Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ca technologies

Results 1 - 25 of 1275Sort Results By: Published Date | Title | Company Name
Published By: Anixter     Published Date: Nov 23, 2015
This report tackles the challenges, standards and best approaches to thermal efficiency in existing facilities largely due to them being more prevalent when compared to a new facility. You will be introduced to four best practices that are absolutely critical to achieving an optimal thermal environment. The report also explores the future of datacenter cooling and introduces emerging technologies.
Tags : 
thermal efficiency, data centers, anixter, data center
    
Anixter
Published By: CA Technologies     Published Date: Aug 19, 2015
Getting started with DCIM- Identifying the why, where, when and how.
Tags : 
    
CA Technologies
Published By: Citrix     Published Date: Aug 17, 2017
This white paper discusses the requirements of GDPR and how they can be addressed with integrated Citrix technologies for contextual access, network security, application security, data security, and analytics and insights.
Tags : 
data center, gdpr, network security, data, application security, citrix_gdpr
    
Citrix
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Salesforce’s© Customer Relationship Management (CRM) cloud product for example is now widely used by businesses for its significantly lower cost and overhead when compared to on-premise predecessors. The cloud is driving an insatiable demand for faster, more reliable network access, and for IT organizations the pressure is on.
Tags : 
management, scalability, business, enterprise, technology
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Modern storage arrays can’t compete on price without a range of data reduction technologies that help reduce the overall total cost of ownership of external storage. Unfortunately, there is no one single data reduction technology that fits all data types and we see savings being made with both data deduplication and compression, depending on the workload. Typically, OLTP-type data (databases) work well with compression and can achieve between 2:1 and 3:1 reduction, depending on the data itself. Deduplication works well with large volumes of repeated data like virtual machines or virtual desktops, where many instances or images are based off a similar “gold” master.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
The pace of business is lightning fast. Technology runs faster – and customers want service even faster still. To keep up with the demands of a company in this age, you need hardware infrastructure capable of supporting large amounts of work with a more responsive experience. Our work in the Principled Technologies datacenter showed that the 14th generation Dell EMC™ PowerEdge™ R720xd could deliver just that. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
The pace of business is lightning fast. Technology runs faster – and customers want service even faster still. To keep up with the demands of a company in this age, you need hardware infrastructure capable of supporting large amounts of work with a more responsive experience. Our work in the Principled Technologies datacenter showed that the 14th generation Dell EMC™ PowerEdge™ R720xd could deliver just that. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
The pace of business is lightning fast. Technology runs faster – and customers want service even faster still. To keep up with the demands of a company in this age, you need hardware infrastructure capable of supporting large amounts of work with a more responsive experience. Our work in the Principled Technologies datacenter showed that the 14th generation Dell EMC™ PowerEdge™ R740xd powered by Intel® Xeon® Platinum processor could deliver just that. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Workday     Published Date: Mar 02, 2018
Many government organizations run their core business and operational applications on systems a generation (or two) behind current technologies. This whitepaper from the Governing Institute explains how forward-thinking government agencies are leveraging the cloud to reduce costs and implement a modern, secure platform for delivering IT services.
Tags : 
forward thinking, government agency, cloud, reduce costs, it services
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Most enterprise software systems rely on legacy architectures that can’t keep pace with the transactional and analytical demands of modern organizations. Workday applications, by contrast, are built using modern techniques and technologies that deliver a fast, highly insightful, contextual, and actionable experience. In this video, Petros Dermetzis, Workday executive vice president of development, provides a quick, yet comprehensive overview of Workday’s innovative technologies.
Tags : 
enterprise software systems, analytical demands, innovative technologies
    
Workday
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Redstor UK     Published Date: Mar 12, 2018
A majority of businesses have adopted digital platforms across multiple channels and in many cases successfully utilised them to drive efficiency and profitability. Technology, and the data that often underpins it, has become an extremely valuable asset for businesses of all sizes. The way that companies do business has also changed and technology has played a key role in this, customers now expect instant gratification and a service model that suits their specific needs. This paper will analyse the cause and effect of companies implementing digital transformation strategies and understand the role of cloud technologies within this. It will also explore some of the wider aspects of business transformation and the journey’s businesses take to implement innovative technologies.
Tags : 
digital, transformation, innovation, cloud, business, optimization
    
Redstor UK
Published By: Genesys     Published Date: Feb 22, 2018
Your customers expect effortless and personalized engagement across all their channels. Delivering exceptional customer service requires the platform, infrastructure, applications and resources to identify, route and switch interactions seamlessly between agents and channels, while keeping relevant data available throughout the customer journey. Download this paper to learn how to: • Transform single interactions into personalized customer journeys • Empower employees with the right set of tools, including a unified desktop • Quickly deploy new technologies, like blended artificial intelligence (AI), bots and virtual assistants to exceed your customers’ rapidly evolving expectations
Tags : 
contactbabel, contact center, omnichannel, routing, customer experience
    
Genesys
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. To learn more about Zebra's MP7000, go to: https://goo.gl/693u8o.
Tags : 
webinar, video, multi, plane, scanner, zebra, technologies, mp7000, next generation
    
Zebra ABM
Published By: Workday     Published Date: Jan 16, 2018
Most enterprise software systems rely on legacy architectures that can’t keep pace with the transactional and analytical demands of modern organizations. Workday applications, by contrast, are built using modern techniques and technologies that deliver a fast, highly insightful, contextual, and actionable experience. In this video, Petros Dermetzis, Workday executive vice president of development, provides a comprehensive overview of Workday’s innovative technologies. With a little history about the evolution of enterprise architectures thrown in, Dermetzis explains how Workday, by using object technology and in-memory technology, delivers applications that help organizations make smarter decisions based on real-time data.
Tags : 
evp, development, technology, workday, innovation, applications
    
Workday
Published By: IBM APAC     Published Date: Mar 19, 2018
We know that flash storage can provide significant benefits and deliver needed agility for large businesses, but what about medium-sized businesses (MMB = 500 to 999 employees)? IBM asked Forrester Consulting to look into adoption and use of flash storage technologies by mid-market organizations. A snapshot survey of 106 IT professionals found the following: › MMBs are actively adopting flash storage › Flash is exceeding expectations regarding cloud management, flexibility and security › A majority of respondents expect to continue their investments, with almost half aspiring to an all-flash storage environment. To learn more download this report.
Tags : 
    
IBM APAC
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Effective Competition Depends on Continuous Delivery of Quality Software In today’s application economy every company is a software company, no matter what industry it is in: • Shipping companies depend on logistics software to efficiently route packages, arrange drivers and automate warehouses. • Retail companies rely on software to manage inventory, engage with customers online and to give in-store associates the tools they need to answer customer questions on the spot. • Marketing firms lean on applications to gather consumer data and parse it, automate communication with prospects and effectively manage advertising campaigns. The examples are endless. The point is that in order to compete today, every business must be able to quickly build and tweak software to adjust to always evolving market demands. Ultimately, business success depends on faster development iterations while still maintaining the high quality of service expected by customers, stakeholders and end users.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
With high user expectations shifting faster than ever, the software landscape is evolving at a feverish pace to deliver higher–quality software—and testing must be able to keep up. CA has worked with Paul Gerrard, Principal, Gerrard Consulting, to identify some of the new challenges that the digital economy presents for testing, and the trends that have emerged to meet them. We cover some of these topics in this e–book.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Speed and agility matter. Businesses are being disrupted every day by digital upstarts that find ways to address new market requirements before the more established companies can respond. Despite talented IT teams and years of head start in both architectural and development work, it is still difficult to respond to these challenges using traditional development patterns centered around monolithic software applications. It’s simply impossible to get to market quickly when applications need to be maintained, modified and scaled as a single entity by a large, heavily inter-dependent team. From this need has arisen the microservices paradigm: a set of patterns for software architecture, development, deployment and culture that focus on speed and agility. From small, independent services and teams to automated deployment to fault tolerance and resiliency, these patterns help accelerate time to market.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps. It is vital that all stakeholders understand that the business goals and technical challenges of an API program are intimately related. Program managers must take responsibility for clearly communicating the key business goals of a proposed API to the architects who will actually build the interface. This eBook outlines best practices for designing results-focused APIs that will form the cornerstone of your API program’s success.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks’ existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority’s longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Focus on Value. “The benefits of agile are multidimensional. But the most important change is that it focuses the entire organization on meaningful delivery to the customer. Instead of relying on indirect metrics describing degrees of our software’s quality and progress ... we ask, ‘What percent of critical functionality is included in this release?’ This emphasis on customerperceived value impacts our entire project life cycle pretty significantly.” Vice President of Infrastructure Management BMC Software.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The pace of change is accelerating. Customer expectations, competitive shifts and regulatory changes are disrupting global markets—and the way you do business. In this fast-paced application economy, software is at the heart of every business, driving every industry. Gone are the days when you could build an application or product and then go years without changing much. To survive the disruptive outside forces lurking around practically every corner, you have to stay on top of your game and a step ahead of competitors. Your peers at other companies are likely facing challenges similar to yours, yet you see them leading the industry by consistently sensing market opportunities and delivering innovative new products. How do they do it? Find out by downloading this whitepaper.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.