HIT Consultant Insightful coverage of healthcare innovation
 

app dev

Results 401 - 425 of 1740Sort Results By: Published Date | Title | Company Name
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Juniper Networks     Published Date: Oct 25, 2017
The primary purpose of containerized applications is to improve the effectiveness of software teams, making it easier for people to work together while lowering the communications overhead. In large enterprises, applications such as ERP or CRM software suites often begin as simple projects, but as time passes, they quickly become clunky and inefficient, with a monolithic code base that slows progress for development teams.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive
    
Aerohive
Published By: Sauce Labs     Published Date: May 30, 2018
Today’s modern development disciplines -- whether Agile, Continuous Integration (CI) or Continuous Delivery (CD) -- have completely transformed how teams develop and deliver applications. Companies that need to compete in today’s fast-paced digital economy must also transform how they test. Successful teams know the secret sauce to delivering high quality digital experiences fast is continuous testing. This paper will define continuous testing, explain what it is, why it’s important, and the core elements and tactical changes development and QA teams need to make in order to succeed at this emerging practice.
Tags : 
    
Sauce Labs
Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions, consulting
    
M3 Consulting, Inc.
Published By: HERE Technologies     Published Date: Sep 27, 2018
Location has become paramount to building new apps, services, experiences and business models. If data is the new oil, then location is the crude oil. This is why most of the top location platform players have been developing technologies to power next-generation autonomous mobility systems. And the “richness” of location data and real-time intelligence are becoming strong monetization opportunities. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors, including Google, TomTom and Mapbox. Learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
L'importanza di rapidità e agility. Oggi tutti i business subiscono l'effetto dirompente di upstart digitali, che individuano nuovi modi per soddisfare nuovi requisiti di mercato battendo sul tempo aziende più affermate. Pur potendo contare su team IT di talento e anni di vantaggio nel contesto dell'architettura e dello sviluppo, rimane difficile rispondere a queste sfide utilizzando modelli tradizionali di sviluppo, centrati su applicazioni software monolitiche. È semplicemente impossibile arrivare sul mercato in modo rapido quando le applicazioni devono essere mantenute, modificate e ridimensionate come un'unica entità da team di grandi dimensioni, fortemente interdipendenti.
Tags : 
    
CA Technologies EMEA
Published By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data
    
CDW
Published By: Dell     Published Date: Sep 26, 2017
Government organizations need a workforce approach that not only enables employees to make informed decisions and work more efficiently, but also promotes engagement and satisfaction. Download this whitepaper to learn more about how to enable employees to better focus on their core roles and expertise and how to access the right information on demand to be more productive. As well, determine best practices for selecting the right devices to enable the organization as a whole to accomplish its mission, meet citizens’ needs, and attract and retain the workforce it needs for the future.
Tags : 
    
Dell
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api
    
IBM
Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Published By: Iovation     Published Date: Sep 25, 2009
Learn what new and innovative techniques and solutions can be used to combat online credit application fraud, and how you can realize a true ROI by reducing losses and increasing operational efficiency within your fraud prevention process.
Tags : 
iovation, online credit applicants, fraudulent, stolen identities, financial, banking, and credit industries, fraud prevention strategies
    
Iovation
Published By: Bronto     Published Date: May 18, 2017
With a growing number of marketing application available, marketing terms are struggling to see differences among them. Meanwhile, IT teams are bogged down with development and maintenance requests to migrate or manage the use of multiple platforms already in use. Choosing a marketing technology partner is a total-revenue-performance decision. Ask questions about integration and scalability. Find partners whose marketing automation is built to scale with your business, and select vendors whose teams provide the critical support and services you'll need along the way.
Tags : 
bronto, integration, e-commerce, marketing automation, platforms, internet retailers, business growth, revenue generation
    
Bronto
Published By: Bronto     Published Date: Jul 10, 2017
With a growing number of marketing applications available, marketing teams are struggling to see differences among them. Meanwhile, IT teams are bogged down with development and maintenance requests to migrate or manage the use of multiple platforms already in use. Gartner’s 2016-2017 CMO Spend Survey found that marketing departments are spending 38% of their tech budgets on external development services and cross-charges from internal IT teams. Strategic marketing and IT leaders are looking for ways to streamline technology and eliminate solutions that limit integrations and scalability. It’s important to look at the resources required to maintain the marketing applications you use and compare them to other options available in the marketplace. Choosing a marketing technology partner is a total-revenue-performance decision. Ask questions about integration and scalability. Find partners whose marketing automation is built to scale with your business, and select vendors whose teams pro
Tags : 
marketing automation, commerce, gartner, integration, scalability
    
Bronto
Published By: IBM     Published Date: Oct 24, 2012
The world's appetite for media and entertainment is seemingly insatiable. New devices are enabling the use of new media in ways that were barely imaginable a few decades ago. Read on to learn more about analytics and personalization to attract users.
Tags : 
analytics, ibm, consumer behavior, consumer, user, media, cross channel marketing
    
IBM
Published By: CA Technologies     Published Date: Jun 04, 2015
Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 03, 2015
"Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes."
Tags : 
    
CA Technologies
Published By: Salesforce     Published Date: Dec 29, 2015
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers
    
Salesforce
Published By: Salesforce     Published Date: Jan 14, 2016
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers
    
Salesforce
Published By: Applause Israel     Published Date: Sep 25, 2018
The goal of usability testing, simply put, is to make sure that a user can complete the tasks they are expected to complete. Usability testing doesn’t test whether or not the functions of the application, website or connected device work correctly, but rather that a user intuitively understands how to perform these tasks — and how easy or difficult it was to do so. With usability testing, “close enough” won’t cut it. A product may have a superior architecture, a great set of features, good performance, scalability and a number of other positive attributes. However, all of this effort is wasted if the user experience is inadequate. An application, website or connected device that is not user-friendly is just as bad as a buggy version and can lead to diminished revenue, product abandonment or a total failure. An application with poor usability can also negatively affect a brand
Tags : 
    
Applause Israel
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.