Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sign act

Results 251 - 275 of 890Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 08, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, networking, software development, enterprise applications
    
IBM
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
A&D manufacturers and their suppliers now depend more than ever on global supply chains. As they reach across time zones, languages and cultures, supply chains have to work around challenges that build up costs and drag down production schedules. Communication between distributed engineering and production centers can be labored and error-prone. These problems are often compounded by repetitive programming, incomplete simulations, time-intensive production methods, and concern that the shop floor may not be working with current data. Ideally, global companies should be able to design products at any location and produce them at selected sites, with all stakeholders from design to the shop floor working concurrently from a single unique global data source. Understand how manufacturing companies can deliver machined parts faster and increase revenue by reducing costs – despite operating globally across time zones and cultures.
Tags : 
    
Dassault Systèmes
Published By: Docusign     Published Date: Feb 16, 2015
This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.
Tags : 
laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws
    
Docusign
Published By: Docusign     Published Date: Feb 19, 2015
La société américaine DocuSign, spécialiste des outils de signature électronique, permet des signatures numériques conformes aux normes de l'Union Européenne et va permettre à un plus grand nombre d’entreprises d’accéder plus vite aux avantages d’une activité 100% numérique avec des transactions dans le cloud rapides et sécurisées.
Tags : 
docusign sécurise, signature électronique, security
    
Docusign
Published By: Docusign     Published Date: Feb 19, 2015
À cause du nombre croissant de professionnels qui utilisent les téléphones et applications mobiles, la « vague mobile » a des incidences sur chaque fonction commerciale dans le monde entier et modifie la manière de faire des affaires. Les technologies telles que les signatures électroniques mobiles peuvent aider les entreprises à finaliser leurs transactions commerciales. Les signatures électroniques mobiles vous permettent, ainsi qu'à vos contacts, d'envoyer et de signer des documents légalement, grâce aux téléphones et à d'autres appareils mobiles, à tout moment et en tout lieu.
Tags : 
docusign, la signature electronique
    
Docusign
Published By: KPMG     Published Date: Jul 10, 2018
Businesses are deploying innovative technologies at speed to secure competitive advantage. How can you manage risk effectively in the rush to the future? Read this guide to find out: • what internal and external risks emerging technologies present • which technologies present the biggest risks and the biggest opportunities • how to design a framework for emerging tech governance • what actions to take to put a new governance framework in place.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: Schneider Electric     Published Date: Nov 17, 2016
Today’s data center power and cooling infrastructure has roughly 3 times more data points / notifications than it did 10 years ago. Traditional data center remote monitoring services have been available for over 10 years but were not designed to support this amount of data monitoring and the associated alarms, let alone extract value from the data. This paper explains how seven trends are defining monitoring service requirements and how this will lead to improvements in data center operations and maintenance.
Tags : 
schneider electric, digital remote monitoring, data center operations, maintenance, enterprise applications, infrastructure
    
Schneider Electric
Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems
Published By: Oracle     Published Date: Jul 31, 2017
"The significance of technology in higher education has changed dramatically over the past decade. The rise of mobile, social and analytic technologies is forcing institutions to rethink their business models from the ground up. Institutions at all ends of the spectrum clearly need to embrace fundamental changes in their most basic business processes and platforms. A critical factor in the planning for those changes includes finding the right partner to assist with a major platform shift to the cloud."
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jul 31, 2017
"Healthcare payers and providers are under increasing pressure to: - Provide and report on quality of care across their population - Embrace new innovations faster - Reduce costs across the organization - Use consumer-friendly digital technology Explore this actigraphic to see if your organization is on the right track for tackling these challenges."
Tags : 
    
Oracle
Published By: NetApp     Published Date: Sep 11, 2014
Although the cost of flash storage solutions continues to fall, on a per-gigabyte capacity basis, it is still significantly more expensive to acquire than traditional hard drives. However, when the cost per gigabyte is examined in terms of TCO, and the customer looks past the pure acquisition cost and accounts for “soft factors” such as prolonging the life of a data center, lower operating costs (for example, power and cooling), increased flexibility and scalability, or the service levels that a flash solution enables, flash solution costs become increasingly competitive with spinning media.
Tags : 
flash technologies, total cost of ownership, flash storage, data center, increased flexibility
    
NetApp
Published By: AppDynamics     Published Date: Sep 21, 2017
Azure has been through many rounds of changes that have significantly affected the ways in which .NET and other developers interact with the platform.
Tags : 
    
AppDynamics
Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications
    
MarkLogic
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: Compliance Associates     Published Date: Jun 29, 2015
Are you feeling the pressure to meet FDA guidelines on Quality by Design (QbD) principals for Process Validation? Existing manufacturing, LIMS, ERP and document management tools are lacking integration and on demand view of your processes. They have hidden costs, risks and create delays to scalable product manufacturing and revenue. Since the FDA is demanding scientific arguments to support process and product development activies and a lifecyle approach, consider the value of a purpose built app for Process Validation. This new class of APP will bring your products to market faster and lower the risk of costly delays. Download the Primer to learn more.
Tags : 
regulatory compliance services, validation services, regulatory compliance, fda rulings, validator, validation, validation consultants
    
Compliance Associates
Published By: FICO     Published Date: Nov 30, 2016
Unexpected failure or performance erosion of production equipment can significantly impact productivity, product quality and maintenance expenses within any manufacturing organization. It’s also difficult to get operations ‘back on track’ after these failures occur. The good news is that, via the Internet of Things, intelligent use of sensor data, machine learning and optimization can help companies take a proactive approach to predicting failures and re-optimizing processes around them.
Tags : 
iot, internet of things, manufacturing, it management
    
FICO
Published By: MuleSoft     Published Date: Apr 13, 2016
APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. Read this eBook to learn: -how to define the business objectives that APIs will help achieve -best practices to design, manage, and deploy APIs -monitor and measure the impact of your APIs
Tags : 
digital infrastructure, data, data sharing, best practices, data management, application management, enterprise applications, network management
    
MuleSoft
Published By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
    
MuleSoft
Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
You're moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. With Okta's lightweight agent, you can minimize your on-prem footprint as you move to the cloud. Zero servers and on-prem software to deploy, update and manage means lower TCO.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Looker     Published Date: Dec 03, 2015
Analytics is about so much more than defining high-level KPIs and building dashboards to amplify them. With a little creativity, you can create custom metrics designed to inform every member of an organization. With this knowledge of their effect on the business, everyone can optimize their impact on company-wide goals. What you'll learn in this webinar: • Why standard KPIs may not be getting you everything you need • Who can benefit from these new metrics (everyone!) • How to identify key metrics and roll them out to the entire organization • Get examples of how other companies are creating custom analytics
Tags : 
    
Looker
Published By: SAP     Published Date: Jul 18, 2016
The SAP® BusinessObjects™ Cloud solution offers all analytics capabilities for all users in one product. In the boardroom, at the office, or in front of a customer, you can discover, analyze, plan, predict, and collaborate in one integrated experience designed expressly for the cloud. Read the solution in detail to learn how to turn instant insight into quick action.
Tags : 
    
SAP
Published By: Thomson Reuters     Published Date: Aug 10, 2018
Documents reviewed for production are the facts that underlay all claims and defenses – and they matter. But with volumes and costs exploding, it’s harder than ever to find the needle in the haystack. Join litigation experts from Thomson Reuters as they show you how to design a document review with an eye toward fact-finding, case analysis, and litigation strategy. Attendees should have a basic understanding of document review and production practices and terminology. In this complimentary webinar, you will learn more about: How to design a strategic review protocol Optimizing process to increase communication Knowledge sharing between the review and the law firm teams Next steps once production is complete This is Part I of a multi-part webinar series on leveraging document review to maximize litigation strateg
Tags : 
leveraging, document, review, maximize, litigation, strategy
    
Thomson Reuters
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.