Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

sis development

Results 1 - 25 of 65Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: Bright Horizons     Published Date: Dec 14, 2016
Study shows a decidedly scientific approach to benefits development and management, and illustrates emerging trends of benefits that are becoming “need to play,” as well as those growing substantially in popularity, emerging as “need to win.”
Tags : 
employee benefits, trending benefits, tuition assistance program, value proposition, employee well-being, workforce productivity, retention, engagement
    
Bright Horizons
Published By: CA Technologies     Published Date: Jun 03, 2015
The complexity and high level of integration inherent in SAP environments can make development especially challenging and increase the time required to bring solutions to market. Persistent development and test challenges include unavailable systems, inability to accurately model performance and complex test data requirements. By employing service virtualization to model the core business logic in SAP systems and integrations, teams can free themselves of these constraints, leading to faster build and test cycles, better quality and lower cost.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
The complexity and high level of integration inherent in SAP environments can make development especially challenging and increase the time required to bring solutions to market. Persistent development and test challenges include unavailable systems, inability to accurately model performance and complex test data requirements. By employing service virtualization to model the core business logic in SAP systems and integrations, teams can free themselves of these constraints, leading to faster build and test cycles, better quality and lower cost.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
If the notion of GDPR approach as an agile methodology was the thesis for this paper, the conclusion surely has to be that there is much work still to be done by the enterprise. From an obvious mismatch between the belief of board preparedness to actual preparedness, drilling down into the specific areas of storage, security and development, there’s a feeling that while organisations are now aware of the risks and the necessary philosophical practice that has – or will – become action, there is still an absence of that ‘organic’ inclusion that should make GDPR part of the furniture.
Tags : 
technology solutions, gdpr, access management, identifiable data, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Some SAP systems can take up to 10 days to complete a SAP system copy. That’s 10 days of unproductive time. Why? SAP does not provide the necessary tools out-of-the-box to automate and handle the process efficiently. This means you must use highly skilled SAP BASIS staff to manage the process. Manual steps, along with hundreds of configuration settings, can take days to complete—and like many organizations, you have also experienced too many delays, causing non-production systems to be unavailable, which stalls development, testing and training activities. Opportunity So you’ve concluded your SAP system copy process is hindering innovation and productivity. You’re considering automating the process to ensure system copies are available for all environments on time, every time. Benefits What are the key capabilities you actually need to address SAP system copy inefficiency once and for all?
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge It is not uncommon for SAP system copies, including any post-editing, to take several days to complete. Meanwhile, testing, development and training activities come to a standstill, and the large number of manual tasks in the entire process ties up highly skilled SAP BASIS staff. Opportunity Enterprises are looking to automation as a way to accelerate SAP system copies and free up staff. However, this is only one part of the problem: What further complicates the system copy process is the need to safeguard sensitive data and manage huge data volumes while also ensuring that the data used in non-production systems adequately reflects the data in production systems so the quality of development, testing and training activities is not compromised. Benefits This white paper explains how a considerable portion of the SAP system copy process can be automated using the CA Automic Automated System Copy for SAP solution and SNP T-Bone, helping enterprises become more agile.
Tags : 
    
CA Technologies_Business_Automation
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: CDW     Published Date: Apr 04, 2016
Prefabricated modular data centers offer many advantages over traditionally built data centers, including flexibility, improved predictability, and faster speed of deployment. Cost , however, is sometimes stated as a barrier to deploying these designs. In this paper, we focus on quantifying the capital cost differences of a prefabricated vs. traditional 440 kW data center, both built with the same power and cooling architecture, in order to highlight the key cost drivers, and to demonstrate that prefabrication does not come at a capex premium . The analysis was completed and validated with Romonet’s Cloud-based Analytics Platform, a vendor-neutral industry resource.
Tags : 
analysis, development management, data management, business intelligence, best practices, network management, application integration, content management system
    
CDW
Published By: CDW - APC     Published Date: Apr 07, 2016
Prefabricated modular data centers offer many advantages over traditionally built data centers, including flexibility, improved predictability, and faster speed of deployment. Cost , however, is sometimes stated as a barrier to deploying these designs. In this paper, we focus on quantifying the capital cost differences of a prefabricated vs. traditional 440 kW data center, both built with the same power and cooling architecture, in order to highlight the key cost drivers, and to demonstrate that prefabrication does not come at a capex premium . The analysis was completed and validated with Romonet’s Cloud-based Analytics Platform, a vendor-neutral industry resource.
Tags : 
analysis, development management, data management, business intelligence, best practices, application integration
    
CDW - APC
Published By: CEB     Published Date: Sep 04, 2013
Analysis on the key challenges, developments, and innovations affecting corporate and business finance. This edition helps you to compare your cost and growth assumptions with peers, establish a finance-friendly corporate culture, develop critical guidance-based skills on your team, mobilize global cash balances, increase the effectiveness of investor targeting, and improve business analytics.
Tags : 
corporate culture, thought leadership, finance talent, cash balances, investor targeting, finance outlook, business analytics
    
CEB
Published By: CEB     Published Date: Oct 30, 2013
Analysis on the key challenges, developments, and innovations affecting corporate and business finance.
Tags : 
management reporting, cost savings, demand planning, product forecasting, resource allocation, performance assessment, cost assessment, finance talent brand
    
CEB
Published By: Cisco     Published Date: Jan 05, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Read more to learn how Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families.
Tags : 
analysis, development management, product management, best practices, business analytics, business management, business process management
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
Kinder Design Inc., a design and engineering services consulting firm, developed the Lift Top — an adjustable desktop table which enables users to comfortably work in either a sitting or standing position. With SOLIDWORKS Premium software, the firm automated the design process, cut development time and reduced the number of prototypes. This case study shares how Kinder Design implemented SOLIDWORKS Premium design and analysis software to support services and drive innovative product development.
Tags : 
kinder, design, solidworks, development, streamline, production
    
Dassault Systemes SolidWorks Corp.
Published By: Dassault Systèmes     Published Date: Jul 25, 2017
There is a large gap between understanding how important project management is to a successful product launch and how effective a company may be with its actual execution. John Hayes, CEO of Engineering.com, and Jon Gable, former Strategic Planning Director for Dassault Systèmes , team up to bring you a webinar on product development and project management tools. This webinar covers: • Research report findings from 140 product development professionals • Analysis of how product development issues can be addressed • Web-based project management for product development Gain insight into the latest thinking on project management for product development and how project management issues can impact business at the highest level.
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
Dassault Systèmes
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud
    
F5 Networks Inc
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: Glint     Published Date: Sep 19, 2017
The employee engagement survey can be a powerful force for consistent, positive change. This guide provides a more insightful and actionable approach to employee engagement, including a framework for designing and implementing pulse programs. The ideas inside come from decades of engagement survey and organizational development (OD) experience.
Tags : 
employee engagement software, team engagement software, employee engagement initiatives, impact of employee engagement, employee engagement software, drivers of employee engagement
    
Glint
Published By: Glint     Published Date: Sep 20, 2017
The employee engagement survey can be a powerful force for consistent, positive change. This guide provides a more insightful and actionable approach to employee engagement, including a framework for designing and implementing pulse programs. The ideas inside come from decades of engagement survey and organizational development (OD) experience.
Tags : 
employee engagement software, team engagement software, employee engagement initiatives, impact of employee engagement, employee engagement software, drivers of employee engagement
    
Glint
Start   Previous   1 2 3    Next    End
Search