RSS feed Get our RSS feed

News by Topic

it lt tech

Results 151 - 175 of 814Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Aug 04, 2016
Mobilität ist Fakt und verwandelt die Geschäftsabläufe in jeder Branche in jedem Teil der Welt. Für Unternehmen, die sich bisher auf monolithische Großrechneranwendungen verließen, bedeutet der Übergang zur Mobiltechnologie in vielerlei Hinsicht eine ähnliche Herausforderung wie die Navigation in unwegsamen Gelände. Wie entscheiden Sie beispielsweise, welche Apps und welche Funktionen Sie zuerst bereitstellen und wie Sie die richtigen Ressourcen und Tipps zur Unterstützung Ihrer mobilen Ziele finden? Damit Sie mit Ihrer Mobilitätsstrategie erfolgreich sind, definiert diese Anleitung wichtige Tipps und Empfehlungen in allen vier Phasen des Lebenszyklus einer mobilen App: Entwurf, Entwicklung, Bereitstellung und Wartung. Diese Anleitung eignet sich ideal für Unternehmen, die bereit sind, nach der Bereitstellung einfacher Apps wie E-Mail und Kalender auf Mobilgeräten den nächsten Schritt zu tun. Die Anleitung enthält auch Hinweise zur Bereitstellung und Wartung vorhandener mobiler Apps.
Tags : mobile apps, best practices, mobileiron, phones
     MobileIron
By: Red Hat     Published Date: Jun 23, 2016
The traditional technical and cultural challenges that large, hierarchical IT organizations face become more visible during times of IT transformation, such as the adoption of cloud technologies, DevOps practices, and agile methodologies. Persistent organizational culture is organic, and it can be extremely difficult for IT leaders to dictate it effectively from the top down. IT leaders can, however, use technology to encourage proper incentive structures in all levels of the organization. This paper explores the role of OpenShift by Red Hat in creating an atmosphere where creative and passionate developers can succeed frequently and quickly. Their success means decisionmakers can impact organizational culture and more rapidly achieve their goals. In this way, IT leaders can harness the efficiency and persistence of spontaneous organization, despite the inherent limitations of hierarchical systems.
Tags : technology, productivity, red hat, best practices
     Red Hat
By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
In seinem Buch „Die Psychologie der Wissenschaft“ von 1966 vertrat der US-Psychologe Abraham Maslow die Position, dass Psychologen multiperspektivische Behandlungsansätze verfolgen und neue Konzepte einführen sollten, statt weiter nur die Theorien von Verfahren anzuwenden, die Freud und seine Nachfolger vor langer Zeit entwickelt hatten. Maslow wusste, dass es schwierig ist, einen neuen Blickwinkel einzunehmen, und schreibt: „Es ist bestechend, in jedem Problem einen Nagel zu sehen, wenn man als Werkzeug nur einen Hammer hat.“ Wir alle kennen das. Wir gewöhnen uns so sehr an althergebrachte Abläufe, dass wir die Gründe dafür manchmal nicht infrage stellen.
Tags : 
     CA Technologies
By: Collective Health     Published Date: Nov 28, 2016
Collective Health offered a contemporary health benefits infrastructure that was able to use the data that’s surrounding us in the healthcare space and leverage it in a way that was new and exciting to us,” said Milt. Combining technology, design, and humans, Collective Health’s holistic approach brought Activision Blizzard’s benefits goals to life.
Tags : 
     Collective Health
By: Microsoft     Published Date: Oct 06, 2016
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : microsoft, analytics, data, business impact
     Microsoft
By: Microsoft     Published Date: Feb 02, 2017
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
     Microsoft
By: Juniper Networks     Published Date: Aug 10, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
     Google
By: CA Technologies EMEA     Published Date: Sep 07, 2018
Business applications have become the battleground for customer loyalty. To compete, IT organizations are under pressure to deliver applications faster and with higher quality. Continuous Delivery (CD) of code offers a solution. CD may be paired with DevOps, Agile and other methodologies. However, QA and testing can be an obstacle to CD’s rapid development and deployment of high quality code. Testers and developers must engage in Continuous Testing, continuously testing software for performance, quality and user experience as it’s being developed. Continuous Testing is not a push button process, though. It requires a comprehensive approach. This paper outlines the common challenges to Continuous Testing and highlights results from real users who have used technology to get to succeed with the Continuous Testing process.
Tags : 
     CA Technologies EMEA
By: TIBCO Software     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
     TIBCO Software
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
There’s no turning back from the fact that disruptive business automation is here. As artificially intelligent functionality delivers more capabilities that we increasingly take for granted, it’s difficult to grasp all the implications of this transformation. In this eBook, the aim is to illustrate what it means for business, for the people who work in those businesses, and for people served by those businesses every day. To better understand how automation is changing business, and with the generous support of CA Technologies, we reached out to 39 experts to get their opinion. By providing practical insights into what is happening today and what may be just over the horizon, I believe this eBook will be a valuable resource for anyone planning an automation strategy.
Tags : 
     CA Technologies_Business_Automation
By: VMware     Published Date: Dec 10, 2018
Healthcare IT is in the midst of a revolution. Far from its leaky-ceiling basement beginnings, healthcare information technology (HIT) is now a strategic business differentiator with a key to the executive washroom. Challenged to innovate new patient and provider application services while maintaining traditional client-server applications, HIT teams are seeking ways to ensure investments in the management and maintenance of traditional systems don’t prevent the delivery of new digital experiences now and into the future. To find out more download this eBook today.
Tags : 
     VMware
By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : cognizant, finance, digital
     Cognizant
By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : cognizant, banking, digital
     Cognizant
By: Cognizant     Published Date: Oct 23, 2018
Value-based care is the predominant model for enabling the healthcare industry to control costs and deliver better information to consumers. The basic idea is that reimbursements are based on the quality of the outcome of a procedure, episode of care, use of a device or therapy. Under this model, life sciences companies are rewarded for improving health outcomes and/or reducing the costs to achieve those outcomes. It requires life sciences companies to rethink many of their processes, from R&D through the commercial phase. Navigating those momentous shifts requires that life sciences companies embrace a range of digital technologies which will enable a holistic approach to value-based care. This white paper will examine the drive for value-based care, its impact on life sciences companies and how technology platforms can address the challenges the industry is facing.
Tags : cognizant, life sciences, digital
     Cognizant
By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
     F5 Networks Singapore Pte Ltd
By: Intel     Published Date: Apr 11, 2019
To remain competitive, manufacturers must focus on achieving new growth while driving down costs. Key to achieving this is greater flexibility and a dramatic upturn in operational efficiency across the manufacturing process. One area ripe for improvement is intralogistics transportation. Many manufacturers still rely on autonomous guide vehicles (AGVs) to undertake repetitive transport tasks; but, rigid in nature, they do not support today’s demand-driven, dynamic manufacturing environments. Intelligent autonomous mobile robots (AMRs), like SEIT* from Milvus Robotics, offer a viable and cost-effective alternative. This solution brief describes how to solve business challenges through investment in innovative technologies.
Tags : 
     Intel
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Increasing risks and cyber threats make IT security a high priority. Oracle’s SPARC S7, T7, and M7 Servers with always-on memory intrusion protection and comprehensive data encryption secure your data with no performance penalty. Oracle’s Software in Silicon technology and Oracle Solaris protect data in memory from unauthorized access and stop malware before it gets in.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"It is very well understood that Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements and remain competitive many companies are turning to cloud computing. Companies thus need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. Oracle understand the need for IT organizations to move to cloud computing at the same time also recognizes that moving to the cloud is a multi-step journey that starts with standardization and consolidation of IT infrastructure and ends by moving applications and data to the cloud. The PDF is meant to help you gauge through the Oracle’s SPARC servers and give you an experience of simplified journey to the cloud by using the same technology for both cloud and on-premises deployments. No matter where your IT organization is on the journey to the cloud SPARC servers will be an i
Tags : 
     Oracle PaaS/IaaS/Hardware
By: JBoss Developer     Published Date: Oct 21, 2016
This competitive review between Red Hat and TIBCO integration technologies has presented multiple differences between the products. A notable difference is that only Red Hat JBoss Fuse is a 100% open source product. Red Hat is committed to leveraging existing open source projects and using open standards whenever possible for both product implementation and integration communication. This includes Camel, the de-facto integration standard included with Red Hat JBoss Fuse. Red Hat’s open source commitment extends to Active MQ, the upstream messaging technology used with JBoss A-MQ and included with Red Hat JBoss Fuse. Another difference is that Red Hat JBoss Fuse clustering is based on the upstream Fabric8 community project and offers much more functionality than TIBCO clustering options.
Tags : cloud, technology, competitive advantage, queuing protocol, open source
     JBoss Developer
By: bChannels     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
     bChannels
By: Veracode     Published Date: Jun 26, 2019
DevOps, a new model for software development, is transforming the way the world creates software. And despite its substantial organizational, cultural and technological requirements, this new way of organizing development and IT operations work is spreading rapidly.
Tags : 
     Veracode
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics