HIT Consultant Insightful coverage of healthcare innovation
 

code

Results 1 - 25 of 502Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Nov 30, 2015
Hold for copy
Tags : 
    
Symantec
Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec
    
Veracode
Published By: CheckMarx     Published Date: Apr 03, 2019
As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. We’ve created a list of specific recommendations on how to improve your program for better, faster results. We present to you “How to make your software security program successful: 10 Essential Best Practices.”
Tags : 
    
CheckMarx
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
save money, save time, online food ordering, food, ordering food online, seamless
    
Seamless
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
    
Seamless
Published By: Salesforce     Published Date: Oct 17, 2019
In this Magic Quadrant, Gartner evaluates the strengths and weaknesses of 18 providers that it considers the most significant in the marketplace and provides readers with a graph (the Magic Quadrant) plotting the vendors based on their ability to execute and their completeness of vision. The graph is divided into four quadrants: niche players, challengers, visionaries, and leaders. At Solutions Review, we’ve read the report and pulled out the key takeaways.
Tags : 
    
Salesforce
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow
    
K2
Published By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : 
scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
    
ScanLife
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
Published By: Puppet     Published Date: Jun 24, 2016
The fifth annual State of DevOps Report, presented by Puppet and DevOps Research & Assessment (DORA), confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns. This year’s report shows how DevOps speeds up delivery, improves quality and security, enhances employee engagement and more. Download the report to learn why: • High-performing IT organization experience 200x more frequent deployments and 24x recovery from failures. • High performers spend 22 percent less time on unplanned work and 29 percent more time on new work, such as features or code. • Taking an experimental approach to product development improves IT performance. The report also helps you understand the ROI of DevOps, and includes formulas to quantify your potential cost savings, using metrics from you own organization.
Tags : 
    
Puppet
Published By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : 
veracode, security, software security, application security, security benchmark
    
Veracode
Published By: Zebra Technologies     Published Date: Sep 07, 2017
In the age of evolving shopper expectations and technology advancements, the global retail industry is in the midst of a profound shift in retail operations. To gain a deeper understanding of retailers’ focus, concerns and investment plans, Zebra conducted a global research study across a wide spectrum of retail segments, including: specialty stores, department stores, apparel merchants, supermarkets, electronics, home improvement and drugstore chains. The results of this study are shared in this 2017 Retail Vision Study.
Tags : 
inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers, state of the hospitality industry, smart data dives, automating convenience, the personalization equation, location technologies, key qr code applications, customer service, customer satisfaction
    
Zebra Technologies
Published By: CodeBaby     Published Date: Nov 27, 2012
Healthcare organizations are integrating intelligent virtual assistants to enhance online experience and reduce costs. This guide overviews the capabilities and benefits of using virtual assistants to engage, optimize, and complement existing service channels.
Tags : 
online self-service, customer experience, customer service, intelligent virtual assistants, conversion optimization, tech support, crm, web self-service, contact center management, virtual agent, knowledgebase, ecommerce, mcommerce, live chat, website optimization, multi-channel branding
    
CodeBaby
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Veracode     Published Date: Jun 26, 2019
DevOps, a new model for software development, is transforming the way the world creates software. And despite its substantial organizational, cultural and technological requirements, this new way of organizing development and IT operations work is spreading rapidly.
Tags : 
    
Veracode
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron
    
Cast Iron Systems
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales, advertising, marketing campaign, ad tracking, generate leads, sales leads, online sales, sales tool, small business, ecommerce, search engine ranking, seo, keywords
    
VisiStat
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn how to keep your data on endpoints beyond your network.
Tags : 
deduplication,  worker productivity,  backup solution,  recover data, data security,  protecting data
    
Code42
Published By: Commvault     Published Date: Jul 06, 2016
Think of a wildfire that quickly spreads as it increases in speed and power. That is what is happening today as data growth increases the volume and management complexity of storage, backup and recovery. Now think of trying to stop that fire with a garden hose. Your traditional backup and recovery process is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today’s 24/7, always-on environment. Here we examine the benefits of moving from a solution comprised of multiple point products to a holistic data protection platform designed to serve today’s enterprise.
Tags : 
commvault, data protection, storage, backup, recovery, holistic data protection, singe pane of glass, common code base, analytics, reporting
    
Commvault
Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt, Inc.
Published By: IBM     Published Date: Jul 29, 2014
This white paper will discuss key tips for improving a release process and strengthening release management. Once the following practices are in order, the process can be enabled to keep up with the pace of Agile, and reduce the risks associated with rapid deployments.
Tags : 
ibm, ibm urbancode, release management, release process, deployments, rapid deployment, agility, application releases, application deployment
    
IBM
Published By: Code42     Published Date: Mar 31, 2017
Download the Windows 10 migration checklist today for a list of all factors to consider as you prepare to upgrade your enterprise PCs.
Tags : 
    
Code42
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.