code

Results 101 - 125 of 488Sort Results By: Published Date | Title | Company Name

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout

Barcoded Patient ID Wristbands – The Foundation for Closed-Loop Applications and Processes

Published By: Zebra Technologies     Published Date: Dec 20, 2017
The use of wristbands to identify hospital patients has been a standard practice for well over half a century. Handwritten, typed or printed, wristbands were originally created to provide an easy way for caregivers to verify identity at any point along the patient’s healthcare journey. From newborns in the delivery area to geriatric patients in rehabilitation, everyone got a wristband. And that’s how things worked until the introduction of barcode technology. By putting barcodes on hospital wristbands, healthcare facilities can leverage a host of connected technologies to improve safety and quality of care. It’s also the most effective way to comply with the National Patient Safety Goal (NPSG) to “Improve the accuracy of patient identification,” which the Joint Commission has included in its annual goals since 2003.
Tags : 
    
Zebra Technologies

Get the inside story on how HP scientists revolutionized 3D printing

Published By: HP Inc.     Published Date: Apr 11, 2018
HP scientists had a bright idea. If they could modify materials to absorb infrared light – the light we can’t see – they could successfully fuse color to that material. It’s a story of how HP “cracked the code” in 3D color printing by drawing upon deep experience in the science of ink. Read this innovation story to why HP Jet Fusion 300/500 3D printers make it possible to produce engineering-grade functional parts faster and more affordably. Download HP’s innovation story
Tags : 
    
HP Inc.

Continuous Testing The Final Frontier of Continuous Delivery

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
One way to shift testing practices earlier in your software lifecycle is by using multi-layered visual models to specify requirements in a way where all ambiguity is inherently removed. With unambiguous and complete requirements, developers introduce less defects into their code and manual test cases, automated test scripts and required test data can be automatically generated based on the requirement, without manual intervention.
Tags : 
data manager, data requirements, test automation, service virtualization, risk manager, continuous testing, testing effort, delivery ecosystem
    
CA Technologies EMEA

Taking DevOps to the Next Level: It’s all about continuous delivery

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A lot can be learned from getting a group of experienced CIOs in a room and encouraging them to talk freely about the topics at the front of their minds. Rarely do they want to discuss technology, and even the latest IT industry ‘hot topics’ usually don’t get that much airplay. Conversations, and sometimes quite heated debates, tend to revolve around broader business-related trends, how these are changing stakeholder and user behaviour and expectations, and how best to respond to such dynamics.
Tags : 
development tools, code management, software build, service virtualisation, automation management, platform building, sdlc, mttr
    
CA Technologies EMEA

Delivering Secure Software at the Speed of DevOps white paper

Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx

To PostgreSQL and Beyond: Stratoscale’s Definitive Guide to Migrating to PostgreSQL

Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
    
Stratoscale

BR WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec

MX WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

JD WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

PL WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

NL WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

How to Build a Complete Data Warehouse Solution

Published By: Teradata     Published Date: Jan 27, 2015
There is little question about the role that SAP® BW has historically played in the SAP® infrastructure. It has been a key element in unlocking SAP’s vast and complex store of operational data housed in their ERP applications. One can easily think of BW as the original Rosetta Stone for this data. For without it, end users and IT shops would have faced daunting coding tasks attempting to cull the proper elements out of the SAP® ERP code for reporting. However, BW and the associated tools around it were rudimentary to begin with, and have not advanced to where it meets the pressing demands of todays’ end users. The New Rosetta Stone 2.0 for SAP® ERP Data —And More. Download now!
Tags : 
rosetta stone, data, erp, sap®, teradata, it management
    
Teradata

Creating a Culture of Ethics, Integrity & Compliance: Seven Steps to Success

Published By: NAVEX Global     Published Date: Jan 15, 2016
This whitepaper reveals the seven steps organisations need to take to ensure that they establish and maintain a culture of ethics, integrity and compliance.
Tags : 
maintain a culture of ethics, integrity, compliance, culture of integrity, compliance owner, develop a code of conduct, compliance programme, training
    
NAVEX Global

ES WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

7 Questions to Answer Before Starting a Windows 10 Migration

Published By: Code42     Published Date: Mar 31, 2017
Download the Windows 10 migration checklist today for a list of all factors to consider as you prepare to upgrade your enterprise PCs.
Tags : 
    
Code42

Best Practices in Device Migration: Two Scalable Strategies

Published By: Code42     Published Date: Mar 31, 2017
Download the white paper today to learn how to simplify your next device refresh.
Tags : 
    
Code42

Solving the Data Migration Challenge with Endpoint Backup

Published By: Code42     Published Date: Mar 31, 2017
Data migration strikes dread in the hearts of IT admins everywhere. It’s expensive, time-consuming, and often results in data loss. As the amount of enterprise data on laptops increases, the time and burden it takes to manage the continuous tech refresh process increases as well. But it doesn’t have to.
Tags : 
    
Code42

Three Proven Workflows for a Successful Windows 10 Migration

Published By: Code42     Published Date: Mar 31, 2017
Watch this on-demand webinar to explore three distinct migration approaches taken by real businesses.
Tags : 
    
Code42

Global Threat Report Q4 2017

Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron

Top 10 Features to Look For in a Third-Party SharePoint Solution

Published By: K2     Published Date: Aug 24, 2015
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud-hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
    
K2

Business Transformation Doesn't Need To Be A Long Drawn-Out Process

Published By: K2     Published Date: Oct 08, 2015
Read more to learn how K2’s lowcode business process application platform has helped companies across all industries transform their business in record time.
Tags : 
    
K2

Filling The SharePoint Workflow Gaps

Published By: K2     Published Date: Oct 08, 2015
This paper addresses key workflow limitations in SharePoint 2013 and SharePoint 2010 and what to consider when looking for a third-party product, so you can quickly and easily build the SharePoint workflow apps you need without the challenges of custom code.
Tags : 
    
K2

Forrester - Graph Vendor Landscape

Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Graph Database Vendor Landscape discusses the expanding graph uses cases, new and emerging graph solutions, the two approaches to graph, how graph databases are able to provide penetrating insights using deep data relationships, and the top 10 graph vendors in the market today Download The Report If You: -Want to know how graph databases work to provide quick, deep, actionable insights that help with everything from fraud to personalization to go-to-market acceleration, without having to write code or spend operating budget on data scientists. -Learn the new graph uses cases, including 360-degree views, fraud detection, recommendation engines, and social networking. -Learn about the top 10 graph databases and why DSE Graph continues to gain momentum with customers who like its ability to scale out in multi-data-center, multi-cloud, and hybrid environments, as well as visual operations, search, and advanced security."
Tags : 
    
Datastax

Teaching an Elephant to Dance: Intentional evolution across teams, processes, and applications

Published By: Red Hat     Published Date: Jan 02, 2018
Once upon a time, several generations ago (in technology years), IT departments were internal departments, focused on maintaining infrastructure and services within the company. Some companies may have had external-facing services, particularly web services, but this was still generally a narrow and restricted area. IT wasn’t a revenue-generating or strategic department; it was a supporting environment viewed as a cost center. One of the outcomes of an infrastructure-focused environment is that developers lost a sense of what their code was doing. Release cycles were long, and changes were slow. A developer would work on something and throw the code into testing or operations, and it would be released months later. Because of that long lead time, engineers lost the joy of being a developer—of creating something and seeing it work in real life. One of the great, powerful changes with digital transformation and related cultural and technology changes like DevOps is that it reintroduce
Tags : 
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.