code

Results 176 - 200 of 488Sort Results By: Published Date | Title | Company Name

Medamerica Billing Services: Xangati’s Root Cause Analysis Keeps Operations Running Smoothly

Published By: Xangati     Published Date: Feb 04, 2016
MBSI was providing approximately 800 virtual desktops to their employees using VMware Horizon with View and 8 VMware ESXi hosts and they were running an additional 140 virtual servers using 5 VMware ESXi hosts – all on a Tegile Hybrid SAN. “It was shortly after we converted from ICD-9 diagnosis codes to ICD-10 codes that performance for the VDI desktops began to suffer noticeably,” explained Shawn Wood, Assistant Manager of Systems Administration, MBSI. “We have relied on Xangati for a number of years now to help us quickly see where bottlenecks are in a short period of time. It's an important part of maintaining the integrity of our infrastructure.” Read more to learn how Xangati helped MBSI address this problem.
Tags : 
xangati, medamerica, mbsi, case study, networking, security, it management, enterprise applications
    
Xangati

Rethinking Security In Business Notebooks

Published By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
security, bios, threat prevention, threat detection, malware, hacking
    
HP Software

Cheat At Battleships

Published By: GrowthIntel     Published Date: Feb 16, 2016
Many B2B companies still select their prospects using static government data such as SIC codes, NAIC codes, and historical financial info. This is like playing Battleships with your sales and marketing budget, lobbing outbound approaches blindly over the wall in the hope of hitting potential buyers. There has to be a better way. Imagine if you could identify every business that could buy from you, and rank them by their likelihood to convert. This ebook shows you how.
Tags : 
b2b, intel, business practices, decision management, business intelligence, project management, service management
    
GrowthIntel

Reimagining API and Application Backend Creation

Published By: CA Technologies EMEA     Published Date: May 23, 2018
In today’s application economy, interaction between a business and its customers, partners and employees is increasingly through apps. And omni-channel access to these applications—from anywhere at any time—is dependent on APIs. These APIs provide an interface for developers to code against, and must be robust enough to support ever-growing demand. As a result, APIs are perhaps the most critical technology in digital business design today. APIs sit between your application clients —apps, websites and devices—and application backends. By leveraging APIs, you can securely stretch the boundaries of your enterprise by tapping into a broad array of digital businesses, digital customers and digital devices. But just as important as the API, is the application backend itself. Behind the API, the data access layer and application logic layer are doing the heavy lifting—implementing business rules, maintaining data consistency and managing interactions with various data sources. These three com
Tags : 
    
CA Technologies EMEA

CA Live API Creator

Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA

Building modern applications with Linux and containers ebook

Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat

Building Better Code: 10 Ways to Use APM

Published By: Riverbed     Published Date: Feb 26, 2015
To build modern applications, developers could use some help. That is where application performance management (APM) solutions come in. This whitepaper will provide you 10 ways developers can use APM to improve the quality and performance of their software.
Tags : 
modern applications, developers, application performance management, apm, software quality, software performance, application security, security management
    
Riverbed

Microsoft SQL Server Security Best Practices

Published By: GreenSQL     Published Date: Nov 11, 2014
This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
GreenSQL

Entrust Certificate Services: SSL Digital Certificates, Discovery & Management

Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

Real Time Code Analysis: Proactive Protection Against Malware Threats

Published By: M86 Security     Published Date: Feb 09, 2011
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security

Integrating Compliance with Business Strategy: The Skillsoft Compliance Maturity Model

Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention
    
Skillsoft

Creating a Code of Conduct: Providing Guidance for an Ethical Workplace

Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : 
skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior
    
Skillsoft

Does Your Code of Conduct Program Hit the Mark? Ten Questions You Should be Asking yourself

Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft

Leverage Real-Time Mobility from Your Plant Floor to Retail Shelves

Published By: IBM     Published Date: May 30, 2012
Learn how CPG and Wholesale Distributors are becoming more efficient, more innovative, more agile, and more competitive.
Tags : 
cpg, wholeshale, real time, plant floor, retail, ibm, rfid, bar code
    
IBM

Understand the Four Phases of A Cyber Attack

Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee

Address database security and compliance without sacrificing availability or performance

Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee

A Comprehensive Assessment of the Risk to Your Most Sensitive Data

Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee

Address Database Security and Compliance Without Sacrificing Availability or Performance

Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee

Watch how you can easily run a comprehensive assessment of the risk to your most sensitive data.

Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee

Mastering Enterprise Continuous Delivery

Published By: UrbanCode     Published Date: Jul 09, 2013
Throughout this paper the levels of maturity of various components of Enterprise Continuous Integration will be described in the same way.
Tags : 
urbancode, enterprise continuous delivery, continuous integration, enterprise continuous integration, it management
    
UrbanCode

7 Ways to Increase Release Management Capabilities

Published By: UrbanCode     Published Date: Jul 09, 2013
Pressures from the business are producing frequent, incremental releases that increase the number of applications needing to be released.
Tags : 
urbancode, release process, release management, increase release management, it management
    
UrbanCode

Calculating the value of Deployment Automation

Published By: UrbanCode     Published Date: Jul 09, 2013
An organization considering the adoption of deployment automation will do so to meet its own business objectives. Some organizations may be focused on clear reporting for audit, while others will be focused on getting features to market more quickly.
Tags : 
urbancode, deployment automation, automated deployments, release operations, networking, security, software development, knowledge management
    
UrbanCode

The Essential Practices for Deployment Automation

Published By: UrbanCode     Published Date: Jul 09, 2013
In a continuing poll sponsored by UrbanCode, over 75% of respondents identified their deployment process as either “Entirely Manual,” Mostly Manual,” or “Mostly Scripted.” Relatively few indicated that they had push-button deployment capabilities.
Tags : 
urbancode, deployment automation, manual deployments, benefits of automation, networking, software development, it management
    
UrbanCode

The ABCs of Continuous Release and Deploy in a DevOps Approach

Published By: UrbanCode     Published Date: Jul 09, 2013
Adapting and responding quickly to business needs is dramatically chang-ing how IT teams operate. Teams need to be responsive to business requirements, enabling companies to gain ground in their market and keep up with changes in technology.
Tags : 
urbancode, continuous release and deploy, enterprise software delivery
    
UrbanCode

Power Strip Safety and Regulatory Compliance in Healthcare Facilities

Published By: Tripp Lite     Published Date: May 17, 2016
While the use of power strips in healthcare and medical facilities is common, the misuse of these devices is also common. Such misuse can result in citations, fines, or even patient injury at your facility. This white paper covers: • Common mistakes in the use of power strips • Ways to avoid making the common mistakes • How to develop and implement a power strip policy to ensure that your facility complies with codes and standards while reducing risk to patients and staff
Tags : 
compliance, safety, power strip, codes, standards, citations, fines, patient injury
    
Tripp Lite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.