Skip to main content
 

it applications

Results 1 - 25 of 2797Sort Results By: Published Date | Title | Company Name
Published By: Kronos, Inc.     Published Date: Jan 07, 2015
HealthLeaders' survey on workforce management queried leaders from a cross-section of U.S. healthcare organizations, including hospitals, health systems, physician organizations, and long-term care/skilled nursing facilities. The 150 respondents represent executives across all disciplines — administration, clinical, operations, finance, marketing, and information. In the next three to five years, hospitals, health systems, and other patient service providers expect to augment their time-and-attendance and payroll systems with integrated applications that enable more sophisticated data crunching around labor analytics, acuity management, and staffing assignments. The goal? To convert the workforce from overhead to asset — a flexible, agile asset that will help organizations succeed in an increasingly demanding regulatory and competitive environment.
Tags : 
    
Kronos, Inc.
Published By: Dell APAC     Published Date: May 30, 2019
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs.
Tags : 
    
Dell APAC
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
Published By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
Companies worldwide are undergoing digital transformations. By modernizing their applications, they can deliver better service to customers, and keep pace in a competitive landscape. In many cases, AWS has helped companies modernize by implementing containers—and initiating cultural shifts— to streamline development. In this eBook, we discuss best practices in containerization and how you can get started today with containers on AWS.
Tags : 
containers, developers, application, aws
    
Amazon Web Services EMEA
Published By: NetApp APAC     Published Date: Jul 04, 2019
This IDC study provides an evaluation of 10 vendors that sell all-flash arrays (AFAs) for dense mixed enterprise workload consolidation that includes at least some mission-critical applications. "All-flash arrays are dominating primary storage spend in the enterprise, driving over 80% of that revenue in 2017," said Eric Burgener, research director, Storage. "Today's leading AFAs offer all the performance, capacity scalability, enterprise-class functionality, and datacenter integration capabilities needed to support dense mixed enterprise workload consolidation. More and more IT shops are recognizing this and committing to 'all flash for primary storage' strategies."
Tags : 
    
NetApp APAC
Published By: HERE Technologies     Published Date: Jul 11, 2019
Supply chain managers are increasingly leveraging location intelligence and location data to raise visibility throughout their whole logistics process and to optimize their delivery routes. Leveraging this data requires an ever-more-robust technology stack. As supply chain technology stacks become more complex, diverse and defined by legacy system integrations, Application Program Interfaces (APIs) are becoming essential to making stacks scale, allowing supply chain managers to better meet the demands of the new generation of consumers. Innovative location APIs provide supply chain stacks and applications with: Greater agility Contextual intelligence Real-time data implementation Speed Scale Introducing new technology into an organization can sometimes be daunting. As one of the world’s leading location platforms, HERE shares insights and tips to streamline the supply chain technology integration across the whole organization.
Tags : 
here technologies, supply chain, mapping
    
HERE Technologies
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
Welcome to Secure Hybrid Cloud For Dummies, IBM Limited Edition. The hybrid cloud is becoming the way enterprises are transforming their organizations to meet changing customer requirements. Businesses are discovering that in order to support the needs of customers, there is an imperative to leverage the highly secure IBM Z platform to support missioncritical workloads, such as transaction management applications. The Z platform has been transformed over the years. The combination of z/OS, LinuxONE, open APIs, and the inclusion of Kubernetes has made IBM Z a critical partner in the hybrid cloud world. Businesses can transform their IBM Z environments into a secure, private cloud. In addition, through IBM’s public cloud, businesses may take advantage of IBM Z’s security services to protect their data and applications.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 13, 2019
Beneath the Surface of Digital Transformation: Why Leaders Modernize Enterprise Applications 
Tags : 
    
Group M_IBM Q3'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Epicor     Published Date: Apr 12, 2019
As a business leader of a manufacturing company, you may be experiencing the challenges of competing in a digitally transformed marketplace. In our increasingly digital world, your ability to grow depends on how your business leverages the latest best-practice technology. Is your enterprise resource planning (ERP) system keeping pace? In this Forrester Research report—presented by Epicor Software—you’ll discover the latest insights on software as a service (SaaS) business solutions. SaaS business applications will evolve in the cloud to new levels of value in: Intelligence Flexibility Connectivity User experience The report also provides predictions and recommendations that will help guide your manufacturing business with its strategic growth initiatives. Download the report to learn more, and discover why you should change the way you think about cloud.
Tags : 
epicor erp, saas, applications
    
Epicor
Published By: Apptio     Published Date: Jul 16, 2019
Getting AppRat right is no easy task. We know how complicated identifying, prioritizing and sizing business-critical applications can be in large, enterprise organizations. So, we’ve used more than a decade worth of experience to identify the top 8 most critical considerations for a successful application rationalization initiative. Download the Application Rationalization Framework eBook to: - Replace guesswork with facts. - Stop counting licenses and start defining business value. - Reject one-and-done initiatives that aren't repeatable.
Tags : 
    
Apptio
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Cohesity     Published Date: Aug 09, 2019
In a context of mass data fragmentation on-premises and in the cloud, organizations now struggle with the compounded complexities brought about by modern workloads such as containers, NoSQL/NewSQL databases, and SaaS applications. These new workloads are turning traditional backup and recovery approaches on their head—in particular, in Microsoft Office 365 deployments for which new backup, recovery, and data management schemas must be deployed.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
IT organizations everywhere are undergoing significant transformation to keep pace with the needs of their businesses. They’re tasked with consolidating data centers and migrating both workloads and data to the cloud. The transition has been easier for some than others. As hybrid architectures increasingly become the norm, how are enterprises gaining complete visibility, simplifying management, and making use of all of their data—both on-premises and in the cloud? Five enterprises explain how they’ve replaced multiple products that created legacy data silos with Cohesity – a single, hyperconverged softwaredefined platform with native Microsoft Azure integration for simplified secondary data and applications. For them, Cohesity and Azure together boost IT agility while lowering costs, solving critical secondary data challenges from long-term retention, storage tiering, test/dev, disaster recovery and cloud-native backup in a proven hybrid cloud architecture.
Tags : 
    
Cohesity
Published By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : 
curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc
    
NEC
Published By: MuleSoft     Published Date: Jun 27, 2019
Banks of all sizes, from multinational firms to regional credit unions, face unparalleled pressure to digitally transform in the face of evolving customer expectations. Learn how a top 10 bank partnered with MuleSoft to address these pressures by developing an application network to rapidly modernize legacy systems, digitally transform mortgage lending, and accelerate Salesforce implementation. Read this whitepaper to learn: How banks can leverage APIs to accelerate integration between core banking systems, legacy applications, and modern SaaS endpoints. The step-by-step approach a top 10 bank took to build a Center for Enablement (C4E) and transform their SDLC to accelerate application development. How the bank created unified customer experiences across different product lines, from mortgages to wealth management, across in-person, and digital engagement channels.
Tags : 
    
MuleSoft
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.