sla

Results 76 - 100 of 522Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 20, 2017
e-book which lays out the case for machine learning and artificial intelligence for mainframe operational analytics. The mainframe is now part of a highly complex connected ecosystem driving trillions of mobile and web transactions critical to the functioning of the application economy. The emergence of new workloads and apps on the mainframe means that the status quo isn’t enough when it comes to Mainframe management. IT professionals alone – whether mainframe skilled or not – simply can’t keep up with the onslaught of performance alerts, false alarms. Machine learning deliver mainframe intelligence a more proactive and automated approach to handle this challenge.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Sep 13, 2017
"GDPR, the General Data Protection Regulation has just been signed into law and enacts new rules and stiff penalties for any company who misuses or loses European Union (EU) citizens’ personal data. This sweeping legislation has expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across development and testing environments. Test data management, the process of obtaining and distributing test data for development teams, takes on greater urgency as the GDPR deadline looms. Solid test data management practices will be key to overcoming compliance roadblocks and avoiding huge fines associated with GDPR. Utilizing new ways in which test data can be generated, distributed and managed will be pivotal role to meeting this regulation. In this webcast, Vanson Bourne and CA will present the results of their highly anticipated GDPR readiness survey of 200 corporations in North American and the UK. Join us to learn more about: •Th
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Sep 13, 2017
"There's new legislation in place, that's expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across testing and development environments. It's the General Data Protection Regulation (GDPR). Are you ready for it? In this session, we’ll demonstrate how CA Test Data Manager helps to both mask your production data and to generate synthetic test data; a powerful combination to help you meet compliance needs and deliver quality applications. There will be a short section on the future of the tester self-service model that will enable testers to efficiently get access to the right test data."
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
CA Dynamic Capacity Intelligence from CA Technologies is an easy-to-use, fully automated and intelligent capacity management and realtime dynamic capping solution. The solution is designed to streamline your ability to monitor and effectively manage SLAs and improve operational efficiency. It helps IT to achieve rapid value by enabling priority mainframe workloads to the required capacity to meet SLAs while at the same time helps remove the guesswork for MLC pricing.
Tags : management, sla, application delivery, workload, mainframe, lpar boundaries, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Data is the most valuable asset a business has, and the most important data lives on the mainframe. This critical information fuels the new apps and services that differentiate your business. And it’s rapidly growing, with each new app creating a new source of data. What’s more, usage demands are increasing as developers seek access to mainframe-based data to promote innovation.
Tags : database, administration, management, performance optimization, sla, ca technologies, security
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: CA Technologies EMEA     Published Date: Oct 23, 2017
Depuis plus de vingt ans, les entreprises doivent se conformer à différentes directives et réglementations en matière de protection des données. Le Règlement général sur la protection des données (RGPD ou GDPR en anglais), qui reprend l’ensemble des législations existantes de la Commission européenne en matière de protection des données, a toutefois pour but de renforcer et d’harmoniser ces différentes réglementations pour les citoyens européens. Les principaux objectifs du RGPD sont de redonner aux citoyens un contrôle sur leurs données personnelles et de simplifier le cadre réglementaire pour les entreprises internationales. Pour les organisations déjà conformes à la Directive 95/46/CE, quels sont les critères technologiques à remplir pour garantir la conformité au RGPD ?
Tags : rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
     CA Technologies EMEA
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
You’ve made a major investment in Oracle E-Business Suite applications to run your critical enterprise processes. But these processes stretch beyond Oracle E-Business Suite and rely on a mix of custom and packaged applications. Management of your critical enterprise processes has become a pressing challenge. Too many staff are tied up in managing the process, as well as finding and diagnosing process errors. SLAs are frequently missed, and customers perceive poor quality of service due to the recurring errors and delays, which are now impacting your critical processes, such as financial period end close, invoicing, payroll and materials requirements planning (MRP) processing. You’ve decided it’s time to consider automation. Automating Oracle E-Business Suite processes end-to-end can eliminate 90% of business process errors. Download this whitepaper to find out how.
Tags : 
     CA Technologies_Business_Automation
By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : roi, soa, job scheduling, ca wa, workload automation
     CA WA
By: CA WA     Published Date: May 12, 2008
While companies cope with increasing demands for speed from their customers, shareholders and customers alike demand that they make these changes cheaply, with minimal risk and with as few people resources as possible. Is there any way to meet these challenges? Take another look at modern enterprise job scheduling to see how it enables the real-time environment (RTE).
Tags : ca wa, workload automation, web services, service oriented, soa, service level, sla
     CA WA
By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
Every business day, corporate campuses across the country function like small cities requiring highly specialized facilities and logistics management services. This paper will explore effective and efficient Corporate Campus Logistics Services to ensure the efficient flow of materials and people at large multi-building office campuses serving thousands of employees. Corporate facilities, real estate management, logistics and procurement teams as well as commercial real estate management companies are charged with sourcing the services that are the underpinnings of these mega-campuses. It’s an effort that spans a wide range—coordinating the receipt and distribution of supplies, equipment and packages; safely transporting thousands of employees as well as suppliers and contractors to locations within the campus; tracking and warehousing countless materials to support daily planned and unplanned workplace needs. Learn more about lowering costs, streamlining operational efficiency and gaining high employee satisfaction.
Tags : canon business process services, outsourcing services, managed services, logistics services, warehouse management, facilities management, commercial real estate management, corporate real estate management
     Canon Business Process Services, Inc.
By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
This paper will explore the potential of applying business performance management (BPM) principles to advance document performance management (DPM) in a way that enables organizations to reduce costs; better manage documents as vital strategic, ?nancial and information assets; and secure positive returns on investments from outsourcing. An example of this approach — spotlighted later in this paper — is MAX, a document performance management system that enables companies to more effectively manage their document processes and outsourcing service providers.
Tags : canon business process services, document management, document imaging, business performance management, outsourcing services, managed services, balanced scorecard framework, slas
     Canon Business Process Services, Inc.
By: CareerBuilder     Published Date: Apr 24, 2019
As it stands today, 33 states – Alaska, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, Florida, Hawaii, Illinois, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Missouri, Montana, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, Utah, Vermont, Washington, West Virginia – and Washington D.C. now permit the medical use of marijuana. Currently, there are ten states that have authorized the legal use of marijuana for anyone 21 years old or older (Calif. is “over 21-yrs old”): Alaska, California, Colorado, Maine, Massachusetts, Michigan, Nevada, Oregon, Vermont and Washington (and Washington D.C.). Although criminal and civil penalties saw a dramatic change, it’s imperative to note that each of these states’ laws specifically provide that employers do not need to accommodate employee marijuana use at work. Employers are still authorized to prohibit the use of “recreational” marijuana,
Tags : 
     CareerBuilder
By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
     CDW
By: CDW     Published Date: Dec 03, 2012
Smartphone, tablet computer and ultrabook purchases number in the hundreds of millions per year. This onslaught of devices underscores the move to mobility in many organizations. Read on to learn how CDW helps in building end to end mobile strategy.
Tags : cdw, mobile application management, mam, security, mobile workers. mobile security, productivity, mobile productivity, efficiency
     CDW
By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : device management, security management, mobility, application security, management solutions
     Centrify
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
     Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall
     Cisco
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
     Cisco
By: Cisco     Published Date: Sep 15, 2015
Walk past your data center, and you might hear a soft, plaintive call: “Feed me, feed me…” It is not your engineers demanding more pizza. It is your servers and applications. And the call is growing louder. Mobile and virtualized workloads, cloud applications, big data, heterogeneous devices: they are all growing in your business, demanding previously unimagined capacity and performance from your servers and data center fabric. And that demand is not slacking. Your employees, applications, and competitive advantage increasingly depend on it. Those servers and applications need to be fed. And if you have not started planning for 40 gigabits per second (Gbps) to the server rack, you will need to soon.
Tags : applications, systems integration, cloud, development
     Cisco
By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is growing, but relatively few organizations have advanced cloud strategies. Achieving greater levels of cloud adoption allows organizations to materially improve strategic allocation of IT budgets, lower IT costs, reduce time to provision IT services, increase revenue, and improve ability to meet SLAs. Private cloud adoption is greater than public cloud. Additionally, private cloud/OpenStack adopters are more likely to expect better business outcomes IDC sees web-scale public cloud making way for enterprise-class “provider-based cloud”.
Tags : cisco, cloud adoption, productivity, open stack, private cloud, public cloud, networking, software development
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Mobile and virtualized workloads, cloud applications, big data, heterogeneous devices: they are all growing in your business, demanding previously unimagined capacity and performance from your servers and data center fabric. And that demand is not slacking. Your employees, applications, and competitive advantage increasingly depend on it. Those servers and applications need to be fed. And if you have not started planning for 40 gigabits per second (Gbps) to the server rack, you will need to soon.
Tags : 
     Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com