service model

Results 126 - 150 of 377Sort Results By: Published Date | Title | Company Name

The Building Blocks For Private Cloud: Automation, Virtualization, And Cloud Service Management

Published By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale, business integration, cloud computing, design and facilities
    
Cisco

Lessons from Successful Mobile Initiatives

Published By: ServiceNow     Published Date: Nov 22, 2013
Whether you’ve embraced it or not, mobile is already part of your business. To remain relevant, IT must think like the business. IT must reinvent itself and become more of a technology advisor and less of a technology traffic cop. This paper sets out some of the key lessons learned by progressive organizations that have used mobile to get ahead.
Tags : 
servicenow, enterprise it, mobile computing, mobile initiative, it managers, progressive enterprise, mobile users, bring your own device, mobile device management, mobile adoption, mobile maturity model, mobile savvy, actionable analytics, renew it, mobile data systems, mobile workers, wireless infrastructure, change management, service management
    
ServiceNow

IT Asset Management

Published By: ServiceNow     Published Date: Nov 22, 2013
A modern ITAM solution allows organizations to consolidate legacy systems into one system of record and automate the asset lifecycle.
Tags : 
servicenow, enterprise it, asset management, software asset management, itam, itsm, service management, software-as-a-service, service catalog, runbook automation, manual to automation, workflow engine, complex integration, vendors and models, change management, system management software, software compliance
    
ServiceNow

Population Health Management Helps Utica Park Clinic Ease the Transition to Value-Based Care

Published By: IBM Watson Health     Published Date: Nov 30, 2015
The transition from fee-for-service to value-based reimbursement has been a challenge for many providers. Financial incentives that favored high service volumes must now be re-focused to accommodate alternative models such as bundled payments and accountable care organizations (ACOs).
Tags : 
ibm, watson health, phytel, population, health management, accountable care organizations, finances, value-based, data management
    
IBM Watson Health

Assuring Loan Quality Through the Loan Completion Process

Published By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid, tila respa integrated disclosure, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset
    
Fiserv

Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime

Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv

Reinventing financial services: How to lead a future-ready enterprise

Published By: Group M_IBM Q119     Published Date: Mar 08, 2019
The transformation imperative is now the imperative of the entire enterprise. The challenge to leaders of top financial services firms is to build operating models that are ready for anything. Join American Banker Editor-at-Large, Penny Crosman, and former IBM Global leader for strategy and design, Robert Schwartz, as they discuss this idea, pulling clips from a recent event for industry leaders, including: Bridget van Kalingen, IBM on redefining success with cloud, AI, quantum and blockchain Shari van Cleave, Wells Fargo on rethinking data strategies in the age of AI Bret King, Moven on rebuilding the bank from the ground up Rob Bauer, AIG on the ways to get started with transformative projects Marty Lippert, MetLife on creating space for innovation by migrating core operations off of legacy infrastructure and many more
Tags : 
    
Group M_IBM Q119

The Future of Customer Service

Published By: Sprinklr     Published Date: Nov 22, 2016
Customer service today is broken, and the data shows it. Tried-and-true customer service models are losing your organization customers and prospects. So what is the solution? It’s called social customer service.
Tags : 
social customer service, social media customer service, social media, social, customer service, customer care, customer reviews
    
Sprinklr

Liefert Ihre Cloud, was Ihre Kunden und Geschäftsinteressenten benötigen?

Published By: Microsoft     Published Date: Oct 09, 2017
Cloud-Computing hat ein goldenes Zeitalter für Software Unternehmen eingeleitet. Aufgrund der niedrigen Einstiegshürde wird die Kreativität gefördert, insbesondere die Kreativität von Software-Entwicklern, die Anwendungen direkt in der cloudbasierten Infrastruktur erstellen. Die cloudbasierte Infrastruktur ermöglicht es Entwicklern, ihrer Leidenschaft nachzugehen: mit den Tools ihrer Wahl Geschäftsprobleme zu lösen und innovative Ideen umzusetzen. In einem Software-as-a Service-Modell (SaaS-Modell) können Anwendungen einfach in einem Cloud-Dienst bereitgestellt werden und an die Kunden geliefert werden, die den einfachen Zugriff und die niedrigen Kosten schätzen. Das Cloud-Modell befreit die Entwickler und die IT-Mitarbeiter im Unternehmen vom Management oder der Pflege einer kapitalintensiven Infrastruktur.
Tags : 
funkionalitat, software, moglichkeit, dienste, zentrale, verwaltung, benutzerfreundlichkeit
    
Microsoft

Evergreen Storage Is Changing Customer Experience Expectations in Enterprise Storage

Published By: Pure Storage     Published Date: Mar 15, 2018
Managing technology refreshes is not a popular task among enterprise storage administrators, although it is a necessary task for successful businesses. As a business evolves, managing more data and adding new applications in the process, enterprise storage infrastructure inevitably needs to grow in performance and capacity. Enterprise storage solutions have traditionally imposed limitations in terms of their ability to easily accommodate technology refreshes that keep infrastructure current and operating reliably and most cost effectively. In 2015, Pure Storage introduced a new technology refresh model that has driven strong change in the enterprise storage industry by addressing the major pain points of legacy models and provided overall a much more cost-effective life-cycle management approach. In conjunction with other aspects of Pure Storage's enterprise storage product and services offerings, the company's "Evergreen Storage" technology refresh model has contributed to this all-f
Tags : 
    
Pure Storage

Digital Transformation & Innovation

Published By: Redstor UK     Published Date: Mar 12, 2018
A majority of businesses have adopted digital platforms across multiple channels and in many cases successfully utilised them to drive efficiency and profitability. Technology, and the data that often underpins it, has become an extremely valuable asset for businesses of all sizes. The way that companies do business has also changed and technology has played a key role in this, customers now expect instant gratification and a service model that suits their specific needs. This paper will analyse the cause and effect of companies implementing digital transformation strategies and understand the role of cloud technologies within this. It will also explore some of the wider aspects of business transformation and the journey’s businesses take to implement innovative technologies.
Tags : 
digital, transformation, innovation, cloud, business, optimization
    
Redstor UK

Bridging to the Cloud: The Right Database Can Make the Difference

Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
For increasing numbers of organizations, the new reality for development, deployment and delivery of applications and services is hybrid cloud. Few, if any, organizations are going to move all their strategic workloads to the cloud, but virtually every enterprise is embracing cloud for a wide variety of requirements. To accelerate innovation, improve the IT delivery economic model and reduce risk, organizations need to combine data and experience in a cognitive model that yields deeper and more meaningful insights for smarter decisionmaking. Whether the user needs a data set maintained in house for customer analytics or access to a cloud-based data store for assessing marketing program results — or any other business need — a high-performance, highly available, mixed-load database platform is required.
Tags : 
cloud, database, hybrid cloud, database platform
    
Group M_IBM Q1'18

How to prepare for the next big trend in Global Business Services

Published By: KPMG     Published Date: Jul 10, 2018
Access to digitally-enabled business services will be key for companies transforming their business models in the face of massive, market-wide disruption. So, how can you begin to put the foundations in place? Read this report to find out: • why Global Business Services are on the cusp of a major evolution • six areas where companies should ‘build muscle’ in preparation for the change • how leading GBS organisations are transforming • key questions to consider as you put the foundations in place.
Tags : 
    
KPMG

A blended future: The changing mix of IT service delivery and consumption

Published By: EMC Corporation     Published Date: May 27, 2014
Get in-depth insights from a new global survey of executives by The Economist Intelligence Unit, which confirms significant change in how organizations like yours deliver and use IT services, and advocates a blended model of internal and third-party services.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture, it management, data center
    
EMC Corporation

IDC: Critical Application and Business KPIs for Successful Cloud Migration

Published By: AppDynamics     Published Date: Sep 21, 2017
IDC’s research shows enterprises around the world are using multicloud strategies to optimize the performance of modern and existing legacy applications running on-premises, in public cloud services, and on legacy systems. In the early days of enterprise cloud adoption, many organizations focused their cloud strategies on enabling net-new cloud-native applications written to take advantage of dynamic cloud infrastructure and pay-as-you-go consumption-based cost models. Early success with these implementations is convincing more and more enterprises to expand their cloud footprint and to migrate existing applications to cloud in order to enhance end-user experiences, optimize cloud resource utilization and costs, and create a more flexible and agile business environment.
Tags : 
    
AppDynamics

Cloud Best Practices: Audit Checklist for Endpoint Security

Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron

Cloud Best Practices: Audit Checklist for Endpoint Security

Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron

Crossing the Legacy ITSM Chasm: A Risk/Benefits Assessment

Published By: ServiceNow     Published Date: Jan 03, 2017
The scope and value that modern IT service delivery provides a business is increasing dramatically, according to a new research reportfrom Enterprise Management Associates (EMA). And yet in some organizations legacy ITSM systems contribute significantly to reduced credibility for IT departments who fail to integrate with and support important business concerns. This lack of modern IT service delivery creates multiple issues for the enterprise, including: Increasing divergence of IT and business performance Rising costs due to service delivery complexity Inability to measure and protect a business from potential risks Informed by extensive research and two compelling deployment narratives, this report examines what EMA calls “next-generation ITSM” and its contributions toward optimizing changing IT and business requirements. EMA contrasts these advances with the risks of staying with legacy ITSM models and then evaluates and itemizes the risks of “doing nothing” by allowing legacy ITS
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management
    
ServiceNow

Beyond Data Discovery - The Value Unlocked by Modern Data Modeling

Published By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
    
Looker

Alternative Legal Service Providers

Published By: Thomson Reuters     Published Date: Mar 08, 2018
In recent years, the legal marketplace has seen an influx of new start-ups and new entrants looking to challenge the long-standing service model offered by law firms to their clients. Traditionally, clients looked to their law firms to provide a full range of legal and legal-related services, i.e., to handle every aspect of a matter, even including those activities that did not involve the direct provision of legal services. Today, by contrast, consumers of legal services find themselves the beneficiaries of a new and growing number of nontraditional service providers that are changing the way legal work is getting done. These alternative providers comprise a new sector of the legal market, one that is emerging and evolving rapidly, but is still very much in its infancy.
Tags : 
legal, services, lpo, accounting, audit, revenue, thomson, reuters
    
Thomson Reuters

Strategies for API Security

Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies

The Forrester Wave™: Cloud Strategies of Online Collaboration Software Vendors

Published By: IBM     Published Date: Mar 29, 2017
This report details our findings about how well each vendor fulfills our criteria for constructing an online collaboration service and where they stand in relation to each other. Forrester chose to evaluate the overall strategies of these providers across criteria like global footprint, service-level agreements, mobile support, enterprise readiness, and more. This report and associated Excel model highlight the key criteria CIOs and their staffs should evaluate when looking at prospective providers of online collaboration services. Download now to learn more!
Tags : 
forrester, cloud, online collaberation, it management, cloud strategies
    
IBM

Accelerate VMware Cloud On AWS Adoption With RoundTower

Published By: AWS     Published Date: Dec 19, 2018
Some organizations are reluctant to migrate to the cloud because they believe they will be forced to learn new skills, start using new tools, and adopt new processes. However, by deploying VMware Cloud on AWS, your organization can continue to leverage existing, familiar VMware investments. This on-demand service delivers a powerful hybrid cloud solution, combining an industry leader in virtualization, VMware, with the largest cloud provider, Amazon Web Services (AWS). One of the first solution providers to achieve the VMware Solution Competency and a participant in the AWS Partner Initiative for VMware Cloud on AWS, RoundTower is uniquely qualified to help your organization adopt and optimize VMware Cloud on AWS. Watch this webinar to see how they can extend your on-premises data center to AWS, enabling you to gain increased flexibility, a rapidly scalable environment, and faster time to innovation. Download our webinar to learn How to take advantage of flexible consumption models t
Tags : 
    
AWS

New Tools For Protecting Cloud Services From Emerging Threats

Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.