HIT Consultant Insightful coverage of healthcare innovation
 

app dev

Results 201 - 225 of 1713Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: May 28, 2014
See what analyst 451 Research has to say about Control-M and how it is continuing to modernize with the addition of Workload Change Manager, which aims to make creating and verifying batch jobs and workflows easier for developers.
Tags : 
    
BMC Software
Published By: BMC Software     Published Date: May 28, 2014
This paper, "Workload Automation – From Application Development to Digital Service Delivery," describes how a workload automation solution can eliminate the manual processes developers now use to define batch workflows and communicate them to schedulers.By extending the use of workload automation to developers, organizations can implement applications faster, slash costs, and increase service quality.
Tags : 
big data, hadoop
    
BMC Software
Published By: BMC Software     Published Date: Jul 22, 2015
This CIO eBook explores how to deploy Hadoop applications faster and easier with a workload automation solution that simplifies and automates Hadoop batch processing and connected enterprise workflows. Read the eBook to learn: • The role—and challenges—of Hadoop in Big Data application development • Six considerations for a Hadoop proof-of-concept initiative • How to connect Hadoop to other enterprise data sources and applications
Tags : 
big data, hadoop applications, hadoop development
    
BMC Software
Published By: BMC Software     Published Date: Jul 22, 2015
Managing Hadoop batch processing may consume a significant portion of application developers’ time and effort, which drives up application development times and costs. This paper from BMC discusses the obstacles IT organizations face in developing and managing Hadoop jobs and workflows and how a workload automation solution can remove these barriers.
Tags : 
hadoop, batch jobs, workflow, scheduling tools, automation
    
BMC Software
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management
    
Box
Published By: Box     Published Date: Nov 24, 2015
By leveraging Microsoft productivity applications and the Box content platform, companies are collaborating more securely and seamlessly across their organizations, with outside parties and on any device.
Tags : 
box, office 365, productivity, collaboration, content management
    
Box
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: Bright Horizons     Published Date: Dec 14, 2016
Study shows a decidedly scientific approach to benefits development and management, and illustrates emerging trends of benefits that are becoming “need to play,” as well as those growing substantially in popularity, emerging as “need to win.”
Tags : 
employee benefits, trending benefits, tuition assistance program, value proposition, employee well-being, workforce productivity, retention, engagement, recruitment, child care, back-up child care, child care centers, dependent care, employee development, human resources
    
Bright Horizons
Published By: Bronto     Published Date: Dec 03, 2015
Bronto has teamed up with Apparel Magazine to shed some light on Millennials and how they are using mobile devices. Download our new infogram and learn!
Tags : 
bronto, mobile, millenial, mobile device, social media
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
With a growing number of marketing application available, marketing terms are struggling to see differences among them. Meanwhile, IT teams are bogged down with development and maintenance requests to migrate or manage the use of multiple platforms already in use. Choosing a marketing technology partner is a total-revenue-performance decision. Ask questions about integration and scalability. Find partners whose marketing automation is built to scale with your business, and select vendors whose teams provide the critical support and services you'll need along the way.
Tags : 
bronto, integration, e-commerce, marketing automation, platforms, internet retailers, business growth, revenue generation, buzzwords, solutions
    
Bronto
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Bronto     Published Date: Jul 10, 2017
With a growing number of marketing applications available, marketing teams are struggling to see differences among them. Meanwhile, IT teams are bogged down with development and maintenance requests to migrate or manage the use of multiple platforms already in use. Gartner’s 2016-2017 CMO Spend Survey found that marketing departments are spending 38% of their tech budgets on external development services and cross-charges from internal IT teams. Strategic marketing and IT leaders are looking for ways to streamline technology and eliminate solutions that limit integrations and scalability. It’s important to look at the resources required to maintain the marketing applications you use and compare them to other options available in the marketplace. Choosing a marketing technology partner is a total-revenue-performance decision. Ask questions about integration and scalability. Find partners whose marketing automation is built to scale with your business, and select vendors whose teams pro
Tags : 
marketing automation, commerce, gartner, integration, scalability
    
Bronto
Published By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service
    
BubblewrApp
Published By: Building Engines     Published Date: Mar 18, 2019
The volume of technology solutions available to CRE professionals is tremendous, and new entrants are emerging at a faster pace than ever. To succeed in this environment, highly effective CRE organizations behave differently than their peers in how they approach, select, and adopt technology. For CRE professionals seeking to develop a more technologically mature organization, the findings in this report provide a few clear guidelines.
Tags : 
    
Building Engines
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : 
audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
    
Bulldog Solutions
Published By: CA Mainframe     Published Date: Sep 12, 2008
This paper describes the approaches in MDD, explains how CA Gen fits into the larger picture of application development, and relates customer experiences to underpin the quiet success. Access this White Paper now to learn how to CA Gen goes one step further!
Tags : 
model, application development, software development, ca mainframe, mainframe
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: CA Tech     Published Date: Jan 04, 2016
This white paper illustrates how Mobile application analytics can play a vital role in your DevOps strategy that can help your company create a superior end-user experience. Providing deep insight, this discipline produces benefits for a variety roles across the organisation.
Tags : 
customer experience, mobility, mobile application, mobile app, mobile application analytics, devops, application management
    
CA Tech
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.