organisation

Results 51 - 75 of 617Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 26, 2018
Today’s organisations are tasked with analysing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organisations are finding that in order to deliver analytic insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. A data lake is an architectural approach that allows you to store enormous amounts of data in a central location, so it’s readily available to be categorised, processed, analysed, and consumed by diverse groups within an organisation? Since data—structured and unstructured—can be stored as-is, there’s no need to convert it to a predefined schema and you no longer need to know what questions you want to ask of your data beforehand.
Tags : 
data, lake, amazon, web, services, aws
    
AWS
Published By: AWS     Published Date: Oct 26, 2018
Migrating to Amazon Web Services (AWS) enables organisations to transform the way they do business. It empowers them to accelerate the speed at which they conduct business, frees them from the constraints of on-premises data centres, and provides the flexibility to pay only for what they use. This eBook will detail how cloud adoption can deliver significant business benefits.
Tags : 
business, amazon, web, services, organisations, data
    
AWS
Published By: BlackBerry     Published Date: Aug 03, 2009
This paper looks at some of the challenges that CIOs are facing in managing mobility. This is clearly becoming more complex for large enterprises as mobility penetrates more deeply into their organisations, driven by changing working practices and supported by rapidly evolving technology.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, mobility management, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
Find out why these certifications matter to your organisation, and why they should be considered when protecting the information security of your mobile workforce.
Tags : 
security certifications, blackberry, mobile workforce, mobile security, blackberry, information security
    
BlackBerry
Published By: BlackBerry     Published Date: Feb 01, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry
Published By: BlackBerry APAC     Published Date: Jan 29, 2019
The Enterprise of Things (EoT) is the network of people, endpoints, and digital assets owned by and connected to the enterprise (or public sector organisation, in this context). It casts a wide net, to include content, communication, collaboration, transportation, and facilities – that is, anyone and anything connected to the internet. The EoT represents a powerful opportunity to transform existing public sector processes and create entirely new ones. Governments are moving on these initiatives because policymakers are legislating it, constituents are demanding it and because it presents an opportunity to do more with less.
Tags : 
    
BlackBerry APAC
Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine
Published By: CA Tech     Published Date: Jan 04, 2016
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA APM on their organisations.
Tags : 
application performance management, apm, ca technologies, finance, roi, ca apm, customer experience, reduce costs
    
CA Tech
Published By: CA Tech     Published Date: Jan 04, 2016
This white paper illustrates how Mobile application analytics can play a vital role in your DevOps strategy that can help your company create a superior end-user experience. Providing deep insight, this discipline produces benefits for a variety roles across the organisation.
Tags : 
customer experience, mobility, mobile application, mobile app, mobile application analytics, devops, application management
    
CA Tech
Published By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : 
ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers, public cloud, technology white paper, analyst report.
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 27, 2014
Cet article examine deux approches du Zero Touch Deployment : une solution basée sur les scripts et une plate-forme d’automatisation de la mise en production. Il indique comment chacune de ces approches peut résoudre les principaux défis technologiques et organisationnels face auxquels se trouvent les organisations agiles lorsqu’elles décident d’implémenter un système de déploiement automatique.
Tags : 
application release automation, deploying releases, zero touch deployment
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 27, 2014
Développement et production sont sur de mauvaises voies. Le développement se concentre sur des innovations plus rapides et sur la mise en oeuvre de nouveautés. La production a quant à elle pour objectif la stabilité, le contrôle et la prévisibilité. Souvent, ces deux équipes ne dépendent pas des mêmes personnes dans l’organisation. Elles semblent évoluer sur deux voies différentes. Peu importe la vitesse à laquelle elles avancent, elles ne se rencontrent jamais. Seules, les équipes de développement et de production IT auront souvent du mal à communiquer, encore plus à collaborer, et resteront engluées dans des processus manuels. Résultat : des employés qui ne travaillent pas bien ensemble, des logiciels qui ne fonctionnent pas de manière fiable et des clients qui envisagent d’aller voir la concurrence. Vous voilà peut-être coincé dans ce que nous appelons un « noeud de dysfonctionnement.
Tags : 
devops, software development, production, devops journey, devops advice
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 07, 2014
Une solution IAM hybride permet aux organisations de migrer vers le Cloud au rythme qui correspond à leurs exigences de réduction des coûts opérationnels et d’améliorer leur agilité.
Tags : 
ca technologies, migrer vers le cloud, cloud computing, iam hybride permet
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 06, 2015
Les API (interfaces de programmation d’applications) forment la base de cette nouvelle entreprise ouverte en permettant aux organisations de réutiliser leurs sources d’informations existantes au-delà de leurs limites.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 06, 2015
L’application mobile est devenue l’initiative stratégique phare pour toutes les organisations numériques qui cherchent à développer leur activité.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 10, 2015
Die mobile App ist jetzt „die“ strategische Initiative für alle digitalen Organisationen, die ihr Unternehmen voranbringen möchten.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
L’économie des applications oblige les entreprises à se transformer. Pour saisir de nouvelles opportunités de croissance, elles s’ouvrent sur l’extérieur et partagent des données et applications sélectionnées avec des développeurs, des partenaires, des appareils mobiles, le Cloud et l’Internet des objets. Cette transformation contribue à redonner de la valeur aux données héritées : dans l’économie des applications, une organisation qui parvient à exploiter ces données d’une nouvelle manière pourra faire émerger de nouvelles opportunités de revenus.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Dans l’économie numérique, les interfaces de programmation d’applications ou API (Application Programming Interfaces) sont essentielles pour mettre rapidement en oeuvre vos idées et saisir les nouvelles opportunités du marché. Elles sont les éléments fondateurs de la transformation numérique, permettant aux organisations d’offrir une expérience client exceptionnelle, de générer de nouveaux flux de revenus et d’offrir aux employés, partenaires, applications et périphériques un accès aux données, partout et à tout moment.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Avec la prolifération des applications SaaS et des appareils mobiles, la sécurité réseau n’a jamais été aussi complexe. Vos employés et vos partenaires disposent désormais d’un niveau d’accès sans précédent à votre organisation, souvent hors des limites physiques de l’entreprise. En d’autres termes, votre sécurité basée sur le périmètre ne suffit plus : les identités sont devenues le nouveau périmètre.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Target, Home Depot, eBay, le Bureau de gestion du personnel des États-Unis... Les incidents de sécurité majeurs subis par ces organisations (et d’autres) récemment sont survenus suite au vol ou à la compromission des informations d’identification d’un utilisateur à forts privilèges qui disposait d’un accès étendu à des systèmes sensibles. Dans près de deux tiers des cas, la violation initiale a été facilitée par la faiblesse des pratiques de sécurité mises en place par un tiers, fournisseur ou partenaire commercial, qui avait accès à un réseau interne. C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.