Skip to main content
 

technology

Results 51 - 75 of 4945Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A lot can be learned from getting a group of experienced CIOs in a room and encouraging them to talk freely about the topics at the front of their minds. Rarely do they want to discuss technology, and even the latest IT industry ‘hot topics’ usually don’t get that much airplay. Conversations, and sometimes quite heated debates, tend to revolve around broader business-related trends, how these are changing stakeholder and user behaviour and expectations, and how best to respond to such dynamics.
Tags : 
development tools, code management, software build, service virtualisation, automation management, platform building, sdlc, mttr
    
CA Technologies EMEA
Published By: DocuSign UK     Published Date: Nov 16, 2017
This best practices paper outlines eight important ways that IT teams can make meaningful progress in their digital transformations.
Tags : 
digital, practices, professional, technology, esignature, docusign
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 16, 2017
This best practices paper outlines seven important ways that HR teams can make meaningful progress in their digital transformations.
Tags : 
professionals, team, digital, transformations, technology, optimization
    
DocuSign UK
Published By: Red Hat     Published Date: Jan 02, 2018
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jan 02, 2018
Once upon a time, several generations ago (in technology years), IT departments were internal departments, focused on maintaining infrastructure and services within the company. Some companies may have had external-facing services, particularly web services, but this was still generally a narrow and restricted area. IT wasn’t a revenue-generating or strategic department; it was a supporting environment viewed as a cost center. One of the outcomes of an infrastructure-focused environment is that developers lost a sense of what their code was doing. Release cycles were long, and changes were slow. A developer would work on something and throw the code into testing or operations, and it would be released months later. Because of that long lead time, engineers lost the joy of being a developer—of creating something and seeing it work in real life. One of the great, powerful changes with digital transformation and related cultural and technology changes like DevOps is that it reintroduce
Tags : 
    
Red Hat
Published By: Group M_IBM Q1'18     Published Date: Jan 08, 2018
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing.
Tags : 
database, applications, data availability, cognitive applications
    
Group M_IBM Q1'18
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Epicor     Published Date: Jan 08, 2018
Today’s manufacturers are looking to increase productivity, assure factory uptime, and thrive despite the changing manufacturing landscape. When you combine an enterprise resource planning (ERP) system with a manufacturing execution system (MES), you’ll find these goals become more achievable because the technology is designed to simplify the modern manufacturing enterprise. You want your organization to operate more efficiently and flexibly. You want to reduce waste and become as lean and efficient as possible. Most importantly, you want to keep pace with the changing competitive environment. These solutions can help with all of that. Read the Epicor eBook, Harness the Power of MES, to learn more about how technology can help your business streamline, compete, and grow.
Tags : 
enterprise resource planning (erp), manufacturing execution system (mes), manufacturing, mattec mes
    
Epicor
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Polycom     Published Date: Dec 18, 2017
The traditional office space is dead. Chased out by the combining forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Studies show that up to 82% of knowledge workers feel they need to collaborate with others throughout the day to get work done. Yet, according to an IBM study, 78% say they struggle to effectively connect their workplace and help people collaborate—either virtually or face-to-face1. Why? The answer is not all collaboration is alike. Download this report to get the latest trends in office space utilization and find out about the three main types of collaboration and how they need to be supported differently in the work environment. The office may be shrinking, but it’s not going away anytime soon. If anything, the rising demand for more teamwork and collaboration makes the configuration of workspaces more important than ever.
Tags : 
shared office spaces, collaboration, polycom, realpresence centro, transforming workspaces, video conferencing, huddle rooms
    
Polycom
Published By: NEC     Published Date: Jan 28, 2010
Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.
Tags : 
nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology
    
NEC
Published By: Frontier Communications     Published Date: Dec 29, 2017
We’ve all heard the phrase “you have to spend money to make money,” and while it may be accurate to some extent, businesses also have to keep a close eye on their budgets. As you establish your technology allowance and evaluate tools to help grow your business, consider these five items as absolute essentials.
Tags : 
    
Frontier Communications
Published By: Frontier Communications     Published Date: Dec 29, 2017
As a business owner, you’re used to wearing several hats. However, you don’t always have the time or expertise needed for those various roles. So what do you do when you need help but don’t have the resources to bring on a full-time team member? The answer could lie in temporary consulting. If the role you’re struggling with most is in the information technology (IT) department, bring in an IT consultant to solve important technological problems and/or implement new systems. Hiring a temporary IT consultant to work on specific tasks can be more time and cost efficient than hiring a full-time IT employee. Here’s how to find the right IT consultant.
Tags : 
    
Frontier Communications
Published By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
    
Frontier Communications
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 05, 2008
Because business success is tightly fused with technology, IT costs are rising, and this trend is expected to continue. As a result, businesses are demanding that IT be more than a static resource. IT is expected to deliver business results with a measurable contribution to the organization's bottom line.
Tags : 
asg, cmdb, bsm, itil, paradigm, btsm, sla, configuration management
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob
    
ASG Software Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.