applications development

Results 101 - 125 of 187Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : 
nodesource, xml, software development, digital transformation, open source, web applications, web development, java, .net, soap, business technology
    
NodeSource
Published By: VMware     Published Date: May 10, 2012
This on-demand webcast is designed for those with little to no virtualization experience to understand why virtualization and VMware are so important to driving down both capital and operational costs.
Tags : 
capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases, storage, data management
    
VMware
Published By: VMware     Published Date: May 10, 2012
This on-demand webcast highlights VMware customer Brian Mack from MAXIMUS, a leading provider of health and human services programs to government organizations, and his experience in deploying vCenter Operations.
Tags : 
vcenter, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases, storage, data management
    
VMware
Published By: VMware     Published Date: May 10, 2012
This on-demand webcast from IDC and VMware will provide both quantitative measurement of the business value -- defined as the expected ROI -- and qualitative analysis associated with the use of VMware View.
Tags : 
capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases, storage, data management
    
VMware
Published By: VMware     Published Date: May 10, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : 
capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases, storage, data management
    
VMware
Published By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net, windows 7, web services, visual user interface, datawindow, j2e, win32, .net frameworks, business application, wpf
    
Sybase PowerBuilder
Published By: Salesforce.com     Published Date: Apr 16, 2013
This report, which is the vision report of the mobile app development playbook for application development and delivery (AD&D) professionals, focuses on the changes application developers need to understand if they want to build modern applications that deliver contextual customer experiences.
Tags : 
mobile application development, apps, mobile applications, smartphones, tablets, infrastructure, licensing, service endpoints, ad&d, application development and delivery
    
Salesforce.com
Published By: Salesforce.com     Published Date: Apr 16, 2013
Successful mobile apps, especially enterprise mobile apps, typically need to interact with a well-architected set of back-end services, but most mobile app developers are more skilled at client-side front-end development. Enter mobile back-end-as-a-service (BaaS), a new set of hosted platforms that addresses the gap between front-end development proficiency and back-end infrastructure requirements. Enterprise-class back-end-as-a-service addresses scalability while providing an integration platform into existing enterprise services. Use this research as your guidebook to navigating the emerging BaaS landscape.
Tags : 
cloud mobile development, applications, baas, back end as a service, mobile application development, apps, mobile applications, enterprise, scalability
    
Salesforce.com
Published By: MobileForce Software     Published Date: Nov 19, 2014
GigaOm is seeing a new breed of services that promise to accelerate the mobilization of existing enterprise applications and business processes. Early mobile-application development solutions (MADP) were resource-intensive, requiring custom client code for each supported platform, as well as an on-premise middleware layer to connect mobile clients to enterprise backend systems. In this new model, code-free, configuration solutions - aimed at business analysts and lines of business- are revolutionizing the landscape, consolidating tools and services to simplify cross-platform enablement, and reducing time to deploy and cost tremendously. This report describes mobile-application configuration (MAC) tools, articulates their business value and suggests conditions under which they may be a good choice for an organization.
Tags : 
mobilization, enterprise applications, business processes, development solution, resource-intensive, client code, platform, middleware, backend system, cross-platform, costs, development
    
MobileForce Software
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security, employee performance, productivity
    
Lumension
    
Cloud Sherpas
Published By: Cloud Sherpas     Published Date: Aug 13, 2015
In the Top 5 Reasons Why Enterprises Are Going Google, Cloud Sherpas explores why leading organizations like these have prepared for the digital workplace of tomorrow by moving their email and collaboration platforms to Google Apps for Work, such as: Eliminating the need to manage hardware or software Embracing a mobile, BYOD culture Reducing IT costs and infrastructure
Tags : 
google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development, google apps resellers, google cloud solutions, cloud enterprise solutions, google apps setup, google apps partners, google reseller, google apps authorized reseller, google apps for work, google drive for work, google chrome for work, google apps reseller, it management
    
Cloud Sherpas
Published By: AWS     Published Date: Jun 03, 2019
Companies worldwide are undergoing digital transformations. By modernizing applications, they can deliver better service to customers and keep pace in a competitive landscape. In many cases, Amazon Web Services (AWS) has helped companies modernize by implementing containers—and initiating cultural shifts—to streamline development. In this whitepaper, we discuss recommended best practices around containerization and how AWS can help you get started with containers today.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
    
SAS
Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk
    
Iovation
Published By: Micro Focus     Published Date: Aug 28, 2014
Deliver value back to the business faster than before with the Micro Focus Enterprise solution set. Micro Focus' products for IBM zEnterprise make your mainframe work even smarter. Successfully achieve rapid Time to Value of core mainframe applications, helping tackle the growing IT innovation, maintenance and compliance backlog. Faster application service delivery is achieved through technology that transforms mainframe application analysis, modernization, development, testing and workload optimization.
Tags : 
mainframe, core applications, it innovation, data management, business technology
    
Micro Focus
Published By: K2     Published Date: Apr 27, 2015
Download K2’s new white paper, “Make the move from IBM Lotus Notes and optimize your business apps,” to see how the right business-application solution can make all the difference. You will also learn how the right business-application solution can help you quickly rebuild your applications to have greater flexibility and configurability than you had before.
Tags : 
business applications, ibm lotus notes, app environment, it investments, visual tools, reusable components, future app development
    
K2
Published By: Pivot3     Published Date: Sep 27, 2017
Over the last several years, there have been some dramatic changes in enterprise computing. Not only have there been new applications introduced such as business analytics, there have also been important developments in the infrastructure components used to enable these critical application services.
Tags : 
    
Pivot3
Published By: IBM MaaS360     Published Date: Jul 09, 2015
The paper explores why security is being left behind or completely out of app development.
Tags : 
mobile applications, security, app development, mobile application insecurity, software development
    
IBM MaaS360
Published By: IBM     Published Date: Jan 04, 2016
Separating the great apps from the good reveals significant, long-term differences in customer loyalty and spend.
Tags : 
ibm, applications, development, mobile, forrester, software development, business technology
    
IBM
Published By: IBM     Published Date: Jan 04, 2016
On the surface, a good mobile app may appear to satisfy customers and generate revenue. But separating the great apps from the good reveals significant, long-term differences in customer loyalty and spend.
Tags : 
ibm, mobile, applications, development, mobile apps, roi, investment, software development, business technology
    
IBM
Published By: IBM     Published Date: Feb 02, 2016
Gartner has assessed 20 major vendors that enable enterprise IT developers to create mobile applications for customers, partners, and employees.
Tags : 
ibm, gartner, magic quadrant, mobile applications, development platforms, mobile, software development, business technology
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.