software provider

Results 76 - 100 of 126Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jan 26, 2015
The ability to apply software to strategic advantage is the de? ning technology theme of this decade. This is not just an IT issue. It is a business imperative. Every business is in the software business. In some industries, the number of software jobs has doubled over the past ? ve years. JP Morgan Chase has more software developers than Google and more technologists than Microsoft. If you think your company isn’t in the software business, you’re wrong. Airlines, oil companies, telecommunications providers all are using applications to attract customers and gain a competitive advantage. With the ubiquitous adoption of mobile devices, a whole new platform for application and content delivery is evolving. With their colorful, interactive, intuitive user interfaces, always-on global connectivity, sensing capabilities such as GPS and device orientation and their ability to connect with users through personalized con? guration options, mobile is truly the de? ning platform of the applicat
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement
    
CA Technologies
Published By: Avaya     Published Date: Jan 20, 2015
The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.
Tags : 
software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions
    
Avaya
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas
    
Entrust Datacard
Published By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : 
cloud solutions, security, secure data centers, it risks, compliance
    
Qualys
Published By: SugarCRM     Published Date: Jan 07, 2015
The way companies use and pay for customer relationship management (CRM) software has changed significantly over the past decade. Moving from a predominantly perpetual license-based system, where companies paid a large up-front sum and then smaller annual maintenance fees, CRM software providers are now moving towards monthly or annual subscription fees to access CRM software on the Internet.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
SugarCRM
Published By: EMC Corporation     Published Date: Dec 01, 2014
The following paper opens with the evolution of the Software-Defined Data Center and the challenges of heterogeneous storage silos in making the SDDC a reality. It continues by introducing EMC ViPR Software-Defined Storage and details how it enables enterprise IT departments and service providers to transform physical storage arrays into pools of virtual shared storage resources enable the delivery of innovative data services across arrays.
Tags : 
data center, software-defined storage, enterprise it departments, virtual shared storage
    
EMC Corporation
Published By: Epicor     Published Date: Sep 25, 2014
The software as a service (SaaS) model of application delivery, more commonly known as ‘cloud deployment’, in which software features are accessed through a Web browser, is an excellent way for manufacturing companies to get the bene?ts of enterprise resource planning (ERP) systems without the need to build additional IT infrastructure. ERP functionality delivered “from the cloud” avoids the complexity and costs that often accompany on premisess ERP implementations, and typically provides a much more favorable total cost of ownership, compared to legacy on premisess deployment. Companies subscribe to the software features that they need and can add new ones as business requirements change, without buying additional servers or storage to support new functionality. The ERP features are the same as for an on premises ERP system, except that it is hosted and maintained on the Cloud provider’s infrastructure.
Tags : 
saas, cloud deployment, cloud erp, it infrastructure, software features, application delivery
    
Epicor
Published By: Logicalis     Published Date: Sep 23, 2014
Learn the top considerations for choosing the right cloud partner to help you deliver software-as-a-service.
Tags : 
logicalis, iaas, saas, vmware, healthcare, enterprise software, cloud partner, cloud services provider
    
Logicalis
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
smart credentials, hardware, software, passwords, features, outdated physical access
    
Entrust Datacard
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing
    
Symantec Corporation
Published By: Actuate     Published Date: May 19, 2014
A white paper providing a breakdown in five steps of embedding reports, dashboards and analytics.
Tags : 
embedding reports, dashboards, analytics, saas, actuate, software application providers
    
Actuate
Published By: Logicalis     Published Date: Apr 23, 2014
Learn the top considerations for choosing the right cloud partner to help you deliver software-as-a-service.
Tags : 
logicalis, cisco, healthcare, enterprise software, cloud partner, cloud services provider
    
Logicalis
Published By: Progress Software     Published Date: Mar 21, 2014
SaaS is one of the hottest trends in the enterprise application market, but it remains unchartered territory for many software businesses. This eBook discusses some of the most important issues with SaaS that need to be addressed, including pricing your SaaS application, compensating your sales team and exporting your SaaS applications into new and emerging markets.
Tags : 
progress software, saas, saas application, saas providers, saas pricing, market development, saas strategy
    
Progress Software
Published By: Progress Software     Published Date: Mar 12, 2014
Progress Software and Saugatuck Technology have come together to provide this Saugatuck Strategic Report which provides guidance to ISVs in transition not just to the Cloud – but to entirely new ways of doing business, new requirements from customers and partners, and new opportunities that enable significant reward, and related potential risk. This report shares not only Saugatuck’s analysis of key market shifts, and the key challenges faced by ISVs in these transitions, but also provides ISVs with critical success factors and best practices from more than seven years of Saugatuck Technology research and business consulting with a diverse range of software providers around the world.
Tags : 
progress software, saugatuck technology, isv, best practices, business challenges, cloud transition, technology challenges, sales
    
Progress Software
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: VMTurbo     Published Date: Feb 11, 2014
These new software-defined capabilities, enabling enterprises and service providers bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : 
vmturbo, software-defined datacenter, sddc, virtualization, virtualizing business, business-critical, business applications, enabling enterprises
    
VMTurbo
Published By: ServiceNow     Published Date: Nov 22, 2013
This white paper explores how SaaS has fundamentally changed the economics for ITSM by reducing or removing maintenance, internal resource, and infrastructure costs.
Tags : 
servicenow, enterprise it, saas economics, itsm project, internal resource, infrastructure costs, service automation, software maintenance
    
ServiceNow
Published By: IBM     Published Date: Nov 12, 2013
Integrated Workplace Management System Systems (IWMS) is gaining industry momentum, in large part, because of the increasing focus on the importance of optimized, unified management of all assets across a complex enterprise. And that certainly includes real estate, facilities, and related assets that have historically been managed in isolated domains. In this study, leading technology analyst Gartner Inc. assesses the IWMS market to determine how the field is changing, who the leading software providers are, and how IWMS solutions have evolved in new directions to better fulfill emerging demand.
Tags : 
integrated workplace management system, fasb, capital project management, iasb, sustainability, cafm, roi, magic quadrant
    
IBM
Published By: Intralinks     Published Date: Oct 03, 2013
For many companies, in particular in industries like pharmaceuticals, software development, or entertainment, their intellectual property is more valuable than any physical asset. And with the increasing need to collaborate with external business partners to accelerate product life cycles and enhance innovation, there is a greater risk for sensitive information to be compromised. In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
    
Intralinks
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security
    
Intralinks
Published By: CDW     Published Date: Jul 18, 2013
Managing software may seem more challenging than ever, but discipline and good tools can ease the burden.
Tags : 
cdw, software management, cloud, cloud provider, software organization
    
CDW
Published By: Red Hat     Published Date: Jul 01, 2013
OpenStack is poised to become a cornerstone of the emerging cloud system software market, but “generic” OpenStack can be challenging. Drawing on its experience with enterprise Linux, Red Hat is delivering a commercially supported and tested version of OpenStack that’s “enterprise-ready.”
Tags : 
red hat, idc, virtualization, cloud system software, infrastructure-as-a-service, cloud providers, hypervisor is commoditizing, enterprise linux
    
Red Hat
Published By: HP and Intel ®     Published Date: May 03, 2013
In this white paper, Stratecast explores the relationship between hardware and software components in delivering a high-performing cloud environment. We present a list of questions to guide the reader in evaluating the offers of different cloud providers. Finally, we consider HP integrated solutions (hardware tuned to service automation platforms) as an effective choice for building a high-performance cloud environment.
Tags : 
software, hardware, integration, competitive advantage, cloud, infrastructure
    
HP and Intel ®
Published By: HP     Published Date: Dec 06, 2012
This white paper describes the characteristics and HP's vision of Software-Defined Networks. It describes how cloud computing and enterprise IT environments can benefit from Software-Defined Networks.
Tags : 
network, cloud, enterprise, virtualization
    
HP
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.