HIT Consultant Insightful coverage of healthcare innovation
 

it development

Results 1076 - 1100 of 1123Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Sep 08, 2016
Since it first emerged more than a decade ago, Service Oriented Architecture (SOA) has been both widely praised as a modern and agile approach to software development and infrastructure architecture and dismissed as a colossal waste of time and money. Missed expectations for many SOA projects led one analyst in 2009 to declare, “SOA is dead.” Far from being dead, however, service oriented architecture is in fact more relevant than ever
Tags : 
mulesoft, service oriented architecture, software development, saas, mobile, big data
    
MuleSoft
Published By: JBoss Developer     Published Date: Jan 25, 2016
Deploying open source software successfully in an enterprise environment requires careful evaluation. Not all open source software is designed for enterprise use, and not all open source communities serve the unique needs of enterprise development. Read this paper to learn about Red Hat's proven track record of delivering IT solutions to the Forbes Global 2000.
Tags : 
red hat, open source software, integration software, enterprise development, it solutions
    
JBoss Developer
Published By: IBM     Published Date: Mar 31, 2016
"The market buzz around APIs has distorted executive's thought processes about how to make money from APIs. Our guest speaker, Forrester analyst Randy Heffner, will tell the real truth about how to drive value from APIs. Who Should Read/View This webcast: business audience Attend to also learn how to: Provide business users with real-time information for more informed decision making Leverage the latest cloud, mobile, and analytics enhancements in IIB v10 Use the IIB Healthcare Pack to accelerate development and deployment of integration solutions Who Should Attend this Webcast: business audience"
Tags : 
ibm, api, integration, application program interface, middleware
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting
    
IBM
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build
Tags : 
    
Oracle
Published By: OpenText     Published Date: May 26, 2017
Manufacturing has changed dramatically over the last decade. Developments in IT and the internet have enabled companies to transform from regional manufacturers into global, connected enterprises that provide better products at lower costs. These products are designed and engineered by collaborative teams in design centers around the world to take advantage of unique talent pools.
Tags : 
opentext, eim, solutions, development
    
OpenText
Published By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
Prior to the cloud, Windows applications required complex and costly licensing agreements, locking developers into specific architectures and deployment patterns. By containerizing your Windows workloads on Amazon Web Services (AWS), you can enhance your existing applications with modern development best practices, with the speed, scalability, and cost-efficiency of the cloud. Download our whitepaper to learn best practices for containerizing Windows applications on AWS.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
How hyperconverged infrastructure can reduce costs and help align enterprise IT with business needs. Includes chapters on hyperconvergence and cloud, datacenter consolidation, ROBO deployment, test and development environments, and disaster recovery.
Tags : 
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Jul 19, 2017
• Bringing DevOps to Mainframe enables organizations to increase business agility and sustain innovation velocity • CA solutions deliver DevOps for the mainframe and support agile development, continuous testing, continuous delivery and agile operations
Tags : 
    
CA Technologies
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security
    
Veracode
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
In today’s highly digital world, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses in order to deliver an optimal user experience. The IBM MaaS360 suite allows for a robust app development platform where you can increase portability and interoperability to enable and support every mobile user in your organization. Download this e-book to see how you can create the best mobile environment for your users and employees. All of the Enterprise Mobile Management tools and services needed to deliver the optimal user experience to every user, wherever they are, whatever app they are using, and whenever they need resources, are well-integrated into the MaaS360 suite from IBM.
Tags : 
enterprise management, mobile management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: HotSchedules     Published Date: Feb 06, 2018
Moving from doing all your training on paper and in person to an online learning management system can be a daunting task. And switching from one LMS to another is a great time to reevaluate your program. But where to start? This ebook breaks it down in to six steps you can take internally to help you prepare to make the jump and launch a successful elearning program. As you prepare to move to a new LMS consider Clarifi Talent Development, the learning and performance management system designed for today’s workforce. It is the choice for leading brands like Brinker, Newk’s and Subway.
Tags : 
online, training, onboarding, employee, management, lms
    
HotSchedules
Published By: HotSchedules     Published Date: Feb 06, 2018
White Paper Published By: HotSchedules Newk's Eatery has quarterly limited time offers which means they change their menu quite often. It was always a great challenge for them to communicate from corporate to the store level. With Clarifi Talent Development, it became easy. In Newk’s Online Academy, they put their guide, along with a video, that provides the process to prep and how to assemble the dish on the line. Then, each employee takes an interactive quiz and becomes certified. Read the full success story now to find out how HotSchedules helped Newk's Eatery solve their business challenges.
Tags : 
restaurant, corporate, hotschedules, business, challenges
    
HotSchedules
Published By: XpertHR     Published Date: Jun 13, 2018
It’s an employee job market these days. With the lowest unemployment rate in decades, HR professionals must be hyper-focused not just on attracting, but on retaining, top talent. The stakes are too high to risk losing key employees to competitors. Effective performance management and a strong culture are must haves to keep valuable talent from walking out the door. This whitepaper from XpertHR covers nine critical categories of best practices in retaining top talent. Download your copy today!
Tags : 
employee retention, reduce turnover, talent management, performance management, talent acquisition, company culture, career development, employee communication
    
XpertHR
Published By: OnBase by Hyland     Published Date: May 16, 2017
To make informed decisions and serve customers, your employees need the right tools and access to key information, in the right context. But, when business-critical information is scattered across multiple off-the-shelf and custom-coded applications, your workers are less efficient and your customers’ experiences suffer. When it comes to your enterprise application strategy, are you thinking beyond build-versus-buy? Download this Forrester Consulting thought leadership paper to learn how Low-code rapid application development platforms offer a faster, easier alternative that empowers your IT organization, your employees and your customers.
Tags : 
forrester consulting, hyland, application development platforms, rapid app development platform, it sprawl, it solutions
    
OnBase by Hyland
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: Spectrum Enterprise     Published Date: May 15, 2017
Read this case study to learn how CIG leverages blazing Internet speeds and capacity to engage players directly in creating the movie-quality gaming world of Star Citizen.
Tags : 
    
Spectrum Enterprise
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.