HIT Consultant Insightful coverage of healthcare innovation
 

app dev

Results 351 - 375 of 1710Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 15, 2016
As software continues to ‘eat the world’ in today’s app economy, companies need to adapt to changing business models, globalization, and increasing regulatory compliance. Under pressure to support strategic business objectives, IT is rapidly embracing cloud technologies. Cloud adoption has steadily gained acceptance because it promises to help you achieve your business goals faster, more efficiently, and more cost effectively. Cisco Metapod™ is an excellent solution to some of your organization’s biggest business and technology challenges. This infrastructure-as-a-service (IaaS) offer delivers a reliable and programmable infrastructure for your application development and operation teams while providing a public cloud experience behind your firewall, on your premises, and with full remote management.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco has acknowledged the need to address our customers’ array of employee and consumer mobility requirements with a full set of mobility solutions.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, productivity
    
Cisco
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The future of work means a new IT balancing act No matter what the work of your organization, today it’s likely done… …As much out of the office as in it …As much on mobile devices as traditional computers …And much more through cloud applications for core business activities and collaboration with customers and partners. The future of work has arrived, and with it comes a complex new balancing act for IT. On one side of the scale are high expectations for how IT can enable digital transformation and innovation in the business. On the other side is more accountability for mitigating risk, even as growing adoption of new technologies means more apps, more devices, and more mobile employees. This balancing act is driven by current challenges and trends in four areas.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 19, 2019
WE LIVE IN A WORLD WHERE WORK IS NO LONGER A PLACE WHERE YOU GO. It’s what you do — a dynamic activity that people expect to accomplish anywhere, anytime, on any device. Supporting today’s workforce requires a digital platform that empowers productivity and ensures security and management at scale everywhere: on site, on the road, or in the cloud. According to IDC, by 2020, mobile workers will account for 72 percent of the U.S. workforce. And they won’t be just checking email. These workers want to be productive 24/7. That means access to data, documents, and corporate apps anywhere, anytime, on any device. Enterprises, however, are struggling to allow more workers to use additional devices from a multitude of locations.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world. Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohibit visibility and control in distributed architectures. The brief also explains: The Citrix Networking approach to delivering reliability and a high-quality experience How to ensure reliable access to apps at branch and remote locations while keeping costs low How to provide full visibility and analytics for your network, applications, users, and data
Tags : 
    
Citrix Systems
Published By: Citrix     Published Date: Nov 04, 2013
Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access. Click here to find out why.
Tags : 
citrix xenapp, xenapp, application delivery, application integration, device management, device access, remote access
    
Citrix
Published By: rPath     Published Date: Dec 10, 2010
Reducing the Time, Cost and Risk of System Provisioning and Maintenance
Tags : 
rpath, apps and ops, system provisioning and maintenance, application deployment, cloud computing, development and production operation, automated system provisioning, release automation platform
    
rPath
Published By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
    
Oracle APAC
Published By: Oracle Linux     Published Date: Oct 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services.
Tags : 
    
Oracle Linux
Published By: rPath     Published Date: Jan 10, 2012
Check out this pocket guide to learn the seven deadly sins of cloud applications...and best practices for avoiding them.
Tags : 
cloud application deployment, rpath, rpath inc, cloud, clouds, cloud servers, cloud application, cloud deployment
    
rPath
Published By: Gomez IT     Published Date: Dec 04, 2009
Any business considering cloud computing to support its customer-facing Web applications must look beyond the cloud's cost savings and scalability and evaluate how cloud adoption will impact the end-user experience. This whitepaper addresses the Web experience challenges companies must address when adopting the cloud. It offers perspective and best practices to achieve world class Web performance and assist in the evaluation of cloud providers and development of cloud performance SLAs.
Tags : 
gomez, web performance, site performance, ecommerce, online shopping, web performance
    
Gomez IT
Published By: Salesforce.com     Published Date: Apr 16, 2013
Successful mobile apps, especially enterprise mobile apps, typically need to interact with a well-architected set of back-end services, but most mobile app developers are more skilled at client-side front-end development. Enter mobile back-end-as-a-service (BaaS), a new set of hosted platforms that addresses the gap between front-end development proficiency and back-end infrastructure requirements. Enterprise-class back-end-as-a-service addresses scalability while providing an integration platform into existing enterprise services. Use this research as your guidebook to navigating the emerging BaaS landscape.
Tags : 
cloud mobile development, applications, baas, back end as a service, mobile application development, apps, mobile applications, enterprise
    
Salesforce.com
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 11, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: MuleSoft     Published Date: Jun 27, 2019
MuleSoft’s Government Cloud is an industry-leading FedRAMP-compliant cloud environment for building and deploying APIs and integrations with Anypoint Platform. MuleSoft’s US Federal Risk and Authorization Management Program (FedRAMP) compliant-solution enables government agencies to build and secure connections between their applications and citizen data. Download this whitepaper to learn: How MuleSoft’s Government Cloud enables agencies to increase project delivery speed by 3x. Why FedRAMP compliance reduces on-premises infrastructure costs. How government agencies can develop, deploy, manage, and monitor integrations and APIs in the cloud to rapidly expand cloud services.
Tags : 
    
MuleSoft
Published By: AWS     Published Date: Nov 16, 2018
"For existing applications to gain the agility, scalability, resilience, and cost benefits of cloud computing, organizations need to adopt cloud-native architectures. By making this switch, you’ll be better suited to scale more quickly, so you can help meet your ever-changing user demands. The challenge is how to make this transition to a cloud-native architecture, quickly and easily. Download this complimentary white paper to learn how your organization can help simplify the transition to cloud computing by leveraging Amazon Elastic Container Service and TIBCO®. You’ll learn: • Best practices for agile development • New platforms for deployment • The right tools for digital business agility "
Tags : 
    
AWS
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 12, 2017
Recently, cloud-native has been touted as the panacea to all the development concerns. In this webcast, James Governor, a Redmonk analyst and founder, will share what cloud-native really is and how it helps your business. He will highlight organizations that lead the new era of development innovation with agile and continuous methodologies and follow cloud-native development practices. Aaron De Los Reyes, Sr. Director of Oracle Technology at Cognizant, will then share how they and their clients are approaching the shift to cloud-native development and migration strategies for their legacy deployments.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Symantec     Published Date: Nov 30, 2015
Two trends make code signing more important than ever: the explosion of consumer applications for mobile and desktop devices and the proliferation of malware.
Tags : 
    
Symantec
Published By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : 
palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
Palo Alto Networks
Published By: Building Engines     Published Date: Mar 18, 2019
The volume of technology solutions available to CRE professionals is tremendous, and new entrants are emerging at a faster pace than ever. To succeed in this environment, highly effective CRE organizations behave differently than their peers in how they approach, select, and adopt technology. For CRE professionals seeking to develop a more technologically mature organization, the findings in this report provide a few clear guidelines.
Tags : 
    
Building Engines
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.