RSS feed Get our RSS feed

News by Topic

ca technologies

Results 551 - 575 of 1794Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Mar 21, 2014
This study of 1,300 senior IT decision-makers worldwide proves IT leaders recognize they must change how their organizations work to accelerate time to market, improve software quality, speed application development and meet growing customer demand.
Tags : devops, software, it automation, visualization, application
     CA Technologies
By: Sitecore EMEA     Published Date: Jan 23, 2018
The global beauty company provides an exhilarating example of the power of context-driven commerce. When customers can rely on brands to achieve the outcomes that are important to them, brand owners can shift their focus from nonstop customer acquisition to long-term customer engagement. The Sitecore Experience Platform and the underlying Sitecore Experience Database are foundation technologies for IT organizations wanting to implement context-driven commerce environments that function elegantly today and into the future. Sitecore puts an end to digital retailers’ obsession with cart abandonment, replacing it with opportunities to delight customers with personal, meaningful commerce offers.
Tags : advertising, revenue, customers, social channels, sitecore
     Sitecore EMEA
By: Adobe     Published Date: Mar 21, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals.
Tags : 
     Adobe
By: CA Technologies     Published Date: Mar 18, 2014
Discover how you can capitalize on the benefits of application delivery.
Tags : application delivery, software quality, visualization, application testing
     CA Technologies
By: CA Technologies     Published Date: Mar 21, 2014
This study of 1,300 senior IT decision-makers worldwide proves IT leaders recognize they must change how their organizations work to accelerate time to market, improve software quality, speed application development and meet growing customer demand.
Tags : devops, software, it automation, visualization, application
     CA Technologies
By: CA Technologies     Published Date: Mar 21, 2014
How Release Automation Simplifies and Accelerates Application Delivery
Tags : delivery innovation, application, release automation
     CA Technologies
By: CA Technologies     Published Date: Jun 05, 2014
An Ovum white paper on CA LISA Release Automation
Tags : release automation, application delivery, end-to-end application delivery.
     CA Technologies
By: CA Technologies     Published Date: Jun 05, 2014
A white paper reviewing the two approaches to zero-touch deployment.
Tags : application release automation
     CA Technologies
By: CA Technologies     Published Date: Jun 05, 2014
A report into how an automated lifecycle approach to DevOps supports the agile business
Tags : application delivery, high velocity application delivery, devops strategy, service virtualization, release automation, application performance management
     CA Technologies
By: CA Technologies     Published Date: Jun 05, 2014
A report into how release automation simplifies and accelerates application delivery
Tags : release automation, application building, application testing, application release, new application services
     CA Technologies
By: CA Technologies     Published Date: Jun 05, 2014
An eBooklet discussing the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : devops, a guide to devops, integrated journey
     CA Technologies
By: bChannels     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
     bChannels
By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
     WNS
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
     CA Technologies
By: Schneider Electric     Published Date: Apr 23, 2019
After buzzing Industry 4.0 all over the media by all OT and IT experts, today, a few key concepts seem to unveil the potential that the industry believes is behind Industry 4.0. These include: Smart Machines, Smart Factory, cyber physical systems, Everything-as-a-Service and a few technologies like OPC UA, cloud and data analytics. Clearly, they are the innovation drivers and must-haves for every vendor of automation products that want to be recognized as leaders or challengers. Sooner or later they will become standards and used by followers and niche players, but the key question for the market of automation suppliers is not who is first in developing and providing all the nice concepts and technologies, but who is creating and combining them in the right way so that they can be turned into new revenue streams. We keep in mind that competitive advantages can be achieved through increasing operational efficiency, but the better way is through strategic uniqueness. Companies which ar
Tags : industry 4.0, iiot, smart machines, smart manufacturing, business models
     Schneider Electric
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics