Skip to main content
 

vas

Results 176 - 200 of 562Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Using CA Live API Creator, you can execute business policies using Reactive Logic. You write simple declarative rules defining relationships across data fields, and they’re automatically enforced when changes occur—just like formulas in a spreadsheet. Reactive Logic should cover most of your application requirements, but you also have the ability to configure event processing or external callouts using server-side JavaScript or imported Java® libraries if you so desire.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Desea ofrecer innovaciones, lanzar aplicaciones más rápido y aprovechar nuevas oportunidades, pero las infraestructuras y aplicaciones heredadas no se lo permiten. Cámbiese a una arquitectura moderna a través de la descomposición de aplicaciones monolíticas en microservicios ágiles, creados, gestionados y escalados de manera independiente. Su negocio podrá actuar más rápido y los desarrolladores estarán encantados con el acceso sencillo a las API, que les ofrece la libertad de centrarse en la experiencia de los clientes.
Tags : 
pequeños en tamaño, utilizan mensajería, delimitados por contextos, desarrollados de forma autónoma, descentralizados, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
En la actualidad, el software se encuentra en el núcleo de la metodología de las empresas para competir y funcionar de forma eficaz en el siglo XXI. Durante mucho tiempo, la tecnología ha desempeñado un papel decisivo en la estrategia empresarial. Sin embargo, la transformación digital ha ampliado las iniciativas de transformación y aceleración del ciclo de entrega de software, así como los procesos de desarrollo de aplicaciones, a un imperativo que se extiende por toda la empresa y se interseca cada vez más con la otra preocupación que acucia a los directivos: la ciberseguridad.
Tags : 
ampliar el control, automatizar la autorizacion, escalar e integrar, facilitar tanto la monitorizacion, incorporar la capacidad
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
Las cuentas de usuario con privilegios, ya se usurpen, sean objeto de abuso o, simplemente, se usen de forma incorrecta, se encuentran en el corazón de la mayoría de las infracciones relativas a datos. Los equipos de seguridad evalúan, cada vez más, soluciones de gestión de accesos con privilegios (PAM) completas para evitar el perjuicio que podría provocar un usuario malintencionado con privilegios altos o un usuario con privilegios que está cansado, estresado o que, sencillamente, comete un error. La presión que ejercen los ejecutivos y los equipos de auditoría para reducir la exposición de la empresa aseguran el esfuerzo, pero las soluciones de PAM completas pueden acarrear costes ocultos, según la estrategia de implementación adoptada.
Tags : 
almacen de contrasenas, monitorizacion de contrasenas, entornos hibridos
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Nov 06, 2017
Don’t Let Non-Compliance Fines Impact your Bottom Line and Reputation. Manual reconciliation of vast amounts of data is an arduous process, involving countless staff hours that includes backtracking, often ending without an audit trail to demonstrate how the balance sheet was derived. Automated processes offer a solution to this risk-laden adventure. In the white paper, The Buried Costs and Hidden Risks of Manual Reconciliation for Insurers, learn how to calculate and compare the costs of a manual system versus an automated system.
Tags : 
manual reconciliation, automated reconciliation for insurers, automated reconciliation, automated insurance reconciliation, automated reconciliation system, non-compliance, data reconciliation
    
Fiserv
Published By: IBM Watson Health     Published Date: Oct 27, 2017
With the proliferation of health and fitness data due to personal fitness trackers, medical devices and other sensors that collect real-time information, cognitive computing is becoming more and more important. Cognitive computing systems, with the ability to understand, reason and learn while interacting with human-generated data, enable providers to find meaningful patterns in vast seas of information. IBM Watson Health is leveraging the power of cognitive computing to help providers make data-driven decisions to improve and save lives worldwide, while controlling healthcare costs. Read our whitepaper and learn about the new era of cognitive computing and how it can improve health outcomes, optimize care and engage individuals in making healthy choices.
Tags : 
cognitive computing, data, insights, health outcomes, healthcare delivery, healthcare costs, care, healthy choices
    
IBM Watson Health
Published By: Group M_IBM Q2'19     Published Date: Mar 29, 2019
The vast increase in dark data—all of the unstructured data from the Internet, social media, voice and information from connected devices—is overwhelming many executives and leaving them completely unprepared for the challenges their businesses face.
Tags : 
    
Group M_IBM Q2'19
Published By: Beqom     Published Date: Jun 14, 2019
New Techniques That Will Drive Revenue in 2019 If you’re ready to move beyond simple calculations and realize the vast potential of data driven selling, you’re ready to explore the next generation of SPM platforms. Download the report to learn how the modern technologies like Artificial Intelligence and Machine Learning, can give your sales reps a roadmap to better performance and give sales management insights that will enable them to achieve more profitable sales.
Tags : 
    
Beqom
Published By: Teradata     Published Date: Jan 27, 2015
There is little question about the role that SAP® BW has historically played in the SAP® infrastructure. It has been a key element in unlocking SAP’s vast and complex store of operational data housed in their ERP applications. One can easily think of BW as the original Rosetta Stone for this data. For without it, end users and IT shops would have faced daunting coding tasks attempting to cull the proper elements out of the SAP® ERP code for reporting. However, BW and the associated tools around it were rudimentary to begin with, and have not advanced to where it meets the pressing demands of todays’ end users. The New Rosetta Stone 2.0 for SAP® ERP Data —And More. Download now!
Tags : 
rosetta stone, data, erp, sap®, teradata
    
Teradata
Published By: Taleo     Published Date: Dec 30, 2009
Integrated Talent Management: Improving Business Results through Visibility and Alignment: Research shows the vast majority of organizations have only achieved integration across two or more elements of talent management, those that have are reporting superior performance gains.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment
    
Taleo
Published By: Infor     Published Date: Mar 07, 2017
En 2015, la mayoría de los fabricantes obtuvieron unos modestos niveles de rentabilidad debido a los bajos precios de los productos básicos y a la inflación salarial. Este entorno dio lugar a que se empezara a considerar el rol que las nuevas tecnologías ”disruptivas” podrían tener en las empresas manufactureras y posibles estrategias de inversión.
Tags : 
software, manufacturing software
    
Infor
Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
As with most innovations in business information technology, the ultimate truth about cloud lies somewhere in between. There is little doubt that cloud-based infrastructures offer an immediate opportunity for smaller organizations to avoid the costly investment needed for a robust on-premises computing environment. Data can be found, processed and managed on the cloud without investing in any local hardware. Large organizations with mature on-premises computing infrastructures are looking to Hadoop platforms to help them benefit from the vast array of structured and unstructured data from cloud-based sources. Organizations have feet in both cloud and on-premises worlds. In fact, one could easily argue that we already live in a “hybrid” world.
Tags : 
    
IBM
Published By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security
    
McAfee
Published By: McAfee     Published Date: Jun 03, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security
    
McAfee
Published By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : 
ngfw, mcafee, next-generation firewall, advanced evasion techniques, security
    
McAfee
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: F5 Networks Inc     Published Date: Jan 25, 2018
With digital transformation reshaping the modern enterprise, applications represent a new class of assets and an important source of differentiation. The ever-more-competitive digital economy requires that your applications be delivered with unprecedented speed, scale, and agility, which is why more and more organizations are turning to the cloud. This explosive growth of apps hosted in the cloud creates a world of opportunities—and a whole new set of challenges for organizations that must now deploy and manage a vast portfolio of applications in multi-cloud environments. Automation and orchestration systems can help streamline and standardize IT processes across traditional data centers, private clouds, and public clouds. But with rapid innovation come concerns about security and delivering a consistent experience across environments.
Tags : 
application delivery, digital transformation, cloud technology, application, multi-cloud enviornment
    
F5 Networks Inc
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
    
Forrester
Published By: FireEye     Published Date: Apr 07, 2013
Malware activity has become so pervasive and attacks so successful at penetrating legacy defenses.
Tags : 
fireye, threat report, malware, threat landscape, legacy defenses, advanced persistent threat, apt
    
FireEye
Published By: HP     Published Date: Feb 02, 2015
Diversified Agency Services serves a global network of marketing services and specialty communication companies. To provide its internal customers and their clients with safe, secure access to applications and services, DAS worked with HP on a multi-year project to consolidate its IT networks and implement HP SDN cloud-enabled networking. These steps have vastly simplified DAS IT operations, enabling it to deliver a faster, more agile, and more secure network. Read this case study to learn more.
Tags : 
    
HP
Published By: DrFirst     Published Date: Mar 13, 2015
Sebasticook Valley Health’s Emergency Department found that when it came to obtaining medication history, DrFirst’s MedHx(SM) solution provided vast improvements over the built-in feed from their integrated electronic medical records system. The hospital did a side by side comparison of MedHx(SM) and their existing feed, and determined that MedHx(SM) provided superior results, which reduced staff time spent on medication reconciliation, improved patient safety and enabled the hospital pharmacy, as well as doctors and nurses, to be more proactive in pulling medication history upon patient admission.
Tags : 
drfirst, hospital, solutions, medhx, emr, electronic, medical, records
    
DrFirst
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : 
endpoint, management, business, workforce, desktop, device, mobile
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.