Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

cloud application service

Results 226 - 250 of 283Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 08, 2014
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. Download this whitepaper to learn more!
Tags : 
cisco, 100g, data, video, mobile, cloud, core networks, transition
    
Cisco
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : 
liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes
    
Liaison Technologies
Published By: BMC Software     Published Date: Feb 03, 2014
Analysts predict that soon, half of all new IT service desk tools will be adopted as cloud-based services. While shifting to an on-demand model can be a complex decision, requiring organizations to assess carefully the potential impact on their business operations, a growing number of companies are clearly finding the move worthwhile. This paper explores the reasons for the rapid growth of cloud-based IT service management (ITSM) solutions and the benefits they offer for enterprises. Topics include: • The cost savings companies can achieve by deploying ITSM solutions via the cloud, which allows better management and optimization of consumption and costs. • Improved alignment between IT to and business, as self-service, a service catalog, collaboration, and mobility help IT expose and provide its services more effectively. • The ability to integrate cloud and on-premise solutions to leverage existing systems while leveraging new innovations via the cloud. • The advantages of cloud
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Jan 31, 2014
“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Information technology is at a crucial turning point. Enterprise IT departments are under constant pressure to meet user and application demands, aware that cloud deployments offer an easier and faster alternative but often pinned down by legacy deployment models. The problem stems from the inability of those legacy models to adapt to meet expectations for rapid provisioning, continuous delivery, and consistent performance across multiple environments. Read this whitepaper to learn more about the evolution of application delivery and the services your enterprise can utilize to successfully manage the increased pressure on network and application infrastructure.
Tags : 
f5 networks, f5 software, software defined application services, application services, application layer, application delivery, cloud, deployment
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud
    
F5 Networks Inc
Published By: Oracle     Published Date: Jan 16, 2014
Without an enterprise-grade cloud, organizations may find themselves falling short of their cloud computing transformation goals. Have you read more about Oracle ERP Cloud Service so your enterprise does not fall short?
Tags : 
oracle, technology, drive innovation, technology solutions, power innovation, it budgets, it spend, the cloud
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Without an enterprise-grade cloud, organizations may find themselves falling short of their cloud computing transformation goals. Have you read more about Oracle ERP Cloud Service so your enterprise does not fall short?
Tags : 
oracle, technology, drive innovation, technology solutions, power innovation, it budgets, it spend, the cloud
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Is Cloud ERP Right for Growing Organizations? Organizations are more willing now than ever before to consider Cloud and SaaS ERP deployment models.
Tags : 
oracle, saas, technology, drive innovation, technology solutions, power innovation, it budgets, it spend
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Is Cloud ERP Right for Growing Organizations? Organizations are more willing now than ever before to consider Cloud and SaaS ERP deployment models.
Tags : 
oracle, saas, technology, drive innovation, technology solutions, power innovation, it budgets, it spend
    
Oracle
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
    
CA Technologies
Published By: SunGard Availability Services     Published Date: Nov 13, 2013
Learn how to assess your organization’s necessity for cloud services and whether or not it would be a beneficial addition.
Tags : 
sungard, sungard availability services, cloud, cloud services, cloud services provider, cloud computing, cost reduction, infrastructure
    
SunGard Availability Services
Published By: SunGard Availability Services     Published Date: Nov 13, 2013
Learn the six key cost considerations when evaluating cloud services and the best practices on selecting a suitable provider.
Tags : 
sungard, sungard availability services, cloud, cloud computing, cloud service, it operations, cost efficiency, flexibility
    
SunGard Availability Services
Published By: Amazon     Published Date: Nov 07, 2013
Learn about all the different services that AWS provides today in this whitepaper.
Tags : 
amazon web services, aws, aws cloud, cloud computing, infrastructure, soa, service oriented infrastructure, flexibility
    
Amazon
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn how to assess your organization’s necessity for cloud services and whether or not it would be a beneficial addition.
Tags : 
sungard, sungard availability services, cloud, cloud services, cloud services provider, cloud computing, cost reduction, infrastructure
    
SunGard Availability Services
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.