Maslow a écrit : « [...]il est tentant, si le seul outil que vous avez est un marteau, de traiter tout problème comme si c’était un clou. » Nous avons tous vécu cette expérience. Nous nous habituons tellement à la manière dont les choses se font que nous ne remettons pas souvent en cause les raisons pour lesquelles nous les faisons.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Aujourd’hui, le numérique est omniprésent : Cloud, appareils mobiles, réseaux sociaux et Internet des objets modifient notre manière de travailler et de nous divertir.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
• CA Live API Creator permet de livrer des prototypes opérationnels en quelques heures à peine. Convertissez vos besoins métier en logiciels opérationnels. • CA Live API Creator convient aux modélisations filaires, mais aussi aux interfaces utilisateur, à la logique, aux bases de données et aux systèmes opérationnels. C’est aussi simple qu’une feuille de calcul et tout aussi rapide. • Impressionnez vos utilisateurs métier en leur présentant des résultats en quelques heures à peine. Intégrez ensuite leurs commentaires dans la logique et le modèle de données pour finalement assurer une itération instantanée. • Tout ce dont vous avez besoin est à votre disposition. Pas d’environnement de développement intégré à installer ni à configurer. Votre navigateur suffit.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Assurer la croissance de votre entreprise est une priorité permanente. Par ailleurs, à mesure que l’économie des applications poursuit son expansion, il est très probable que vous optiez de plus en plus pour des initiatives d’entreprise numérique afin d’alimenter cette croissance.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
L’économie des applications oblige les entreprises à se transformer. Pour saisir de nouvelles opportunités de croissance, elles s’ouvrent sur l’extérieur et partagent des données et applications sélectionnées avec des développeurs, des partenaires, des appareils mobiles, le Cloud et l’Internet des objets. Cette transformation contribue à redonner de la valeur aux données héritées : dans l’économie des applications, une organisation qui parvient à exploiter ces données d’une nouvelle manière pourra faire émerger de nouvelles opportunités de revenus.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Banques, gestionnaires de patrimoines, établissements de crédit et autres institutions financières. Tous constatent d’importants changements, conséquence d’une évolution de la demande et du nouvel arsenal réglementaire. Ces entreprises sont tenues de revoir leurs priorités, leurs processus et leurs produits, avant de jeter les bases de leur future réussite. La solution ? Les logiciels.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Dans l’économie numérique, les interfaces de programmation d’applications ou API (Application Programming Interfaces) sont essentielles pour mettre rapidement en oeuvre vos idées et saisir les nouvelles opportunités du marché. Elles sont les éléments fondateurs de la transformation numérique, permettant aux organisations d’offrir une expérience client exceptionnelle, de générer de nouveaux flux de revenus et d’offrir aux employés, partenaires, applications et périphériques un accès aux données, partout et à tout moment.
Tags : 
     CA Technologies
By: Google     Published Date: Oct 26, 2018
As businesses have embraced application development, they have also adopted cloud technologies that provide their teams lesser reliance on hardware. In this sponsored Economist Intelligence Unit report, we look at the real-life experiences of over 1,000 business executives and understand the importance of close alignment between development teams, C-suite, and the wider business. Read the report and find out how you can manage application development to unlock its full potential.
Tags : 
     Google
By: RedHat     Published Date: May 16, 2017
The study reveals that among CIOs and senior IT decision makers, open source is not just a cost-saving option; it is also a strategic investment that can lead to digital innovation. It indicates open source usage is moving from community freeware to enterprise-grade solutions. Asia Pacific IT leaders view open source as improving the evolution of technologies that are key to digital transformation, including cloud, DevOps, mobility, and big data.
Tags : open source, digital innovation, digital transformation, devops, mobility, cloud, big data
     RedHat
By: Google     Published Date: Jan 24, 2019
As businesses have embraced application development, they have also adopted cloud technologies that provide their teams lesser reliance on hardware. In this sponsored Economist Intelligence Unit report, we look at the real-life experiences of over 1,000 business executives and understand the importance of close alignment between development teams, C-suite, and the wider business.
Tags : 
     Google
By: CA Technologies     Published Date: Aug 24, 2017
In our 28-criteria evaluation of application performance management (APM) solutions, we identified the 14 most significant vendors — AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise (HPE), IBM, ManageEngine, Microsoft, Nastel Technologies, NetScout, New Relic, and Riverbed Technology — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice for their organization.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Les applications réécrivent le monde dans lequel nous vivons et sont le moteur de notre économie. Elles dictent la manière dont les partenaires et fournisseurs interagissent, dont les employés se connectent, dont les consommateurs partagent, découvrent et achètent des produits et services ; elles dictent aussi la manière dont nous nous différencions par rapport à nos concurrents. Chaque entreprise est en passe de devenir une entreprise des applications, chaque industrie est en passe de devenir une industrie des applications... et cette transformation numérique s’accélère.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Des études récentes ont montré que les stratégies en relation avec l’expérience client seront le principal atout des entreprises face à la concurrence d’ici la fin de l’année 2016. Pour migrer vers ces stratégies, il est nécessaire d’adopter un modèle métier orienté applications. Étant donné que l’expérience client est une partie essentielle de la stratégie concurrentielle des entreprises, il est important que les applications orientées client proposent un niveau élevé de performances et d’utilisabilité.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
     CA Technologies
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics