RSS feed Get our RSS feed

News by Topic

ca technologies

Results 576 - 600 of 1788Sort Results By: Published Date | Title | Company Name
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Performance Management Handbook for DB2 for z/OS by renowned tuning experts Susan Lawson and Dan Luksetich of YL&A covers information to enhance your skills and raise awareness for databases performance management issues and tuning strategies. This supplement to the CA Performance Management Handbook provides specific information on which technologies apply to which issues and how CA Database Management addresses your most pressing database performance management challenges.
Tags : ca mainframe, mainframe, apm, application performance management
     CA Mainframe
By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : data research, big data, virtualization, applications, networks
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: ClickSoftware     Published Date: Sep 24, 2012
This paper explores the business benefits that contractors can gain by adopting field workforce scheduling & optimization technologies.
Tags : field service management software, field service software, workforce management, field service management, service management software, field management software, field service scheduling software, mobile workforce management
     ClickSoftware
By: SumTotal Systems     Published Date: Oct 10, 2013
Workforce analytics has become an essential business tool for leading companies that view workforce performance as the key to improving company results, according to a new global survey of business leaders by Harvard Business Review Analytics Services. Workforce analytics is a set of integrated capabilities (technologies, metrics, data, and processes) to measure and improve workforce performance. The goal is simple: put the right people with the right skills in the right work, provide them with the necessary training and development opportunities, and engage and empower them to perform at their highest possible level.
Tags : sumtotal, harvard business review, workforce, workforce analytics, analytics, company performance, workforce management, workforce data
     SumTotal Systems
By: Oracle     Published Date: Mar 06, 2018
The financial system you are running today can probably trace its heritage back to the ‘80s and ‘90s. Since then, the needs of finance organisations have changed dramatically, but financial systems have failed to adapt at the core. Built to serve only the most basic requirements, these systems weren’t designed to meet the needs of today’s finance organisation. With CFOs today facing requirements very different from those they faced just a decade ago, Workday believes that finance organisations need applications built from the ground up based on today’s needs – not yesterday’s. They need modern financial systems. Workday Financials is the only financial management solution designed in the past ten years that incorporates the latest technologies, functionality, and design ethics at the core to address what modern finance organisations need. We discuss six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : 
     Oracle
By: Castlight Health     Published Date: Apr 13, 2016
With the growing adoption of high-deductible health plans (HDHPs) and increased employee cost sharing, unlocking the value of your benefits for your employees and your business critically depends, now more than ever, on engaging your employees to make smart healthcare decisions. The good news is that innovative benefits technologies are starting to deliver on a proven recipe for success.
Tags : castlight health, employee, health benefits, hdhp, healthcare
     Castlight Health
By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : healthcare, iot, iec 800001, extreme networks, healthcare it
     Extreme Networks
By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth è stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Le aziende di tutti i tipi utilizzano le API per accedere a database e applicazioni on-premise, consentendo agli sviluppatori di creare app che aumentano la value proposition delle offerte esistenti, creano nuovi flussi di ricavi ed espandono la base di clientela potenziale.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Semplificare la sicurezza e la gestione per le app di livello enterprise e il BYOD
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Semplificare l'implementazione di OAuth per l'azienda
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Le API (Application Programming Interface) costituiscono le fondamenta di questa nuova azienda "aperta", consentendo alle società di riutilizzare le risorse informative esistenti al di là dei confini dell'organizzazione.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
La mobility sta rivoluzionando il mondo di oggi. Entro il 2017 le app mobile supereranno i 268 miliardi di download, generando un fatturato superiore a 77 miliardi di dollari, rendendole di fatto uno degli strumenti informatici più diffusi tra gli utenti di tutto il pianeta.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Rendere sicure le applicazioni aziendali per il mobile, il cloud e l'open web.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Sebbene il concetto di application programming interface (API) possa apparire obsoleto, esso è in realtà in corso di trasformazione, perché un numero crescente di aziende, incentivate dalle esigenze di mobility e cloud, tende a esporre le proprie risorse informative a sviluppatori terzi.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
L'app non è più semplicemente un metodo per comunicare. Rappresenta il nuovo punto critico di coinvolgimento, il volto dell'azienda, se non addirittura l’elemento chiave della fidelizzazione o meno del cliente.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
En 2007, Apple lance l’iPhone : le premier smartphone voit le jour. Avec son écran tactile et sa capacité à exécuter des applications légères, l’iPhone a révolutionné le marché du téléphone mobile.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Les API (interfaces de programmation d’applications) forment la base de cette nouvelle entreprise ouverte en permettant aux organisations de réutiliser leurs sources d’informations existantes au-delà de leurs limites.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Simplification de la sécurité et de la gestion pour les applications d’entreprise et le BYOD
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
L’apparition de smartphones et tablettes capables d’exécuter des applications simples a constitué une véritable avancée en termes de potentiel des appareils mobiles sur le lieu de travail.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Pas étonnant dans un tel contexte que les entreprises du monde entier se sentent obligées de proposer différentes applications à des publics externes et internes.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Mar 06, 2015
Sécurisez vos applications d’entreprise pour le monde mobile, le Cloud et le Web ouvert.
Tags : 
     CA Technologies
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics