interfaces

Results 1 - 25 of 91Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Oct 24, 2018
Key Findings ? Budgets for analytics tools and talent are going up, as marketing leaders see analytics as a business requirement and source of competitive advantage. ? Marketing analytics users rate functionality, performance, product roadmap and future vision as the primary factors they consider when evaluating vendors. ? Customers of these vendors also report putting a premium on user experience and ease of use among their requirements. ? Digital marketing analytics vendors are addressing these needs by adding more advanced features and investing in upgraded and flexible user interfaces, including intelligent assistants.
Tags : 
    
Adobe
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You値l learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: ANSYS     Published Date: Aug 28, 2019
The most problematic scenario engineers encounter when analyzing large deformation solutions using the finite element method is convergence issues due to mesh distortion. This is typical, for example, during simulation of elastomeric sealing or metal forming applications. Complex nonlinearities due to mechanical and/or thermal behavior arise in such cases from inherent material properties, geometric changes and establishment or separation of contact interfaces. The manual rezoning feature which was released in ANSYS 10.0 gave analysts a highly customizable, albeit labor-intensive, workflow to change and repair the mesh whenever needed after an unconverged solution. However, since the release of ANSYS 15.0, the latest 哲onLinear ADaptivity (NLAD) feature and accompanying enhancements are as automatic as one can imagine for repairing mesh distortion, overcoming convergence difficulties, refining the mesh to capture local phenomenon and achieving the 鍍rue design solution.
Tags : 
    
ANSYS
Published By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 04, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
    
AWS
Published By: bigtincan     Published Date: Oct 10, 2014
Enabling the mobile workforce to be productive is the ultimate goal of any mobile business initiative. While the idea that mobile devices like the iPad, Galaxy Tab and today痴 leading smartphones can change how users work in the enterprise is well established, the real challenge is how to enable a mobile workforce to have device access to all the different content they need to do their job without having to circumvent security and content governance objective or require users to learn a mix of consumer oriented software tools and work in different user interfaces in order to be productive. Viewing, editing, annotating and sharing content must be available from the same application.
Tags : 
mobile apps, user enablement, mobile workforce, mobile content
    
bigtincan
Published By: BMC Software     Published Date: Jan 31, 2014
With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well articulated interfaces defining the data that is traveling back and forth. With the right integration strategy, SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration, bmc
    
BMC Software
Published By: BMC Software     Published Date: May 19, 2014
With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well-articulated interfaces defining the data that is traveling back and forth. With the right integration strategy SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration
    
BMC Software
Published By: Brocade     Published Date: Jun 12, 2015
Dieses Dokument bietet einen ワberblick ber Software-Defined Networking (SDN), und zeigt einige Anwendungsbeispiele sowie Brocade痴 Beitrag zur Innovation durch SDN.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation
    
Brocade
Published By: Brocade     Published Date: Jun 12, 2015
This paper provides an overview of Software-Defined Networking (SDN), expected use cases, and Brocade contributions to SDN innovation.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation
    
Brocade
Published By: CA Technologies     Published Date: Jan 26, 2015
The ability to apply software to strategic advantage is the de? ning technology theme of this decade. This is not just an IT issue. It is a business imperative. Every business is in the software business. In some industries, the number of software jobs has doubled over the past ? ve years. JP Morgan Chase has more software developers than Google and more technologists than Microsoft. If you think your company isn稚 in the software business, you池e wrong. Airlines, oil companies, telecommunications providers all are using applications to attract customers and gain a competitive advantage. With the ubiquitous adoption of mobile devices, a whole new platform for application and content delivery is evolving. With their colorful, interactive, intuitive user interfaces, always-on global connectivity, sensing capabilities such as GPS and device orientation and their ability to connect with users through personalized con? guration options, mobile is truly the de? ning platform of the applicat
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 06, 2015
Les API (interfaces de programmation d誕pplications) forment la base de cette nouvelle entreprise ouverte en permettant aux organisations de r騏tiliser leurs sources d段nformations existantes au-del de leurs limites.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 09, 2015
In today痴 application economy, everyone is in the software business. Auto makers are putting Wi-Fi hotspots in their cars. Watches are trading gears for motherboards. Even soda fountains have evolved from dumb machines into instrumented devices with touch-screen user interfaces. This digital transformation is changing the way applications are developed, tested, moved through environments and released into production預nd it痴 putting new demands on IT teams with which they池e struggling to keep up. At a high level, this is because the application delivery systems and processes at many enterprises were put in place when IT only had to push out an annual or semi-annual release. But as market pressures and executive mandates have forced teams to deliver innovations faster and more frequently, a new set of development, testing, automation and customer challenges have appeared預cting as obstacles that stand between you and your digital transformation goals.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Use CA Live API Creator to deliver running prototypes in hours. Convert business requirements into working software. Not just for wireframes, but also for running systems, databases, logic and user interfaces. It痴 as simple as a spreadsheet and just as fast. Impress your business users with results in hours to get their feedback on the data model and logic. Iterate instantly. All you need is in the box. No IDE to install or configure. Just use your browser.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
In the digital economy, application programming interfaces (APIs) are essential for executing ideas quickly and seizing new business opportunities. They are the building blocks of digital transformation, enabling organizations to deliver exceptional customer experiences, create new revenue streams and connect employees, partners, apps and devices to data預nytime, anywhere.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
CA Live API Creator permet de livrer des prototypes op駻ationnels en quelques heures peine. Convertissez vos besoins m騁ier en logiciels op駻ationnels. CA Live API Creator convient aux mod駘isations filaires, mais aussi aux interfaces utilisateur, la logique, aux bases de donn馥s et aux syst鑪es op駻ationnels. C弾st aussi simple qu置ne feuille de calcul et tout aussi rapide. Impressionnez vos utilisateurs m騁ier en leur pr駸entant des r駸ultats en quelques heures peine. Int馮rez ensuite leurs commentaires dans la logique et le mod鑞e de donn馥s pour finalement assurer une it駻ation instantan馥. Tout ce dont vous avez besoin est votre disposition. Pas d弾nvironnement de d騅eloppement int馮r installer ni configurer. Votre navigateur suffit.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Dans l帝conomie num駻ique, les interfaces de programmation d誕pplications ou API (Application Programming Interfaces) sont essentielles pour mettre rapidement en oeuvre vos id馥s et saisir les nouvelles opportunit駸 du march. Elles sont les 駘駑ents fondateurs de la transformation num駻ique, permettant aux organisations d弛ffrir une exp駻ience client exceptionnelle, de g駭駻er de nouveaux flux de revenus et d弛ffrir aux employ駸, partenaires, applications et p駻iph駻iques un acc鑚 aux donn馥s, partout et tout moment.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
In the digital economy, application programming interfaces (APIs) are essential for executing ideas quickly and seizing new business opportunities. They are the building blocks of digital transformation, enabling organizations to deliver exceptional customer experiences, create new revenue streams and connect employees, partners, apps and devices to data預nytime, anywhere.
Tags : 
customer experience, workflow, competitive differentiation, speed to market, new markets, business models, ca technologies
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority痴 longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
L弾ssor des interfaces de programmation d誕pplications (API) repr駸ente la fois une opportunit commerciale et un d馭i technique. Pour les dirigeants d弾ntreprise, les API sont synonymes de nouvelles sources de revenu et d弛ptimisation de la valeur pour le client. Ce sont toutefois les architectes d弾ntreprise qui sont charg駸 de cr馥r ces API permettant de r騏tiliser les syst鑪es back-end dans les nouvelles applications Web et mobiles. Il est crucial que tous les intervenants comprennent que les objectifs m騁ier et les d馭is techniques d置n programme d但PI sont intimement li駸. Les responsables de programmes ont pour rle de pr駸enter clairement les objectifs commerciaux cl駸 d置ne API propos馥 aux architectes qui seront en charge de la conception de l段nterface.
Tags : 
    
CA Technologies EMEA
Start   Previous   1 2 3 4    Next    End
Search Resource Library