service applications

Results 151 - 175 of 504Sort Results By: Published Date | Title | Company Name
Published By: Mitel     Published Date: Dec 20, 2016
With unified communications and collaboration (UCC), you can address these challenges by helping people to connect more efficiently and intuitively. You can use UCC to bring together multiple forms of communications, like voice, video and data services, and software applications into a single environment, making it easier to connect. Business processes improve as a result. When you embrace UCC in your business communications, you can increase employee collaboration and productivity in three major ways. First, it can reduce communications latency by making it easier to find the right person and get an answer to a business question. Second, it can help you to manage workflows by making it easier f
Tags : 
    
Mitel
Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Ping Identity     Published Date: Feb 12, 2016
A key technical underpinning of the cloud and the Internet of Things are Application Programming Interfaces (APIs). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface with services in the cloud.
Tags : 
    
Ping Identity
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Genesys     Published Date: May 10, 2016
In this eBook, Genesys highlights 10 key Customer Bill of Rights that focus on best practices that every caller expects from a self-service experience and that every business should strive to fulfill when designing IVR applications.
Tags : 
genesys, customer, bill of rights, customer experience, ivr, self service, communication, channel
    
Genesys
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA API Management is a robust, enterprise-grade solution that can enable the success of your API initiatives. The software provides industry-leading tools to rapidly create APIs from existing data assets, orchestrate legacy services and safely expose enterprise applications and services. The solution also allows you to quickly onboard, manage and enable the developers who will create innovative apps that add value to your business. And, just as importantly, CA API Management secures your enterprise data to meet the toughest compliance and regulatory standards, while providing you with full control over which apps, developers and partners can access your APIs.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: Splunk     Published Date: Nov 29, 2018
From protecting customer experience to preserving lines of revenue, IT operations teams face increasingly complex responsibilities and are responsible for preventing outages that could harm the organization. As a Splunk customer, your machine data platform empowers you to utilize machine learning to reduce MTTR. Discover how six companies utilize machine learning and AI to predict outages, protect business revenue and deliver exceptional customer experiences. Download the e-book to learn how: Micron Technology reduced number of IT incidents by more than 50% Econocom provides better customer service by centralizing once-siloed analytics, improving SLA performance and significantly reducing the number of events TransUnion combines machine data from multiple applications to create an end-to-end transaction flow
Tags : 
predictive it, predictive it tools, predictive analytics for it, big data and predictive analytics
    
Splunk
Published By: CA Technologies     Published Date: Sep 11, 2014
This paper provides a number of capabilities your organization should look for in a Service Virtualization solution, enabling your extended teams to get high quality applications to market faster, with lower cost and risk
Tags : 
service virtualization solution, application testing, getting applications to market, speeding up application delivery time
    
CA Technologies
Published By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : 
application protection, app protection, security, cloud, cloud computing, public cloud, security application
    
F5
Published By: F5     Published Date: May 12, 2016
This white paper reveals the results of implementing F5 were it provided intelligent and agile Infrastructure, highly available and secure application services and manage applications in the hybrid environment.
Tags : 
it infrastructure, infrastructure, security, application security management, security application
    
F5
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security, cloud security, applications, on premise
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: BMC Control M     Published Date: Jul 16, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : 
workload, automation, smart, bmc, wla, ema, itil, soa, bmc conrol-m
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : 
wla, ema, bmc control-m, soa
    
BMC Control M
Published By: BMC Control M     Published Date: Sep 15, 2009
This paper, from industry analyst firm Enterprise Management Associates, explores how workload automation can help IT reduce outages, consolidate vendors, improve integration, and cut costs. Learn more. Download the white paper, "IT Automation: Going Beyond the Obvious to Find Real Cost Savings."
Tags : 
bmc control-m, enterprise management associates, workload automation, wla, peoplesoft, sap, oracle, as/400, openvms, extract-transfer-load, etl, business service managemen, bsm, service level managemen, slm, mainframe, windows, unix, linux, custom applications
    
BMC Control M
Published By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 17, 2015
While the Google Chrome platform is ideal for accessing Google Apps, SaaS and other cloud-based services, Microsoft Windows applications continue to play an essential role in most organizations. Read this paper to learn more.
Tags : 
google chrome, windows, cloud, microsoft
    
Citrix Systems
Published By: Data Stax     Published Date: Oct 14, 2016
Financial services companies engage with customers across multiple channels and across a range of financial products. This wealth of customer information is often stored in isolated data silos. Building a 360° view of the customer can directly impact customer experience and help banks grow customer retention, upsell products and provide compelling interactions. This paper examines the challenges these institutions face when creating a 360° view of every customer interaction, what database requirements the lines of business should look into, and use cases to benefit from by leveraging DataStax Enterprise, the database platform purpose built to power cloud applications.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Data Stax
Published By: KANA®, A Verint® Company     Published Date: Aug 07, 2014
Save time and money by taking advantage of existing resources in a new way. KANA offers a unified, omni channel desktop that allows you to transform your customer experience without the cost and complexity of rip and replace.
Tags : 
kana, customer experience, case management, process improvement, empowering employees, maturity assessments, customer satisfaction, loyalty
    
KANA®, A Verint® Company
Published By: HP     Published Date: Feb 02, 2015
Diversified Agency Services serves a global network of marketing services and specialty communication companies. To provide its internal customers and their clients with safe, secure access to applications and services, DAS worked with HP on a multi-year project to consolidate its IT networks and implement HP SDN cloud-enabled networking. These steps have vastly simplified DAS IT operations, enabling it to deliver a faster, more agile, and more secure network. Read this case study to learn more.
Tags : 
    
HP
Published By: AppDynamics     Published Date: Sep 21, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: