HIT Consultant Insightful coverage of healthcare innovation
 

it as service

Results 501 - 525 of 2870Sort Results By: Published Date | Title | Company Name
Published By: FinancialForce     Published Date: Aug 20, 2019
Not all cloud models are created equal The Professional Services industry has seen steady year-on-year growth and this has prompted many services organisations to adopt a cloud based approach as they look to streamline business processes and improve profitability. With this in mind we've identified the top 6 Questions to Ask About Cloud Professional Services Automation (PSA) and how it can help solve many common business challenges. Download this guide and get insight into:
Tags : 
    
FinancialForce
Published By: Riverbed     Published Date: Feb 26, 2015
Use this Buyer’s Guide to identify the capabilities that will help you increase end-user satisfaction through a better quality of service.
Tags : 
performance management, quality service, network performance, application performance, vendor profile
    
Riverbed
Published By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, you’ll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements you’re able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
    
Enterprise Mobile
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: CA Technologies     Published Date: Feb 13, 2015
IT services are all about people, and the people’s most precious resource is time. They want to be more productive, but service management tools haven’t always helped. CA Cloud Service Management is a leap forward, a powerful but flexible solution that is built for speed—rapidly accelerating time-to-value where other SaaS solutions fall short. With CA Cloud Service Management, you can implement in days, configure without programmers, and automate end-user requests. A true SaaS solution means you get the latest capabilities the minute they are available and simplified pricing gives you predictable costs—no nickel and diming or haggling over complex pricing charges.
Tags : 
cloud monitoring, cloud service management, data, data management, data sheet, it services
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
L’outil de création d’API, CA Live API Creator, crée des back-ends applicatifs exposant des API REST/JSON à l’échelle de l’entreprise pour l’accès aux données et aux applications existantes. Cet outil permet aux développeurs de créer de nouvelles API REST rassemblant les données de différentes sources, par simple configuration. Ils peuvent étendre ces dernières en mettant en place des règles métier déclaratives, un traitement des événements via JavaScript et de la sécurité basée sur les rôles.Le modèle déclaratif de CA Live API Creator permet également de disposer de systèmes très évolutifs et fiables. Ses services optimisés sont plus efficaces et moins fragiles que les services codés manuellement par des développeurs et des architectes qualifiés
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Live API Creator erstellt Back Ends von Anwendungen, die REST/JSON-APIs der Enterprise-Klasse offenlegen und den Zugriff auf bestehende Daten und Anwendungen ermöglichen. So können Entwickler neue REST-Endpunkte erstellen, durch die sich Daten per Mausklick mit unterschiedlichen Datenquellen verbinden lassen. Verantwortliche erhalten die Möglichkeit, APIs mit deklarativen Unternehmensregeln, JavaScript-Ereignisverarbeitung, rollenbasierter Security und interaktivem Testing zu erweitern.Durch das deklarative Modell von CA Live API Creator entstehen zudem hochgradig skalierbare und zuverlässige Systeme. Diese optimierten Services sind viel effizienter und weniger anfällig als die von versierten Entwicklern und Architekten manuell programmierten Services.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Aug 21, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: Red Hat     Published Date: Jun 23, 2016
CA Technologies, a software company servicing the majority of the Global Fortune 500, wanted to help its internal development teams get its world-class apps to market faster. By using OpenShift Enterprise by Red Hat, CA Technologies was able to provide a Platform-as-a-Service (PaaS) for its internal teams to more quickly build and deploy Software-as-a Service (SaaS) applications for its external customers. Development times dropped from months to weeks in most cases. In addition, the new system offers maximum scalability by automatically spinning up or spinning down servers based on user load.
Tags : 
technology, best practices, global fortune 500, development, productivity
    
Red Hat
Published By: RingCentral     Published Date: May 22, 2014
Traditional phone systems, aka, PBX were designed for a time when people primarily worked from desk phones; well before the Internet restructured our patterns of communication and general lifestyles. Many businesses feel entrenched with the systems they have, but as contracts expire and systems get harder to maintain options are considered. Explore the top 5 hidden costs of the PBX, including costs in upgrades, maintenance and service calls, the strain on IT budgets, accumulation of service charges, connecting office locations and difficulty planning for growth and the future.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA
Published By: Spredfast     Published Date: Nov 15, 2018
How Top Brands Automate Social Service Practices Today’s conversational commerce requires brands to provide immediate answers to their customers’ questions. Chatbots and artificial intelligence are fast becoming critical tools for customer service, bringing speed and scale that ensures a superior experience. But what are the best practices that marketers need to know to tackle the challenges of customer service automation? ?Learn from experts from General Motors, Booking.com and Spredfast about how to bring automation into your CX workflows and bolster your social service strategies. You’ll find out: How to think about automation for your business? How chatbots enhance your agent workflows?? ??How Booking.com and GM are using AI to drive inspiration and customer? service efficiencies??
Tags : 
    
Spredfast
Published By: Viventium     Published Date: Nov 14, 2019
“A happy worker is a productive worker.” It’s a core belief that has driven Mrs. G’s Services for almost 20 years. A privately owned home health care agency, Mrs. G’s has about 450 workers and three offices that service the New York metropolitan area. Priding itself on employing passionate people and providing compassionate care, the organization’s primary mission is to provide comprehensive and quality service. Problem was, not all of the agency’s workers were happy. From caregivers to fulltime employees, people throughout Mrs. G’s were frustrated by the agency’s payroll solution. It wasn’t just that the payroll software was insufficient and sometimes downright ineffective. It wasn’t just that it persistently failed to meet the needs of agency management and the company’s caregivers. It was that a routine function — like payroll! — was violating the company’s core belief and making it more difficult for Mrs. G’s to achieve its mission.
Tags : 
    
Viventium
Published By: Oracle     Published Date: Apr 12, 2017
Brands are defined by the experiences they deliver. Customers are naturally self-interested, and a company’s internal workings and challenges are of little concern to them when assessing its products and services. All that matters is whether a brand is able to meet their needs as and when called upon to do so.
Tags : 
    
Oracle
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: Logicworks     Published Date: Feb 27, 2013
This white paper makes the case that any and all compliance obligations with which an organization must comply can be fully satisfied using cloud-based services.
Tags : 
cloud, manage, organizations, compliance, services, external sources
    
Logicworks
Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication
    
VMTurbo
Published By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : 
bsm, business service management, it operations group, it case study, capital one, automation
    
HP
Published By: SnowFlake     Published Date: Jul 08, 2016
CapSpecialty, through its subsidiaries, is a leading provider of specialty insurance for small to mid-sized businesses in the U.S., offering commercial property and casualty, professional liability, surety and fidelity products in all 50 states and the District of Columbia. By working with select partners through a limited distribution model, CapSpecialty’s creative, hardworking team provides personalized service and cultivates mutually successful partnerships to deliver positive results.
Tags : 
snowflake, capspecialty, insurance, best practices
    
SnowFlake
Published By: FICO     Published Date: Jun 14, 2017
The car industry’s fortunes play an important part in the stability of the broader economy. Consumers shopping for and financing a new or used vehicle have more choices than ever before. Empowered by digital delivery channels such as self-service and mobile, individuals are now able to rapidly choose and the vehicle and loan that best fits their needs.
Tags : 
    
FICO
Published By: Carbonite     Published Date: Aug 02, 2017
Carbonite Cloud Migration Powered by DoubleTake is an online service that enables migrations from any physical, virtual or cloud-based environment into VMware vSphere, vCloud Director, OpenStack, Amazon Web Services EC2 or Microsoft Azure infrastructure as a service (IaaS) cloud environments. The webbased console provides automated, centralized migration to the cloud. This document provides a detailed technical briefing on the functionality and use of Carbonite Cloud Migration and assumes that the reader will have at least a basic understanding of infrastructure as a service (IaaS).
Tags : 
carbonite, cloud, cloud-based environment, iaas. cloud migration
    
Carbonite
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.