Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dev

Results 226 - 250 of 6016Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Cloud is rapidly changing the ways we work — and the rate at which work will continue to change is only going to increase. To get the full business benefits of the cloud, your organization needs an agile infrastructure that allows people to securely connect to the data they need, and has the flexibility to adapt as technology evolves. Citrix Workspace will ensure you're able to do just that — improve business agility, increase productivity, and support any cloud or device as your future tech needs change. Download our e-book and find out how: To secure SaaS and web apps A single sign-on simplifies and secures log on To centralize routes to and from your data
Tags : 
    
Citrix Systems
Published By: AWS     Published Date: Jun 03, 2019
Companies worldwide are undergoing digital transformations. By modernizing applications, they can deliver better service to customers and keep pace in a competitive landscape. In many cases, Amazon Web Services (AWS) has helped companies modernize by implementing containers—and initiating cultural shifts—to streamline development. In this whitepaper, we discuss recommended best practices around containerization and how AWS can help you get started with containers today.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: HP Inc.     Published Date: Jun 03, 2019
As the changing workforce puts pressure on companies to adopt the use of mobile and personal devices, significant business trends, such as data analytics, the digitization of business functions and the blending of service offerings across industries, are also expanding the use of technologies. This expansion increases the boundaries of what’s possible, and it also creates risks.
Tags : 
    
HP Inc.
Published By: Schneider Electric     Published Date: May 31, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which can have both a positive and negative impact on their businesses.
Tags : 
emerging threats, user experience, digital transformation, schneider electric
    
Schneider Electric
Published By: FICO EMEA     Published Date: May 31, 2019
The telecommunications market is highly saturated. In most of the developed world, nearly everyone who wants a mobile phone has one. There are opportunities for carriers to increase service usage or upsell customers on higher-value devices or services, but each new account generally comes at a competitor’s expense—so customer retention is crucial. Telecom service providers need to reduce losses, prevent churn and maximise revenue on their offerings. FICO’s Best Next Action™ technology can be an important tool to achieve all of these objectives, either by presenting new offer terms or cross-selling other products and accessories to enhance the customer’s telecommunications experience—the handset upgrade, better financing terms, insurance on the handset or a subscription service for content. o Prevent account churn o Optimise service utilisation o Segment accounts o Tailor the contact method to the account
Tags : 
telecommunications, advanced analytics, telco, customer retention
    
FICO EMEA
Published By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : 
csp, advanced analytics, telco, improve credit risk, reduce fraud loss
    
FICO EMEA
Published By: HERE Technologies     Published Date: May 31, 2019
Rich, real-time location intelligence is shaping the future of the third-party logistics (3PL) industry, powering some of the most innovative new technologies behind the smartest, most efficient and environmentally sustainable 3PLs in the industry. Rapid growth in the industry over the next five years will see competition driving further technology and location intelligence innovation. This eBook predicts five ways in which this will result in smarter work patterns and new business-critical technologies. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
industry, solutions, tracking data, technologies, predictions, customer, automation, logistics
    
HERE Technologies
Published By: OutSystems     Published Date: May 30, 2019
The need for digital transformation dominates business strategy today, and there are two obvious consequences for IT. Demand for application development is at an all-time high, and speed and agility are more important than ever before.
Tags : 
    
OutSystems
Published By: OutSystems     Published Date: May 30, 2019
In its fifth year, the OutSystems State of Application Development Report is a comprehensive analysis of the challenges, priorities, and innovations that impact IT teams around the globe in this age of digital transformation.
Tags : 
    
OutSystems
Published By: OutSystems     Published Date: May 30, 2019
In its sixth year, the OutSystems State of Application Development Report provides a comprehensive analysis of the challenges, priorities, and innovations faced by IT teams around the globe, at a time when organizational agility has never been so important. Agility is the central theme of this year’s report because businesses and their IT organizations face a multitude of disruptive forces in 2019. The threat of digital disruption and the consequent need for digital transformation has been a driver of IT strategy for years. Add to that the current uncertain global economic outlook, and it becomes obvious why business leaders are so concerned about agility today. How will IT “step up to the plate” and ensure that their organizations have the speed and adaptability to thrive, despite uncertainty? This context serves as the backdrop to our sixth annual survey of IT professionals as we seek to understand the state of application development better. We set out with five critical questions
Tags : 
    
OutSystems
Published By: OutSystems     Published Date: May 30, 2019
In its fifth year, the goal of the OutSystems State of Application Development Report is to provide a comprehensive analysis of the challenges, priorities, and innovations faced by IT teams around the globe in this age of digital transformation. This analysis is based on the responses to a survey conducted in March 2018. More than 3,500 IT professionals from over 116 countries took part. Respondents worked in all kinds of industry, and in this concise summary of the report, we focus on specific findings related to the manufacturing sector. The need for digital transformation dominates business strategy today, and there are two obvious consequences for IT. Firstly, the demand for application development (app dev) is at an all-time high. Secondly, speed and agility are more important than ever before. This backdrop informed the themes we wanted to explore in this year’s survey, which set out to answer five critical questions: How are the app dev priorities of organizations adjusting
Tags : 
    
OutSystems
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Benefits i. In-time Delivery with ZERO defects ii. Scalable products with low maintenance costs Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Instructure     Published Date: May 30, 2019
The Future of Work: 10 Essentials for Winning Employee Development Your go-to guide for thriving in the changing face of work Employee development looks a lot different today than it did just a few years ago. This ebook details 10 trends that are crucial for keeping up with the ever-changing future of work. The modern workforce is a place where baby boomers, Gen X, millennials and now Gen Z all share the same Nespresso machine. That’s four distinct generations with different views, expectations and priorities. Companies will have to adopt new methods for just about everything—from recruitment and benefits to employee development and career planning. While there are several key differences between each generation in the modern workforce, how companies should treat them can be summarised in one word: individually. This ebook is designed to help HR and L&D professionals who want to turn their organisation into a learning environment well-equipped for the workplace of tomorrow, do ex
Tags : 
    
Instructure
Published By: Location3     Published Date: May 29, 2019
Facing increased competition in the marketplace from coworking space giants like WeWork, as well as additional independent coworking spaces, Intelligent Office was seeking to develop a more robust content strategy that focused on highlighting the different services offered at their workspaces and the benefits of each.
Tags : 
digital advertising, digital marketing, marketing, franchise, franchisor, multi-location business, content strategy, content, organic, seo
    
Location3
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Zaloni     Published Date: May 29, 2019
Steps to rapidly devlier business data through a unified data supply chain
Tags : 
    
Zaloni
Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
The Ohio State University Health Plan manages healthcare insurance benefits and wellness resources for the university’s 29,000 employees, as well as their spouses and dependents. The Ohio State University is one of the nation’s top 20 public universities, and its Wexner Medical Center ranked #3 among 104 academic medical centers that were included in the 2014 University Health System Consortium Quality and Accountability Study. The health plan, medical center and university work together to help deliver safe, efficient, patient centered care to its members.
Tags : 
    
Group M_IBM Q2'19
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.