was

Results 301 - 325 of 1630Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
• Verwenden Sie CA Live API Creator, um funktionierende Prototypen in Stunden zu liefern. Konvertieren Sie Unternehmensanforderungen in eine funktionsfähige Software. • Nicht nur für Wireframes, sondern auch für funktionierende Systeme, Datenbanken, Logik und Benutzeroberflächen. Es ist so einfach wie eine Kalkulationstabelle und geht auch so schnell. • Beeindrucken Sie die Anwender im Unternehmen, indem Sie innerhalb von Stunden Ergebnisse liefern und Feedback zum Datenmodell und zur Logik einholen. Iterationen sind unmittelbar möglich. • Alles, was Sie benötigen, ist enthalten. Es muss keine IDE installiert oder konfiguriert werden. Verwenden Sie einfach Ihren Browser.
Tags : 
    
CA Technologies
Published By: Collective Health     Published Date: Nov 28, 2016
Collective Health offered a contemporary health benefits infrastructure that was able to use the data that’s surrounding us in the healthcare space and leverage it in a way that was new and exciting to us,” said Milt. Combining technology, design, and humans, Collective Health’s holistic approach brought Activision Blizzard’s benefits goals to life.
Tags : 
    
Collective Health
Published By: Juniper Networks     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Google     Published Date: Apr 30, 2018
"In a recent global survey conducted on behalf of Google Cloud in association with MIT SMR Custom Studio, respondents were asked: over the last two years, how has your overall confidence in the security of cloud applications and infrastructure changed? The response was encouraging. 74% of respondents have become more confident in cloud security. The age of unthinking fears about cloud security is over. Not only is cloud adoption rising steadily across geographies, industries and job functions, but confidence in cloud security is rising as well — to the point where increased security is a major reason enterprises opt for cloud solutions. Download this report and find out more."
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Project and portfolio management or PPM software can make or break an organization’s ability to deliver. The recent growth in portfolio management as a strategic business function has led to many vendors of software related to elements of project execution “bolting on” project and portfolio management (PPM) modules. This is a clear attempt to try and get a piece of a growing, lucrative market. Twenty five years ago, PPM software was nothing more than project management software with the ability to publish or share information across projects. It was capable of doing a lot, but none of it was intuitive and therefore wasn’t particularly useful. Compared to today’s solutions, those products were dinosaurs. Since then, many vendors have invested a lot of money into their solutions, developing world-class offerings that can truly support effective management of the portfolio, and, more important, of the business that portfolio drives.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user, from project, resource and financial managers to executive decision makers and team members. CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel®-like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools.
Tags : 
    
CA Technologies EMEA
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
Getting the most from your data, driving innovation, processing orders faster, and reducing operating costs are all essential. And Oracle Exadata is the database platform to deliver these improvements. Read five top reasons for running your business on Oracle Exadata, and find out why other organisations say it was such a good choice for them.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: TIBCO Software     Published Date: May 31, 2018
Since it first started providing air passenger services in 2000, JetBlue has been innovating. It was the first airline to embrace dot.com transactions and electronic ticketing, and continues to churn out industry-leading inventions as described here. When business needs changed in 2014, JetBlue embarked on very robust digital transformation based on TIBCO integration and analytics technology—and the company was recognized with the first-ever TIBCO Trailblazer Impact award for the incredible effect this project was having on its strategic differentiation. In this case study, Director of Shared Development Services Andi Azzolina describes the objectives, initiatives, capabilities, and achievements making up JetBlue’s journey towards becoming the most caring travel provider in the world.
Tags : 
    
TIBCO Software
Published By: VMware     Published Date: Dec 10, 2018
Healthcare IT is in the midst of a revolution. Far from its leaky-ceiling basement beginnings, healthcare information technology (HIT) is now a strategic business differentiator with a key to the executive washroom. Challenged to innovate new patient and provider application services while maintaining traditional client-server applications, HIT teams are seeking ways to ensure investments in the management and maintenance of traditional systems don’t prevent the delivery of new digital experiences now and into the future. To find out more download this eBook today.
Tags : 
    
VMware
Published By: SambaSaftey     Published Date: Mar 15, 2019
Collaboration among compliance safety, and risk DS Services, a distributor of leading beverage brands to residential and business customers, employs more than 3,500 drivers nationwide. Tracking its drivers – and ensuring they’re qualified to be behind the wheel – isn’t easy. “Reviewing motor vehicle records (MVRs) can take weeks, as every state reports violation information differently,” says Jason Gay, DOT compliance administrator for DS Services. “I was spending 12 to 15 hours a week on paperwork alone. It was time to simplify the process.” DS Services originally turned to SambaSafety to help reduce paperwork and increase efficiency; however, by incorporating continuous driver monitoring into its safety program, DS Services is able to impact its business in . other positive ways.
Tags : 
    
SambaSaftey
Published By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
    
SambaSaftey
Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Google     Published Date: Oct 26, 2018
In this Forrester Consulting report commissioned by Google, it explores cloud development approaches, preferences, challenges, and benefits among development and IT leaders at global enterprises. Among the key findings, it was clear that cloud is on its way to becoming synonymous with modern and innovative when it comes to applications. It also shows that application developers seek more agile tools with containers and functions that enable greater flexibility. Read the report to find out more.
Tags : 
    
Google
Published By: CA Technologies     Published Date: Jun 09, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: Corrigo     Published Date: Nov 01, 2019
Think about all the ways your life today is different than it was ten years ago. Think about how you shop, how you get around, how you plan travel, and how you stay in touch. So many things that used to be a hassle are now almost effortless. If your life feels different, it’s because you’re living in a new era – what experts are calling the 4th Industrial Revolution. You’ve probably heard some of the more catch-phrased components – big data, artificial intelligence, deep analytics. Some of these still seem like science fiction, but they are very real, very active, and crucial parts of what we at Corrigo call the Intelligence Economy. In the Intelligence Economy, data is collected, crunched, and activated to solve problems and create greater value for customers, partners, and employees. It’s the information, insights, and automations that enhance experiences, predict needs, strengthen connections, and deliver the right info or action at the right time, in the right way. And the Intellig
Tags : 
    
Corrigo
Published By: Box     Published Date: Nov 06, 2019
This IDC study represents a vendor assessment of SaaS and cloud-enabledenterprise content application software vendors as of 2019 through the IDC MarketScape methodology at a worldwide level. This assessment presentsboth quantitative and qualitative characteristics of cloud content management applications in the market, as it relates to the planning, budgeting, and forecasting tasks that are typically conducted in support of managing and processing content in a global setting. The evaluation is based on acomprehensive and rigorous framework that assesses each vendor relative to the criteria and to one another.It was a requirement that the content application not only runsin a cloud setting but also takes advantage of the cloud constructssuch as multiregional data and process orchestration,scale and elasticity of users and data,distributed agility with edge computing,and self-service purchasing and provisioning of modules. To learn more download today!
Tags : 
    
Box
Published By: Box     Published Date: Nov 07, 2019
This IDC study represents a vendor assessment of SaaS and cloud-enabled enterprise content application software vendors as of 2019 through the IDC MarketScape methodology at a worldwide level. This assessment presents both quantitative and qualitative characteristics of cloud content management applications in the market, as it relates to the planning, budgeting, and forecasting tasks that are typically conducted in support of managing and processing content in a global setting. The evaluation is based on a comprehensive and rigorous framework that assesses each vendor relative to the criteria and to one another. It was a requirement that the content application not only runs in a cloud setting but also takes advantage of the cloud constructs such as multiregional data and process orchestration, scale and elasticity of users and data, distributed agility with edge computing, and selfservice purchasing and provisioning of modules.
Tags : 
    
Box
Published By: Box     Published Date: Nov 07, 2019
Mit der digitalen Transformation stehen Unternehmen vor beispiellosen Herausforderungen, was den Schutz ihrer Arbeit und die Aufrechterhaltung der Compliance in ihren Unternehmens-Ökosystemen angeht. Technologieund IT-Prozesse haben sich verändert und IT-Services haben sich von einem zentralen hin zu einem höchst dezentralen Computernutzungsmodell entwickelt. Mobilität, Cloud-Services und Consumer Apps haben den Bedarf der Mitarbeiter erhöht, jederzeit, überall und von jedem Gerät aus arbeiten zu können.
Tags : 
    
Box
Published By: Dassault Systèmes     Published Date: Nov 11, 2019
"The term Value Network describes enterprises that truly connect into a network of partners that collaborate and communicate with lightning speed and agility. The supply chain is now overshadowed by interconnected Value Networks. One example for Value networks applications is the digital twin, where the physical environment is replicated in a virtual model to harmonize new product design, process design and manufacturing design with planning, logistics, service and execution. When the virtual world and real world truly work together, we are able to speed up decision-making, reduce risk and cost, deliver great customer experiences, and minimize waste to make businesses more sustainable. Dassault Systèmes DELMIA,powered by the 3DEXPERIENCE platform, delivers the solutions to industries and service providers to transform their operations and orchestrate their entire Value Network."
Tags : 
    
Dassault Systèmes
Published By: IBM     Published Date: Apr 11, 2016
IBM’s 2015 annual February customer conference was a massive event combining multiple conferences of yesteryear. This EMA impact brief discusses IBM’s hybrid cloud strategy at a high level with particular focus on IBM’s latest announcements related to the PureApplication portfolio.
Tags : 
ibm, ibm pureapplication, ema, application platform
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library