code

Results 351 - 375 of 488Sort Results By: Published Date | Title | Company Name

IDC Analyst Whitepaper - Expert Integrated Systems: A Next-Generation Computing Platform

Published By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : 
ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure, system security, ibm pureflex, intrachassis communication, security, storage, data center
    
IBM

RF Code Delivers Millions of Dollars in Annual Power & Cooling Savings for CenturyLink

Published By: RF Code     Published Date: Sep 03, 2014
A conversation in 2011 between Joel Stone, Vice President of CenturyLink’s Global Data Center Operations and John Alaimo, CenturyLink Data Center Systems Engineer, raised an interesting question: ‘How can we lower the amount we are spending on powering and cooling our data centers?’ Click here to find out how.
Tags : 
rf code, power and cooling, data center, it spending, energy, energy spending, blade servers, total cost of ownership, green computing, data center design and management
    
RF Code

RF Code sets out to show it's all about the Code, not just the RF

Published By: RF Code     Published Date: Sep 03, 2014
In the coming months, RF Code will launch the first of its planned new software tools, which the company says will enable users to add data relating to the physical datacenter to any number of other applications. Click here to get a preview.
Tags : 
rf code, sensor technology, rfid, radio frequency, data center power, power and cooling, energy savings, blade servers, green computing, data center design and management
    
RF Code

How Auth0 Uses Identity Industry Standards

Published By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : 
autho, industry identity, authentication, database information, custom and proprietary code, security
    
Auth0

Magic Quadrant for Mobile Application Development Platforms

Published By: IBM     Published Date: Apr 08, 2016
"Helping enterprise IT developers, architects, and mobile development leaders select the right platform partners The mobile application development platform market continues to grow, evolve and mature in response to escalating customer requirements. Gartner has assessed 20 major vendors that enable enterprise IT developers to create mobile applications for customers, partners, and employees."
Tags : 
ibm, urbancode, mobile, gartner, mobile computing, mobile data systems
    
IBM

Accelerate your transformation into a mobile enterprise with cloud

Published By: IBM     Published Date: Apr 08, 2016
This white paper will examine why becoming a mobile enterprise may be the best choice for your organization, how cloud can help you accelerate your transformation into a mobile enterprise, and the important things to consider when designing a mobile enterprise.
Tags : 
ibm, urbancode, mobile, cloud, mobile enterprise, mobile computing, mobile data systems, cloud computing
    
IBM

Star qualities: What it takes for mobile development projects to succeed

Published By: IBM     Published Date: Apr 08, 2016
To gain insight into successful mobile application development practices today, the IBM CAI surveyed 585 developers and development managers from nine countries. How do some projects deliver great applications? The secret lies in having the right team and the right approach.
Tags : 
ibm, urbancode, mobile, mobile development, ibm cai, networking, software development, it management, knowledge management, enterprise applications, platforms, data management, it career advancement, business technology
    
IBM

ROI of Common Short Code and SMS Mobile Marketing

Published By: Neustar     Published Date: Nov 16, 2009
Mobile has hit the mainstream in the U.S. At the end of 2009, the number of mobile subscribers had grown to 280 million, reaching 87% of U.S. households. The availability of unlimited data and text messaging plans has pushed consumer mobile usage beyond voice to text messaging and Internet access.
Tags : 
sms mobile, neustar, roi, csc, common short code, mobile marketing, two-way communication, mobile, text messaging, database, chat, short codes, customer acquisition
    
Neustar

With Mobile Barcodes, Marketers Enjoy These Benefits

Published By: Neustar     Published Date: Jan 24, 2011
Learn how retailers can use mobile barcodes to attract new customers, keep their existing customers, and build multiple and repetitive sales.
Tags : 
neustar, mobile barcode, 2d barcode, qr code, retail, upc code, ean code, sms, mobile coupons, barcode reader, barcode app, customer loyalty, mobile marketing
    
Neustar

Why use SMS for Travel, Tourism and Hospitality

Published By: Neustar     Published Date: Mar 30, 2011
SMS offers a simple and effective way to communicate with consumers when they are in the process of making travel plans and purchase decisions, keeping them up-to-date, and influencing which destination they choose.
Tags : 
sms, ctia, short code, neustar, mobile marketer, sms benefits, smart sms marketing, travel tourism hospitality
    
Neustar

Learn How Mobile Barcodes Can Benefit Retailers

Published By: Neustar     Published Date: Apr 14, 2011
Learn how retailers can use mobile barcodes to attract new customers, keep their existing customers, and build multiple and repetitive sales.
Tags : 
neustar, mobile barcode, 2d barcode, qr code, retail, upc code, ean code, sms, mobile coupons, barcode reader, barcode app, customer loyalty, mobile marketing
    
Neustar

Microsoft Sharepoint in the Cloud: Bluelock Helps Codesigned Deliver for WellStar Health Systems

Published By: Bluelock     Published Date: Nov 15, 2012
Codesigned is a technology services firm focused on high quality, collaboration solutions specializing in Microsoft SharePoint. Read on to learn how Bluelock provided a consulting firm, a reliable and industry proven cloud hosting platform.
Tags : 
bluelock, codesign, microsoft sharepoint, sharepoint, collaboration, cloud hosting, it management, data management, business technology, data center
    
Bluelock

Cracking the Content Code

Published By: BrightEdge     Published Date: Nov 13, 2014
BrightEdge tapped into its massive Data Cube repository to provide a comprehensive view into the channels that drive traffic and the types of content that perform best. BrightEdge created this report to help brands understand the actual performance of site content by channel and by industry.
Tags : 
brightedge, content marketing, data analytics, marketing data, marketing platform, market intelligence, business intelligence, business analytics, marketing automation, data integration
    
BrightEdge

Broken Code / Shattered Dreams

Published By: New Relic     Published Date: Jun 13, 2014
This eBook explores how to improve your software & business with modern APM tools.
Tags : 
new relic, social technologies, apm, application performance management, application integration, .net, java, cloud computing
    
New Relic

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : 
malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents, keyloggersmalvertising, trojan horse, extended validation, ev ssl certficates, botnet, denial of service, cybercriminals, access control, email security, hacker detection, internet security, security policies
    
VeriSign Authentication Services, now a part of Symantec Corp.

apt-X Lossless

Published By: APTX     Published Date: Nov 05, 2009
This technology white paper introduces the reader to an entirely new scheme for lossless audio compression called apt-X Lossless.
Tags : 
aptx, apt-x lossless, audio processing, audio codec, digital signal processing, system on a chip, embedded design, embedded systems and networking
    
APTX

Low Bit-Rate Audio Coding in Multi-channel Digital Wireless Microphone Systems

Published By: APTX     Published Date: Nov 05, 2009
This paper examines the key performance aspects of low bit rate audio codecs for the next generation of bandwidth-efficient digital wireless microphone systems that meet the future needs of live events.
Tags : 
aptx, bit-rate, wireless microphone, audio codec, spectrum, compression ratio, digital signal processing, system on a chip, embedded design, embedded systems and networking
    
APTX

Viable distribution of Multi-channel Audio-over-IP for Live and Interactive "Voice Talent"

Published By: APTX     Published Date: Nov 05, 2009
Viable distribution of Multi-channel Audio-over-IP for Live and Interactive "Voice Talent" based Gaming using High-quality, Low-latency Audio Codec technology.
Tags : 
aptx, audio-over-ip, voice talent, interactive gaming, audio codec, compression, ip network, bandwidth, streaming audio, bandwidth management, ip networks, digital signal processing, system on a chip, embedded design, embedded systems and networking
    
APTX

Reasons Why “Meet-Me” Cloud Video Services Are Mediocre at Best

Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Meet-me services like Blue Jeans® and Zoom® support only one model: a prescheduled, “meet-me” conference with long, numerical dial strings and access codes. They don’t offer a “connected experience.” You have to separately manage and integrate video systems, resulting in an inferior, disjointed user experience that is more challenging to manage. Meet-me models can’t match Lifesize. Everything else is a group meeting to which participants call in and wait for everyone else. There’s no directory dialing, no point-to-point calling, no presence status and no call escalation. The only thing consistent about meet-me services is that they copy the cumbersome user experience of the audio conferencing model—dial, enter code, enter ID, wait … Download now to learn why Lifesize Cloud is the ONLY solution you need!
Tags : 
lifesize, cloud, video, connected experience, video systems, meet-me model, software development, wireless, business technology
    
LifeSize, a division of Logitech

HTTP Status Code Cheat Sheet

Published By: Viavi Solutions     Published Date: Jun 30, 2014
Look at the Graph, Find the Code and Boom – You’re Solving Problems. Identifying and understanding common HTTP status codes can go a long way in troubleshooting complex web application issues.
Tags : 
network instruments, http, troubleshooting, http status codes, web applications, it management, enterprise applications
    
Viavi Solutions

Next-Generation Network Security: A Buyers’ Guide

Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management, data management
    
Cisco

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection, security management, vulnerability management, data loss prevention
    
AlienVault

Cracking the Code

Published By: Podium     Published Date: Dec 06, 2016
Getting your happiest customers to leave a review might seem difficult, but it’s easier than you might think. In our new ebook, Cracking the Code: Why online reviews matter to your business, we will show you how online reviews can improve local SEO, increase trust and loyalty with your customers, and ultimately boost your bottom line.
Tags : 
podium, customer insight, customer reviews, customer satisfaction
    
Podium

Coming to Terms with Platform as a Service

Published By: Progress Software     Published Date: Mar 12, 2014
This paper explores some of the practices most relevant to achieving success with PaaS, focusing on ways to identify how PaaS can be best utilized within the specifics of a given organization’s overall IT needs. Practices include understanding scalability and infrastructure aspects of PaaS deployment, the need for coding wisdom in otherwise “codeless” environments, integration with on-premise systems and other cloud-based IT assets, security and more.
Tags : 
progress software, paas, platform as a service, cloud, isv, platform infrastructure, development platform, enterprise adoption, software development, knowledge management, data management, data center
    
Progress Software
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.