Skip to main content
 

time app

Results 201 - 225 of 1074Sort Results By: Published Date | Title | Company Name
Published By: New Relic     Published Date: Apr 07, 2015
Are you an AWS user looking to accelerate time to market? Lower costs? Or avoid painful mistakes as you migrate your applications to the Cloud? Whether you’ve already moved to the Cloud or are getting ready to migrate, New Relic helps Amazon Web Services (AWS) users improve the performance and end-user experience of their applications.
Tags : 
    
New Relic
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"It is very well understood that Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements and remain competitive many companies are turning to cloud computing. Companies thus need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. Oracle understand the need for IT organizations to move to cloud computing at the same time also recognizes that moving to the cloud is a multi-step journey that starts with standardization and consolidation of IT infrastructure and ends by moving applications and data to the cloud. The PDF is meant to help you gauge through the Oracle’s SPARC servers and give you an experience of simplified journey to the cloud by using the same technology for both cloud and on-premises deployments. No matter where your IT organization is on the journey to the cloud SPARC servers will be an i
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: CA Technologies     Published Date: Mar 21, 2014
This study of 1,300 senior IT decision-makers worldwide proves IT leaders recognize they must change how their organizations work to accelerate time to market, improve software quality, speed application development and meet growing customer demand.
Tags : 
devops, software, it automation, visualization, application
    
CA Technologies
Published By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
    
Optimizely
Published By: JBoss Developer     Published Date: Oct 21, 2016
CenturyLink needed to optimize operational cycle time and save money within its IT setup, including reducing time to deploy applications. The company migrated from Oracle to Red Hat and selected Red Hat JBoss Fuse to integrate its applications and incoming data. The new solution has increased IT agility while lowering costs.
Tags : 
software, flexibility, customer agility, competitive advantage, open source
    
JBoss Developer
Published By: bChannels     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
    
bChannels
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: Cisco     Published Date: Oct 08, 2018
Today more than ever, business wins depend on teamwork. And the teams that make things happen are bigger, more diverse, and more distributed than ever. People are working at home, in coffee shops, and on the road. They span multiple time zones. They use every imaginable device, relying heavily on their mobile phones. They grapple with deadlines because their tools don’t connect. With so much to manage, people are challenged to be truly present and focused in the moment. To make the most of each opportunity and maintain business momentum, they need tools that allow them to work intuitively. Effortlessly. That fade into the background, leaving them free to keep focused, stay engaged, get inspired, innovate. That allow them to connect as if they were in person, when they’re not. To learn from industry experts on how collaboration works, Download Report!
Tags : 
collaboration, workspace transformation, workforce transformation, virtual meetings, digital transformation, webex, webex meeting, webex teams
    
Cisco
Published By: Gigamon     Published Date: Feb 20, 2019
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Schneider Electric     Published Date: Apr 23, 2019
The supply chain for manufacturers and distributors is facing challenges around increased analytics, multichannel fulfillment, talent shortages, and the use of new technologies such as wireless, augmented reality, robotics and machine-to-machine (M2M). At the same time, there is continued focus on cost reduction and sustainability. The Industrial Internet of Things is driving a huge transformation as it increases the interconnection between connected devices and analytics. The smart manufacturing enterprise can seize opportunities to maximize efficiency and safety through networking and intuitive collaboration with its users. This eBook shares practical steps to follow for a smart material handling and logistics approach.
Tags : 
material handling, logistics, conveying
    
Schneider Electric
Published By: Genesys     Published Date: Oct 16, 2013
Enterprise Workload Management gets the right work to the right person at the right time, eliminating the outdated manual distribution of work model. Enterprise Workload Management finally gives organizations the ability to correlate the work that customer service interactions create in the front office -- with the best resource within the organization required to complete that work in the back office. Enterprise Workload Management ensures that the highest priority work is being handled by the right resource, and gives managers real-time visibility into when the work will be completed, as well as reports that show the outcomes of the work. Customers get notified when an order or application is processed instead of waiting to hear or having to repeated call back. Employees get specific coaching and training plans based on the results of their work.
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm
    
Genesys
Published By: SumTotal Systems     Published Date: Oct 10, 2013
The war for talent is back. But this time, the way to win it isn’t by solidifying your employment brand or ramping up your recruiting machine. In fact, there are probably plenty of people aware of and even applying to your jobs. So why is it still so hard to find the right talent?
Tags : 
sumtotal, sumtotal systems, hrms consolidation, sumtotal exlixhr, exlixhr, elixhr platform, hris system, sumtotal application, master data management, mdm, talent expansion, human resources, human resources technology, talent, recruiting
    
SumTotal Systems
Published By: Monetate     Published Date: Dec 18, 2014
You have 60 minutes to capture your website visitor’s attention. Within that timeframe, nearly 75% of your customers will visit your site, make a decision on what to buy, and complete the checkout process. If they don’t, chances are, they’ll move on. Regardless of the device a customer uses or the channel from which a customer is referred, nearly 75% of all purchases will be made in that window. And you’ll end up learning whether your customer acquisition and retention costs were worth it. Given the enormity of this statistic, we’re taking an in-depth look at that first hour in this EQ: that happens when, how customers behave, and what you should be doing to convert the most customers possible.
Tags : 
retention costs, benchmark data, customer acquisition, ecommerce quarterly, website development, emerging marketing, crm & customer care, marketing research
    
Monetate
Published By: MarkLogic     Published Date: Sep 29, 2017
The clock is ticking: It’s time to future proof your data for MiFID II (and future regulations). Learn how to accelerate your MiFID II Compliance--within 30 days. Download our Quick Start Guide, designed to get you up and running with the major components and related processes for MiFID II, including an approach for building a fully integrated regulatory reporting solution. In the Quick Start Guide, we’ll cover: - What our consulting service can help you accomplish in 30 days - Key factors for your success - How we work - Why financial institutions trust MarkLogic for successful MiFID II implementations • CTA Button: o Get the Quick Start Guide
Tags : 
    
MarkLogic
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: Dell EMC     Published Date: Aug 22, 2017
Data is the foundation of the digital economy, but managing data growth poses a big challenge as organizations ramp up cloud adoption. Whether your organization is adopting a hybrid cloud strategy or building modern apps in the cloud, there are many challenges that can limit your effectiveness. With Isilon CloudPools and ECS, you can take advantage of cloud capabilities without a disruptive time-consuming migration of your data. In this webinar, we’ll discuss how Dell EMC puts you in control with a flexible cloud design, allowing you to take an application-centric approach to your data platform.
Tags : 
    
Dell EMC
Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors – And How To Fix Them Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t part of an organization’s core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Brocade     Published Date: Jun 07, 2016
New research shows 77% of organizations believe poor application performance at peak times is impacting revenue. Discover how to increase online revenue with faster applications. Learn more in the report: Why Smart Organizations Maximize App Performance.
Tags : 
applications, e-commerce, sales, application performance, revenue, online revenue, application speed, app performance
    
Brocade
Published By: Dynatrace     Published Date: May 24, 2016
This guide, compiled from numerous client interviews, best practices and real-life project experiences, will: - Walk you through tools like the Gartner Magic Quadrant - Provide organized criteria to evaluate vendor capabilities in detail - Define why these criteria matter - Give you an example of the typical evaluation process and timeline for an Application Performance Management buyer
Tags : 
dynatrace, vendor selection, gartner magic quadrant, application performance management
    
Dynatrace
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.