HIT Consultant Insightful coverage of healthcare innovation
 

app dev

Results 1651 - 1675 of 1678Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : 
data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: OnBase by Hyland     Published Date: May 16, 2017
To make informed decisions and serve customers, your employees need the right tools and access to key information, in the right context. But, when business-critical information is scattered across multiple off-the-shelf and custom-coded applications, your workers are less efficient and your customers’ experiences suffer. When it comes to your enterprise application strategy, are you thinking beyond build-versus-buy? Download this Forrester Consulting thought leadership paper to learn how Low-code rapid application development platforms offer a faster, easier alternative that empowers your IT organization, your employees and your customers.
Tags : 
forrester consulting, hyland, application development platforms, rapid app development platform, it sprawl, it solutions
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: May 16, 2017
With smartphones and tablets now standard-issue office gear,workers fully expect to have mobile access to critical data and business applications wherever and whenever the need arises.And it’s not just the average field worker or sales rep who stands to benefit from remote access. An IDG survey found that 61% of the executive managers saw value in accessing critical business data while offline via their mobile devices. This IDG whitepaper proves that offline access is the key to unlocking mobility’s promise.
Tags : 
hyland, offline access, mobility, remote access, mobile access, business applications
    
OnBase by Hyland
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: Pure Storage     Published Date: Jul 03, 2019
Apache® Spark™ has become a vital technology for development teams looking to leverage an ultrafast in-memory data engine for big data analytics. Spark is a flexible open-source platform, letting developers write applications in Java, Scala, Python or R. With Spark, development teams can accelerate analytics applications by orders of magnitude.
Tags : 
    
Pure Storage
Published By: Google     Published Date: Dec 03, 2018
As businesses have embraced application development, they have also adopted cloud technologies that provide their teams lesser reliance on hardware. In this sponsored Economist Intelligence Unit report, we look at the real-life experiences of over 1,000 business executives and understand the importance of close alignment between development teams, C-suite, and the wider business. Read the report and find out how you can manage application development to unlock its full potential.
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Avec la prolifération des applications SaaS et des appareils mobiles, la sécurité réseau n’a jamais été aussi complexe. Vos employés et vos partenaires disposent désormais d’un niveau d’accès sans précédent à votre organisation, souvent hors des limites physiques de l’entreprise. En d’autres termes, votre sécurité basée sur le périmètre ne suffit plus : les identités sont devenues le nouveau périmètre.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
    
CA Technologies EMEA
Published By: Sparton Corporation     Published Date: Oct 30, 2017
When it comes to Design for Manufacturing (DFM), it’s never too early to start. Planning ahead and thinking through the entire product lifecycle is the best way to reap all the benefits that come from excellent design — including better part selection, improved product quality, streamlined approvals and cost savings. Start by identifying an experienced Countract Manufacturer (CM) that understands the importance of good DFM and who will work with the product developer at every step.
Tags : 
product, market, design, intellectual property, sparton, manufacturing
    
Sparton Corporation
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Datavail     Published Date: Dec 07, 2017
Our Application Performance Management (APM) platform developed by Accelatis, which was acquired by Datavail in 2017, applies consistent, measurable, and repeatable activity to your Hyperion instance to identify scalability issues before they affect real users in production.
Tags : 
    
Datavail
Published By: Anaplan     Published Date: Sep 19, 2018
Le principal avantage des projets bien pense?s et bien conduits, c’est qu’ils aboutissent immanquablement au me?me re?sultat. Un cahier des charges est e?tabli, un appel d’offres est lance?, un plan projet est agre?e?, une solution est trouve?e, la mise en oeuvre se fait dans les conditions pre?vues… et le premier constat des utilisateurs est que le re?sultat final ne correspond plus aux besoins du moment. Dans un monde dont le rythme de transformation s’acce?le?re, les enjeux d’une bonne planification et mode?lisation se de?placent. Si la qualite? des mode?les et des simulations demeure importante, la capacite? a? modifier des plans, revoir des organisations, simuler des hypothe?ses impre?vues, le tout en quelques minutes, devient une impe?rieuse ne?cessite?. Un nombre croissant d’entreprises fait confiance a? Anaplan pour relever ce de?fi. Découvrez à travers cet Ebook les 5 témoignages de UFF, AXA, AccorHotels, Schneider Electric et Onduline.
Tags : 
    
Anaplan
Published By: Infosys     Published Date: Jan 02, 2019
Challenge: An air purifier manufacturer needed to remind customers to periodically change filters to maintain product efficiency and deliver consistent customer experience. Solution: We helped them develop a Bluetooth enabled ‘smart’ air filter, where an embedded sensor measured the effectiveness of the filter and relayed that information to an iOS or Android app. Users were alerted when filters needed replacing, and given the opportunity to buy directly through online retailers and also to subscribe to the Amazon Device Replenishment Service. Outcomes: • Increased revenue through replacement filter sales • Expected to touch 50,000 users in the first year • Integrated with Amazon Alexa for seamless digital experience • Powerful product differentiation in a crowded market
Tags : 
    
Infosys
Published By: IBM     Published Date: Jul 09, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes integrates monitoring and visualization of device health, end-to-end network paths and the performance of your internally hosted and cloud applications in one place. Identify critical dependencies in your internal network and monitor how device health impacts application performance.
Tags : 
thousandeyes, device management, network devices, cloud applications, network monitoring, application performance
    
ThousandEyes
Published By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Workday France     Published Date: Mar 08, 2018
Le Cloud Computing fait le buzz. Et c’est justifié. En réalité, la plupart des entreprises ont déjà intégré certains services Cloud dans leur infrastructure informatique. Les logiciels sur site deviennent obsolètes et les solutions hybrides sont limitées. Les applications Cloud, quant à elles, offrent de nouvelles manières pour déployer des solutions innovantes. Ces solutions sont aussi pratiques que simples à utiliser et à gérer. Aujourd’hui, le Cloud devient le socle de l’infrastructure sur lequel les entreprises innovantes s'appuient pour développer leurs activités.
Tags : 
    
Workday France
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Start   Previous    54 55 56 57 58 59 60 61 62 63 64 65 66 67 68    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.