context and services

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand: the way AWS services operate, including how customers can address security and encrypt their content, the geographic locations where customers can choose to store content, and the respective roles the customer and AWS each play in managing and securing content stored on AWS services.
Tags : 
    
Amazon Web Services APAC
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : 
collaborative consulting, business value, user expectations, mobile web, service architecture, technology challenges, information technology, program management
    
Collaborative Consulting
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: Gigamon     Published Date: Jun 07, 2019
You know that complex microservices-based apps can be difficult to monitor, but did you know Application Intelligence provides both the visibility and the context needed to discover, manage and secure these apps? Download the Gigamon white paper “How to Gain Control of Complex Applications in the Time of Digital Transformation” to solve the challenges of capturing application traffic on the network, identifying apps and microservices, extracting information and metadata and distributing that information to tools.
Tags : 
    
Gigamon
Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices, networking, security, it management, knowledge management
    
Qualys
Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform, business technology
    
IBM MidMarket Demand Generation
Published By: IBM     Published Date: Oct 01, 2012
The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management.
Tags : 
virtualization, dynamic infrastructure, ibm, risk management, system management, business technology
    
IBM
Published By: Qualys     Published Date: Jan 11, 2017
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: K2     Published Date: Jan 07, 2016
The business context for process excellence and business process management (BPM) has changed dramatically since the 2009-to-2010 recession. During the recession, BPM software and services saw impressive double-digit growth as a result of enterprises slashing costs and boosting worker productivity. Now, executive agendas have shifted to focus on growing revenue, expanding the customer base, and delivering new digital products and services. Enterprise and process architects are reshaping their business cases for BPM around these new drivers. This is not an easy task. However, process excellence will play a critical role for forward-thinking enterprise architects that invest the time to link BPM to new front-office drivers to help the organization drive digital transformation. This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : 
bpm, business process management, process excellence, best practices, networking, security, software development, it management
    
K2
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com