HIT Consultant Insightful coverage of healthcare innovation
 

app dev

Results 1676 - 1700 of 1740Sort Results By: Published Date | Title | Company Name
Published By: Mentor Graphics     Published Date: May 21, 2009
No question the UI in electronic devices today is playing a larger role in the success of a device. Get the UI wrong and your product will have little chance of surviving. And it isn’t enough to deliver a UI that is merely functional: it has to look good too. Studies have shown that a good cosmetic design can encourage users to explore the full range of features and often, can engender the perception that a product is easier to use, which can make consumers more tolerant of product deficiencies. Learn more today!
Tags : 
mentor, user interface, electronic devices, consumer, cosmetic, graphics, nucleus, time-to-market
    
Mentor Graphics
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication
    
BlackBerry
Published By: BlackBerry     Published Date: May 11, 2009
Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and BlackBerrys in the field.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Published By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : 
microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform
    
Microsoft Visual Studio Team System
Published By: Mentor Graphics     Published Date: Apr 03, 2009
The success of any consumer electronic device depends to a large extent on the appeal of the user interface (UI) and how easy the device is to use. Studies show that good cosmetic design can encourage users to explore the full range of features and often engenders the perception that a product is easier to use. So if the benefits of a great looking, easy-to-use UI are so clear, why are so many products still falling short of customer expectations? The solution lies in taking a fresh new approach a consumer electronic device UI plays. By identifying common UI functionality and implementing it in a reusable and customizable way, we can make it far easier for embedded engineers to deliver visually engaging and easy-to-use consumer electronic products.
Tags : 
inflexion platform ui, user interface, consumer electronic device, mentor graphics, ui functionality, media player, mobile phone, tv set-top box
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
Moving to C++ presents opportunities for higher programmer productivity. The requirements of embedded systems, however, demand that the adoption of C++ be carefully measured for the performance impact of run-time costs present in C++, but not in C. This talk suggests strategies for developers who are starting their acquaintance with C++.
Tags : 
c++, coding, developer, programming, programmer, mentor graphics, run-time costs, embedded systems
    
Mentor Graphics
Published By: Sage SalesLogix     Published Date: Apr 03, 2009
Workforce mobilization has become a key competitive requirement for most organizations. However, enabling mobility is more than just providing laptops and mobile phones to users and sending them out into the field. It's about selecting the appropriate technologies and developing the right user experience.
Tags : 
crm, customer relationship management, customer centric, saleslogix, user center design, mobile crm, customer-centric, customer service
    
Sage SalesLogix
Published By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : 
blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication
    
BlackBerry
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
Being better than your competitors at creating and using custom software can bring substantial competitive advantage. Similarly, being worse can put you at a significant disadvantage. If your organization doesn’t see ALM as one of its most important business processes, it’s time to change that view.
Tags : 
vsts, alm, application lifecycle management, moody’s, alm, business process, software development lifecycle, sdlc
    
Microsoft Visual Studio Team System
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
ALM is much more than just writing code. All three aspects—governance, development, and operations are important. Maximizing the value of the applications we create means doing all three aspects of ALM well. Achieving this goal isn’t easy, especially when today’s ALM tools aren’t as well integrated as they could be. Yet there’s no way around it: Taking a broad, holistic view of ALM is essential for improving this critical business process.
Tags : 
vsts, alm, application lifecycle management, software development lifecycle, sdlc, governance
    
Microsoft Visual Studio Team System
Published By: Cornerstone OnDemand     Published Date: Feb 12, 2009
Talent management has become one of the most pressing topics within HR organizations today - and it is no wonder, given the current economic environment and business imperatives. In this research bulletin, we will outline the approach HR organizations must take to identify, cost-justify, develop and implement the highest impact talent management strategy.
Tags : 
cornerstone, talent management, business continuity, business performance, globalization, recession, planning, economic
    
Cornerstone OnDemand
Published By: Infoblox     Published Date: Feb 03, 2009
Today’s networks support more applications, traffic, users, and devices than ever before – a trend that only increases on a daily basis. At the heart of all IP networks live core network services, like DNS, DHCP, and  RADIUS that are crucial for keeping traffic flowing, users connected, and applications available.
Tags : 
infoblox, core network services, dhcp, ip networks, radius, ip address assignment, ipam, ip telephony
    
Infoblox
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix.
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
One of the unfortunate effects of the continued evolution of the load balancer into today's application delivery controller (ADC) is that it is often too easy to forget the basic problem for which load balancers were originally created-producing highly available, scalable, and predictable application services. This White Paper describes the Evolution of load balancing devices to Application Delivery Controllers.
Tags : 
application delivery controller, load balancer, load balancing
    
F5 Networks Inc
Published By: ThreatMetrix     Published Date: Jan 21, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix
Published By: NetApp     Published Date: Dec 18, 2008
NetApp has been providing advanced storage features to VMware ESX solutions since the product began shipping in 2001. During that time, NetApp has developed operational guidelines for the FAS systems and ESX Server. This technical report reviews the best practices for implementing VMware® Virtual Infrastructure on NetApp fabric-attached storage (FAS) systems.
Tags : 
netapp, vmware esx solutions, esx server, fas systems
    
NetApp
Published By: Evergreen Systems, Inc.     Published Date: Dec 16, 2008
This comprehensive white paper applies automation and ITIL best practices to the data center and reviews current industry trends, server automation energy usage issues and a variety of optimization strategies for data center improvement.  The effects of virtualization are explored in-depth.  Includes detailed sections on increasing operational efficiency using workflow analysis, automating and optimizing server change management, reducing infrastructure complexity and developing security, disaster recovery and business continuity procedures.  Step by step instructions for developing metrics and a business case to justify data center and server automation are included.
Tags : 
evergreen system, data center automation, data center automation manager, network automation, server automation, server virtualization, itil, data center optimization
    
Evergreen Systems, Inc.
Published By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software
    
HP - Enterprise
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Published By: Dell-Intel     Published Date: Oct 30, 2008
Dell servers have been optimized to help provide strong support for the latest ESX release, VMware ESX 3.5 Update 2, including enhanced performance for virtualized environments based on support for six-core Intel Xeon processors. Organizations that do not approach server virtualization with a clear plan risk developing a chaotic, inflexible infrastructure that wastes energy and resources.
Tags : 
hyper v, dell, intel, it infrastructure, virtualization, server virtualization, esx, tco
    
Dell-Intel
Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security
    
Quocirca
Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: RisingMedia     Published Date: Oct 14, 2008
Defining specific metrics for measuring the success of a Web site is a daunting task. The inability to identify proper criteria and meaningful calculations is hampering the e-business world's capacity to determine the value of corporate Web sites and to set appropriate budgets for their development.
Tags : 
emetrics, risingmedia, netgenesis, e-business, roi metrics
    
RisingMedia
Start   Previous    56 57 58 59 60 61 62 63 64 65 66 67 68 69 70    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.