Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

software service

Results 51 - 75 of 825Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 01, 2019
By 2020, Gartner predicts 100% of new entrants to IT – and 80% of historical vendors – will offer subscription-based business models to their customers. These organizations are prioritizing the cloud over on-premises data centers and legacy software, so they can more efficiently deliver highly available, scalable, and cost-effective service offerings. To remain competitive, you need to modernize your approach to .NET development – and Amazon Web Services (AWS) is the ideal place to start. This whitepaper will explore best practices for containerizing your Windows workloads on AWS, including how to design your containers, which AWS services to leverage, and how to modernize your existing .NET applications for the cloud.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Software development has evolved from rigid waterfall methodologies to more streamlined approaches, like Agile and more recently DevOps. This evolution has taken place in large part to shorten development life cycles and meet increased business demands. Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes, which break down silos between development and operations, allowing organizations to create better software faster. As organizations implement DevOps on Amazon Web Services (AWS), they need to understand the security implications. The AWS Shared Responsibility Model makes clear that AWS secures what’s “on the cloud,” while the customer is responsible for securing their assets “in the cloud.” When AWS customers go about securing their DevOps environments, they need to do so in a way that provides robust protection without limiting developer agility.
Tags : 
    
AWS
Published By: AWS - ROI DNA     Published Date: Jun 12, 2018
Achieving a 360-degree view of customers has become increasingly challenging as companies embrace omni-channel strategies, engaging customers across websites, mobile, call centers, social media, physical sites, and beyond. Learn how software solutions in AWS Marketplace can automate data lake analysis, enabling self-service platforms for analysis that expand and enhance personalization while deepening customer understanding so you can spend more time acting on insights.
Tags : 
    
AWS - ROI DNA
Published By: BAE Systems     Published Date: Dec 29, 2015
How to secure your network without busting your IT budget
Tags : 
bae systems, applied intelligence, fortune 500, business security, network security, it management, security products, security systems
    
BAE Systems
Published By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
    
BigCommerce
Published By: BizCarta Australia     Published Date: Nov 02, 2010
BizCarta assisted Country Energy in deploying LANDesk Management Suite to identify which Microsoft applications were running. That project identified and subsequently removed unused software valued at $1,671,000.
Tags : 
landesk, software license monitoring, software asset management, it asset management, desktop management, service desk management
    
BizCarta Australia
Published By: BlackBerry     Published Date: Dec 20, 2012
This webcast features key trends in enterprise mobility, innovative tools and technology to help you, and a BlackBerry Software and Services road map.
Tags : 
enterprise applications
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 11, 2013
Find out about innovative tools for Enterprise Mobility Management (EMM) including BlackBerry® Enterprise Service 10, and get all the details on the BlackBerry® software and services roadmap.
Tags : 
blackberry 10, vision and roadmap, enterprise vision, enterprise service 10, software, services, wireless, enterprise applications
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
Find out about innovative tools for Enterprise Mobility Management (EMM) including BlackBerry® Enterprise Service 10, and get all the details on the BlackBerry® software and services roadmap.
Tags : 
innovative tools, emm, blackberry 10, enterprise service 10, software and services road map, enterprise applications
    
Blackberry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
saas, application, line-of-business owners, lobs, software-as-a-service, technology, strategy, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
strategies, saas, application, lob, bluecoat
    
Blue Coat Systems
Published By: BMC     Published Date: Sep 11, 2012
Industrializing IT Workload Automation," Forrester Consulting and BMC Software analyze the results of a comprehensive survey that addressed job scheduling on the ground today.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC
Published By: BMC     Published Date: Sep 11, 2012
Hear VPs from Forrester Research and BMC Software discuss the results of our 2012 job scheduling survey in "Workload Automation Survey Results: Peer Insights and Expert Analysis.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC
Published By: BMC     Published Date: Sep 11, 2012
Visit the IDC iView interactive library to get the analyst's take on how self service for workload automation can contain costs and improve service.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC
Published By: BMC Control M     Published Date: Jul 16, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc
    
BMC Control M
Published By: BMC ESM     Published Date: Jul 17, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 17, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : 
service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : 
service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 19, 2009
Virtualization adds a whole new level of complexity to the IT infrastructure, introducing new challenges in every step of the process – from planning to configuration and management. Read how effective service management can help tackle the challenges of virtualization in this white paper from BMC Software.
Tags : 
bmc software, virtualization, service management processes, service management solutions, virtualization enabled, networking, it management
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 20, 2009
What if you could predict disruptive IT events and automate their resolution — all before they disrupt your business?  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Assurance from BMC Software.
Tags : 
service assurance, bmc, it events, it automation, software demo, automate, it management, enterprise applications
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching
    
BMC ESM
Published By: BMC Software     Published Date: Jun 30, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc
    
BMC Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.