HIT Consultant Insightful coverage of healthcare innovation
 

app dev

Results 1326 - 1350 of 1754Sort Results By: Published Date | Title | Company Name
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Cloud-first development initiatives, the need to deliver your applications and services to an exploding number of mobile devices and the ongoing need to accomplish more with less is driving a data center transformation that increasingly includes the public cloud.
Tags : 
palo alto, vm-series, hybrid cloud, security, security challeneges
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto Networks
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: Panaya     Published Date: Jun 01, 2018
Hear IDC Research Director for ALM Strategies explain how establishing effective agile approaches to software development, QA and testing, ensures software relevance, streamlines execution and increases release velocity. Join IDC guest speaker and Panaya experts to hear: › IDC Research Director, Melinda-Carol Ballou cover the latest ALM industry practices › Which ALM strategies bring greater agility to your backend system › How to implement these practices to achieve frequent, quality change releases
Tags : 
    
Panaya
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: PaperThin, Inc.     Published Date: Dec 29, 2010
Learn how American University created an award-winning, community-focused website that engages its community and inspires passion for the AU brand by using the CommonSpot Web content management solution by PaperThin.
Tags : 
web content management, cms, application development, paperthin, commonspot
    
PaperThin, Inc.
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention
    
PC Mall
Published By: Pega     Published Date: Sep 11, 2015
In this Forrester Wave evaluation of customer relationship management (CRM) suites for enterprise organizations, we identified the nine most significant CRM suites solutions — Infor CRM (formerly known as SalesLogix), Microsoft Dynamics CRM, NetSuite, Oracle Siebel CRM, Pegasystems, Salesforce, SAP CRM, SAP Cloud for Customer, and SugarCRM — and researched, analyzed, and scored them. This report details our findings in order to help application development and delivery (AD&D) professionals supporting CRM operations select the right partner for their customer engagement initiatives.
Tags : 
    
Pega
Published By: Pega     Published Date: Sep 11, 2015
This report details our findings in order to help application development and delivery (AD&D) professionals supporting CRM operations select the right partner for their customer engagement initiatives.
Tags : 
    
Pega
Published By: Pega     Published Date: Apr 04, 2016
Governments have long found it challenging to modernize legacy IT systems. Now comes pressure to offer digital government services. However, which takes priority? The answer is both. But rather than thinking linearly, the smart way is to execute simultaneously by standing a traditional IT approach on its head. Government agencies need to use technology to develop proactive and digital government services, from the outside in, from the perspective of the constituent, while making modernizing adjustments. To be successful, it is critical for government agencies to move beyond traditional development methodologies by adopting an agile development approach. But what are the challenges? How can they modernize massive projects already in the works? In short, how to get there? Download this E-book and find out where government agencies are falling short and where they can improve regarding digitization.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
Governments have long found it challenging to modernize legacy IT systems. Now comes pressure to offer digital government services. However, which takes priority? The answer is both. But rather than thinking linearly, the smart way is to execute simultaneously by standing a traditional IT approach on its head. Government agencies need to use technology to develop proactive and digital government services, from the outside in, from the perspective of the constituent, while making modernizing adjustments. To be successful, it is critical for government agencies to move beyond traditional development methodologies by adopting an agile development approach. But what are the challenges? How can they modernize massive projects already in the works? In short, how to get there? Download this E-bookand find out where government agencies are falling short and where they can improve regarding digitization.
Tags : 
    
Pega
Published By: Pentaho     Published Date: Feb 26, 2015
This eBook from O’Reilly Media will help you navigate the diverse and fast-changing landscape of technologies for processing and storing data (NoSQL, big data, MapReduce, etc).
Tags : 
data systems, data-intensive applications, scalability, maintainability, data storage, application development
    
Pentaho
Published By: Percussion     Published Date: Jun 11, 2013
Many leading organizations that have invested substantial time and money building a web content management (WCM) system to run their web site often face a crossroads. Do they continue to support their own custom-built application and extend it to address the needs of the business today, or do they look to purchase a commercial software product to address these requirements. This leads to a delicate stand-off between the web site business owners (usually marketing), the development team (usually in IT) and the Finance office.
Tags : 
cms, cms best practices, cms software, content marketing, content marketing platform, digital content management, content marketing platform, wcms
    
Percussion
Published By: Phunware     Published Date: Jul 30, 2014
Hospitality businesses now have a major opportunity to increase revenue, differentiate their brands and properties, increase customer service, and jump ahead of competitors. Today’s mobile technology advancements are the key. With branded mobile apps coupled with location-based mobile technologies, you can create a compelling, satisfying, and exciting guest experience in ways not possible just a few months ago.
Tags : 
phunware, hotel app development, resort app development, restaurant app development, hotel mobile development, resort mobile development, restaurant mobile development, hotel mobile strategy
    
Phunware
Published By: Phunware     Published Date: Aug 11, 2014
Mobile devices are streaming millions of location data points in real-time. These data points are extremely valuable in their own right because the very apps that help generate data can also be used to act on insights and deliver relevant messages. Download these insights and examples to turn mobile data into actions.
Tags : 
phunware, mobile, physical marketing analytics, location analytics, business intelligence, space management, customer service, crm
    
Phunware
Published By: Phunware     Published Date: Dec 06, 2014
An Exploration of Development Challenges and Solutions in the Mobility Landscape
Tags : 
mobile application development, ios application development, android application development, mobile development platforms, in-house mobile app development, third party mobile app developers
    
Phunware
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Pivot3     Published Date: Sep 27, 2017
Over the last several years, there have been some dramatic changes in enterprise computing. Not only have there been new applications introduced such as business analytics, there have also been important developments in the infrastructure components used to enable these critical application services.
Tags : 
    
Pivot3
Published By: Polycom     Published Date: Apr 30, 2013
This research note identifies the key trends, the video-enabled business applications that enterprises need to implement now, and describes how to develop a video strategy. Knowing how video is currently being used will help managers identify use cases, understand what users need to get their jobs done, and choose the right solutions for their enterprises.
Tags : 
enterprise, video collaboration, research, consumerization, mobile, cloud, video conferencing
    
Polycom
Start   Previous    47 48 49 50 51 52 53 54 55 56 57 58 59 60 61    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.