application development

Results 301 - 325 of 502Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 09, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
    
AWS
Published By: VeriSign     Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
verisign, mobile apps, code signing, mobile application development, signing certificates
    
VeriSign
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, Mike Kirkup tells about BlackBerry application platform which simplifies the development, deployment and management of wireless applications. Leverages the core strengths of the BlackBerry solution to mobilize additional business processes and applications.
Tags : 
blackberry, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how you can simplify compliance and automate the transition from development to production with complete traceability.  Benefit from process definition and enforcement, and automatic generation of audit trails.  Add consolidation to single, global repository where you move code into a single software change and configuration management instance that works globally, but performs as if everything were local.  Result: savings and productivity.
Tags : 
serena, compliance, traceability, enforment, software, single software, alm, collaboration
    
SERENA Software, Inc
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn what you can do to unify development processes, drive down development costs and improve productivity and coordination across distributed teams. Leverage existing investments in tools, systems and methodologies to increase visibility, control and effectiveness with your application development processes.
Tags : 
process management, visibility, control, application development, unified development, serena software, best practices, serena
    
SERENA Software, Inc
Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process
    
Iovation
Published By: EMA     Published Date: Aug 22, 2012
This webinar will serve as a guide for IT executives and professionals seeking to align IT Operations more closely with Agile Development and Business initiatives.
Tags : 
it operations, agile development, information technology, static operations, extrahop, application development, business technology
    
EMA
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: Micro Focus     Published Date: Aug 28, 2014
Deliver value back to the business faster than before with the Micro Focus Enterprise solution set. Micro Focus' products for IBM zEnterprise make your mainframe work even smarter. Successfully achieve rapid Time to Value of core mainframe applications, helping tackle the growing IT innovation, maintenance and compliance backlog. Faster application service delivery is achieved through technology that transforms mainframe application analysis, modernization, development, testing and workload optimization.
Tags : 
mainframe, core applications, it innovation, data management, business technology
    
Micro Focus
Published By: K2     Published Date: Apr 27, 2015
Download K2’s new white paper, “Make the move from IBM Lotus Notes and optimize your business apps,” to see how the right business-application solution can make all the difference. You will also learn how the right business-application solution can help you quickly rebuild your applications to have greater flexibility and configurability than you had before.
Tags : 
business applications, ibm lotus notes, app environment, it investments, visual tools, reusable components, future app development
    
K2
Published By: K2     Published Date: Jan 07, 2016
BPM platforms help solution architects and business outcome owners accelerate application development, transform business processes, and digitalize business processes to exploit business moments. This research provides an overview of many of the products used to address these needs.
Tags : 
gartner market, business process management, bpm, networking, security, software development, it management
    
K2
Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace
Published By: Pivot3     Published Date: Sep 27, 2017
Over the last several years, there have been some dramatic changes in enterprise computing. Not only have there been new applications introduced such as business analytics, there have also been important developments in the infrastructure components used to enable these critical application services.
Tags : 
    
Pivot3
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The paper explores why security is being left behind or completely out of app development.
Tags : 
mobile applications, security, app development, mobile application insecurity, software development, enterprise applications
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
The Ponemon institute recently interviewed Fortune 500 companies down to the mid-market to find "The State of Mobile Application Insecurity." Sponsored by IBM, the paper explores why security is being left behind or completely out of app development.
Tags : 
ibm, fiberlink, app security, mobile application, app development, data security, networking, security
    
IBM MaaS360
Published By: IBM     Published Date: Oct 08, 2015
This 30-minute webcast is about analytics because without end-to-end analytics, organizations have little to no insight into what’s really happening with their mobile apps.
Tags : 
ibm, mobile, security, app, analytics, application development, software development, business technology
    
IBM
Published By: IBM     Published Date: Oct 08, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs.
Tags : 
ibm, mobilefirst, analytics, enterprise, application, application development, wireless, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 14, 2015
If you haven’t looked at enterprise search technology in a while, it’s time to give it another look. This report details their findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help application development and delivery (AD&D) professionals select the right solution to grace their enterprise with the power of knowledge on demand.
Tags : 
ibm, forrester, knowledge discovery solutions, big data, enterprise, search technology, application development, networking
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
In order to meet the changing demands of their customers, organizations need the right solution that can help them harness the vast amounts of customer data in ways that yield personalized, seamless customer experiences. That solution is IBM Watson Engagement Advisor.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
Read this whitepaper to see how cogntive technologies are transforming the wealth management landscape.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 04, 2016
To gain insight into successful mobile application development practices today, the IBM CAI surveyed 585 developers and development managers from nine countries.
Tags : 
ibm, mobile, development, success, application, development, software development, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 04, 2016
Join Steve Mirman, IBM MobileFirst solution architect, for this deep-dive intro into how you can speed development, simplify deployment and actively manage all of your mobile apps with a single, analytics-based console using our Platform in the cloud.
Tags : 
ibm, mobile, application, development, mobilefirst platform, software development, enterprise applications, business technology
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.