developer

Results 376 - 396 of 396Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Apr 15, 2019
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
    
MuleSoft
Published By: JBoss Developer     Published Date: Jan 25, 2016
Deploying open source software successfully in an enterprise environment requires careful evaluation. Not all open source software is designed for enterprise use, and not all open source communities serve the unique needs of enterprise development. Read this paper to learn about Red Hat's proven track record of delivering IT solutions to the Forbes Global 2000.
Tags : 
red hat, open source software, integration software, enterprise development, it solutions, it management, knowledge management
    
JBoss Developer
Published By: JBoss Developer     Published Date: Oct 21, 2016
Rather than simply enhancing and supporting traditional methods, the use of digital technologies should enable brand new types of innovation and creativity. However, most of us have grown up with rigid, legacy technology-based business systems—process-oriented and mostly built around predictable, repeatable steps. If this sounds familiar, your business model may now be under threat from “digital Darwinism”—a tipping point caused by digital technologies and downstream market effects. Or perhaps nimbler, lower cost-base competitors are about to overtake you with a more innovative approach, better use of data or smarter use of technology. In this climate, “business as usual” is certainly no longer good enough.
Tags : 
digital transformation, api, security, ebusiness, cloud
    
JBoss Developer
Published By: IBM     Published Date: Oct 21, 2016
According to an IBM Center for Applied Insights survey of developers, while two-thirds of mobile apps fail to achieve budget, schedule and project objectives, the successful one-third rely heavily on cloud-based platforms such as the IBM MobileFirst Platform. Cloud-based platforms have been proven to reduce provisioning and development time by more than 90%. This on-demand webcast will demonstrate how you can leverage IBM’s Cloud offerings to accelerate your mobile transformation in a hybrid cloud.
Tags : 
ibm, mobile, ibm mobile cloud, cloud, digital business, networking
    
IBM
Published By: Oracle     Published Date: Oct 20, 2017
With cloud, mobile and all the new tools & frameworks that come with them, application development has never been so easy – or so hard. Join leading application development expert Mark Driver of Gartner as he answers your most pressing questions, including: What is the impact of lightweight and scripting applications traditional IT process? How has app development changed with the rise of cloud computing? How has mobile development changed expectations of developers and the apps they build
Tags : 
    
Oracle
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
    
AWS
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security, business technology
    
Veracode
Published By: Datastax     Published Date: Aug 07, 2018
A DBA’s life is full of surprises – some more pleasant than others. As a DBA you’re pretty much “on it” 24-7-365: putting out fires, checking alerts, training people, keeping test databases in sync with production, debugging, and praying your developers are writing halfway decent code. If you’re swinging over to the NoSQL side (the “dark” side?), or considering it, then you’ll want to read this white paper, The DBA’s Guide to NoSQL. It’s essentially a NoSQL bible, sans orders from God -- or Darth Vader.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
A DBA’s life is full of surprises – some more pleasant than others. As a DBA you’re pretty much “on it” 24-7-365: putting out fires, checking alerts, training people, keeping test databases in sync with production, debugging, and praying your developers are writing halfway decent code. If you’re swinging over to the NoSQL side (the “dark” side?), or considering it, then you’ll want to read this white paper, The DBA’s Guide to NoSQL. It’s essentially a NoSQL bible, sans orders from God -- or Darth Vader.
Tags : 
    
Datastax
Published By: Pure Storage     Published Date: Jul 03, 2019
Apache® Spark™ has become a vital technology for development teams looking to leverage an ultrafast in-memory data engine for big data analytics. Spark is a flexible open-source platform, letting developers write applications in Java, Scala, Python or R. With Spark, development teams can accelerate analytics applications by orders of magnitude.
Tags : 
    
Pure Storage
Published By: Sparton Corporation     Published Date: Oct 30, 2017
When it comes to Design for Manufacturing (DFM), it’s never too early to start. Planning ahead and thinking through the entire product lifecycle is the best way to reap all the benefits that come from excellent design — including better part selection, improved product quality, streamlined approvals and cost savings. Start by identifying an experienced Countract Manufacturer (CM) that understands the importance of good DFM and who will work with the product developer at every step.
Tags : 
product, market, design, intellectual property, sparton, manufacturing
    
Sparton Corporation
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
What are the benefits and costs of implementing an API Management solution? Forrester Consulting analyzed the Total Economic Impact (TEI) of IBM API Connect, developing a composite organization based on surveys of 32 IBM customers. Some of the key questions answered by this paper are: • What are the costs associated with IBM API Connect, and what returns can I expect for my business? • What are the benefits, both financial and business, that I can expect from API Connect? • What's the financial impact of API Connect on developing new opportunities for businesses, developers, and customers? Read on to learn about the financial benefits of choosing API Connect as your API management solution.
Tags : 
    
Group M_IBM Q418
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Bluewater Learning     Published Date: Apr 30, 2018
There is a movement towards advanced and predictive analytics in the Learning and Talent Management space. But what does that really mean? Bluewater’s team of consultants and developers can help you define what analytics means for your company,
Tags : 
    
Bluewater Learning
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Many Learning and Talent Management platforms don’t have the flexibility to customize the type of reporting that users want, or it’s too complicated to figure out. Bluewater’s team of developers and designers can create completely customized pages within your Learning and Talent Management System* for a seamless delivery of what you need,
Tags : 
    
Bluewater Learning
Published By: Sauce Labs     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Sauce Labs
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: Rackspace     Published Date: May 28, 2019
Moving enterprise applications to the cloud is a task that can daunt even the most seasoned IT professional. Beyond the technical considerations, many other variables also influence the migration effort, and the sheer number of options available to application architects and developers can be overwhelming. Most migration scenarios however, can be addressed by following a simple four-phase approach, namely Assess, Plan, Prepare and Migrate, where each phase is intended to move the migration effort forward with maximum learning and minimum risk. This white paper examines the most common application migration issues and provides guidance on these four phases, so that you can have an easier time in determining the best migration strategy, and take maximum advantage of the cloud.
Tags : 
    
Rackspace
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16     Next   End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.