HIT Consultant Insightful coverage of healthcare innovation
 

building

Results 426 - 450 of 1488Sort Results By: Published Date | Title | Company Name
Published By: Jive     Published Date: Apr 20, 2010
Download this free white paper from Jive Software to learn how Social Business Software can help build your online community.
Tags : 
engagement, jive software, social platform, social media, lead management, lead nurturing, social networking, business software, social web
    
Jive
Published By: Okta     Published Date: Feb 05, 2013
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success.
Tags : 
okta, customer service, architectural overview, online portals, 3rd party portal integration
    
Okta
Published By: Zilliant     Published Date: Sep 27, 2019
Building Products Distributors face changing costs often. How to strategically (and profitably) manage pricing.
Tags : 
    
Zilliant
Published By: IBM     Published Date: Oct 24, 2012
Building long-term and profitable relationships has long been the goal for financial services companies new channels and growing complexity have made it more challenging than ever. Read on to learn about changing customer relationships and strategies
Tags : 
ibm, customer relationships, crm, customer relationship management, social media, financial services, data
    
IBM
Published By: MemSQL     Published Date: Nov 15, 2017
FREE O'REILLY EBOOK: BUILDING REAL-TIME DATA PIPELINES Unifying Applications and Analytics with In-Memory Architectures You'll Learn: - How to use Apache Kafka and Spark to build real-time data pipelines - How to use in-memory database management systems for real-time analytics - Top architectures for transitioning from data silos to real-time processing - Steps for getting to real-time operational systems - Considerations for choosing the best deployment option
Tags : 
hardware trends, data pipelines, database management, architectures, technology
    
MemSQL
Published By: Genius Inc     Published Date: Apr 28, 2010
This event will give you what you need to: •Evaluate your social media needs •Set the ground rules for your organization •Establish Goals •Match response and engagement to buyer interest •Measure Success •Get started and be successful with Social Marketing
Tags : 
genius, webinar, social marketing, social media, networking, response, engagement, sales, buyer interest
    
Genius Inc
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture, clearnova, clear nova
    
ClearNova
Published By: Zilliant     Published Date: Sep 27, 2018
Building Safety Products Manufacturer Achieves 1.5 Percent Increase in Margin Dollar Rate with Price Optimization
Tags : 
    
Zilliant
Published By: Zilliant     Published Date: Sep 27, 2018
Building Safety Products Manufacturer Achieves 1.5 Percent Increase in Margin Dollar Rate with Price Optimization
Tags : 
    
Zilliant
Published By: Kony     Published Date: Jan 13, 2015
This Gigaom Research webinar will discuss the current state of mobile development processes and tools, evaluate the impact of disruptive forces over the coming years, and provide guidance about how to approach cross-platform mobile development and how to build a flexible, scalable toolset.
Tags : 
kony, mobile applications, mobile application development, mobile apps, application development platform, development tools
    
Kony
Published By: Force10 Networks     Published Date: Dec 04, 2006
With Grid computing, computer systems and other resources aren’t necessarily constrained to be dedicated to individual users or applications, but can be made available for dynamic pooling or sharing to meet the changing needs of the organization.
Tags : 
ethernet, cluster, grid computing, performance cluster, utility computing, force10, force 10, force10 networks
    
Force10 Networks
Published By: IBM     Published Date: Nov 14, 2014
Security is a growing concern in our increasingly connected Internet of Things. Everything that is connected is potentially subject to malicious and criminal attack. Learn how to incorporate security analysis and development techniques to build secure smarter systems.
Tags : 
security, cyber physical systems, agility, product development, security analysis, secure smarter systems
    
IBM
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications
    
Okta
Published By: OKTA     Published Date: Sep 26, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
OKTA
Published By: Okta     Published Date: May 12, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
Okta
Published By: Coverity     Published Date: Mar 13, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle. And it is only by bringing security into all phases of development that you can begin to protect your operations.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Published By: Coverity     Published Date: Apr 20, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
Published By: 6th Sense Analytics     Published Date: Sep 19, 2007
Offshore development has been embraced by the vast majority of commercial software vendors and enterprise application development groups. Why? Because a world flattened by globalization makes it possible to improve competitiveness by taking advantage of the easy exchange of low-cost, high-quality technical skills.
Tags : 
offshore, offshoring, outsource, outsourcing, software, productivity, workforce, workforce management, globalization, 6th sense, 6th sense analytics
    
6th Sense Analytics
Published By: IBM     Published Date: Jan 06, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action?
Tags : 
talent analytics, ibm, big data, strategy
    
IBM
Published By: IBM     Published Date: Jun 13, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting
    
IBM
Published By: IBM     Published Date: Mar 28, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : 
ibm, smarter workforce, talent management, talent analytics
    
IBM
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.