bpo

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
Published By: Trintech, Inc.     Published Date: Nov 13, 2017
This eBook’s goal is to help you identify which technology best suits your business, how to get a project like this approved internally, and what you need to think about when it comes to delivery.
Tags : 
trintech, business automation, software implementation, business process automation, bpo, cloud computing, business technology
    
Trintech, Inc.
Published By: JBoss Developer     Published Date: Oct 21, 2016
TMG Health, the largest business process outsourcing (BPO) provider in the Medicare and Medicaid market, relied on a slow, batch-oriented legacy application environment that prevented it from providing continuous data visibility and access to its clients. With help from Red Hat Consulting, TMG deployed a new application platform using Red Hat JBoss Enterprise Application Platform and other Red Hat solutions. As a result, TMG reduced development time and costs and delivered real-time data access and visibility to its clients.
Tags : 
consulting, efficiency, data, api, java
    
JBoss Developer
Published By: SAP Inc.     Published Date: Jul 28, 2009
How can a professional services firm grow profitably while providing clients with the higher-quality service and rock-bottom project pricing they demand? The firm must rely on leading best-practice solutions to gain control over every aspect of its business – from business development to resource planning to client billing.
Tags : 
sap, professional services firm, business process outsourcing, bpo, resource utilization, project visibility, operational efficiency, market consolidation, inefficient operations, proposal and order management solution, sarbanes-oxley compliance, it management, enterprise applications
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jul 28, 2009
Read about the benefits, prerequisites, and impact of successful business process management (BPM) initiatives, with a closer look at the United States.
Tags : 
bpm, bpm, business process management, software implementations, sap, idg, cio2cio, soa, service-oriented architecture, it management, knowledge management, customer service management, business product owner, bpo, metrics
    
SAP Inc.
Published By: InfoPro Learning     Published Date: Jun 01, 2017
As the benefits of investment in Learning and Development continue to be signaled to the market, Chief Learning Officers and leaders of learning organizations will be taking center-stage in the transformation of their organization. In addition, companies spent just over $180 billion on corporate training last year, putting immense pressure on training leaders to show return on investment. With the spotlight on, these CLOs and other leaders of learning organizations will be measured across three core levers; transforming the business performance of learners, creating learning experiences that engage learners, and improving the operational efficiency of the organization. Download The Three Levers of a Successful CLO to learn the first step in aligning yourself with the three levers that business find most important.
Tags : 
l&d outsourcing, training outsourcing, business transformation, learning experience, learning strategy, learning measurement, managed learning services, lbpo, learning business process outsourcing, learning and development
    
InfoPro Learning
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: SAP     Published Date: Jun 30, 2011
This paper aims to discuss the various capability acquisition and it solution deployment options and provide a perspective on how to evaluate the suitability of those options, given an enterprise's situation, and to get the best outcome.
Tags : 
sap, competitive positioning, solution landscape, risk tolerance, shared service center, bpo, bpu, application performance, scalability
    
SAP
Published By: Microsoft Corporation     Published Date: Oct 19, 2010
Attend this webcast to see Microsoft Dynamics CRM Online in action, including integration to Microsoft Business Productivity Online Services (BPOS), and learn about customers who have used Microsoft Dynamics CRM Online.
Tags : 
microsoft dynamics crm online, marketing, roi, business productivity online services, bpos, data acquisition and segmentation, marketing analytics
    
Microsoft Corporation
Published By: Exablox     Published Date: Jan 27, 2015
This IDC Buyer Case Study looks at the approach Exablox has taken in capitalizing on the object - based storage platform opportunity and the use of the Exablox OneBlox technology by the Balboa Park Online Collaborative (BPOC). IDC recently spoke with Jason Quinn, director of Information Technology for the Balboa Park Online Collaborative, whose charter is to further the technology objectives of the Balboa Park Online Collaborative and the institutions in Balboa Park.
Tags : 
storage management, nas storage, cloud managed nas, object-based storage, nas storage use case, digital asset management, primary data storage, backup storage, exablox, oneblox, data management
    
Exablox
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com