code

Results 301 - 325 of 466Sort Results By: Published Date | Title | Company Name
Published By: K2     Published Date: Apr 27, 2015
This white paper provides insight on five significant SAP challenges and what to look for when choosing a low-code application platform to overcome these challenges and optimize your SAP investment.
Tags : 
business apps, sap challenges, low-code application platform, optimize sap investment
    
K2
Published By: K2     Published Date: Apr 27, 2015
Download this free report to ensure you have the knowledge you need to retain your customers as you head into 2015.
Tags : 
business process management, cloud-based work orchestration, smart process apps, bpm market, "low-code" platforms, dynamic case management
    
K2
Published By: K2     Published Date: Jan 07, 2016
Microsoft SharePoint users rely on forms daily; it’s where the nitty-gritty work gets done. SharePoint forms that only work for current business needs can stagnate overall business growth. It’s important to plan today for a form that can carry your business processes into tomorrow. You have three options when looking for a SharePoint forms solution: should you buy, code or configure your own forms? Forms that can be delivered quickly, in an adaptable, affordable and future-ready way, are ideal.
Tags : 
microsoft sharepoint, best practices, security, sharepoint solutions, business processes, networking, it management, wireless
    
K2
Published By: Domino     Published Date: Jan 24, 2018
For manufacturers of baked goods and snacks, the need for flexible, high-quality coding and marking solutions has never been greater. The wide array of packaging types and materials already in use today — combined with the SKU proliferation driven by consumer demands — means manufacturers have to print expiration codes and lot numbers on multiple substrates in multiple areas/orientations on their packaging lines. These codes need to be clear, precise and readable by both humans and machines to ensure customer safety and satisfaction. They must also provide traceability in the event of a recall. This white paper from Domino looks at the types of printing technology available today and discusses their various advantages and disadvantages in bakery line applications.
Tags : 
    
Domino
Published By: Code42     Published Date: Feb 28, 2018
Business Continuity Starts with the Ability to Go Back No matter the size of the business, no matter the industry, the business world moves faster than ever. Constant digital innovation is only accelerating that pace. Yet, to keep business moving forward, ensure uninterrupted productivity and guarantee business continuity, organizations need to first focus on the ability to go back— to undo, restore and recover.
Tags : 
    
Code42
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Published By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : 
power-based systems, big data, linux, fast deployment, open source infrastructure, data management
    
IBM
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
google, google mobile os, android, hackers, security, emm, enterprise mobility management, networking, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google, enterprise, data, security, networking, wireless, enterprise applications, business technology
    
IBM MaaS360
Published By: IBM     Published Date: Feb 11, 2015
This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.
Tags : 
behavior-based protection strategies, remote endpoints, ibm, network perimeter, vulnerability decodes, security
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.
Tags : 
application security testing, application security, ibm, iast, binary code, security, it management
    
IBM
Published By: IBM     Published Date: Apr 01, 2016
Discover how to break down IT silos and increase agility for globally and technically diverse teams by using a DevOps approach with an open, unifying platform for z/OS mainframes. Find out how enterprises reduce cost and risk for source code management (SCM) strategy.
Tags : 
ibm, devops, z systems, scm, source code, it management, business technology
    
IBM
Published By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development, business technology
    
IBM
Published By: thawte     Published Date: Aug 27, 2008
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
ssl, thawte, certified, certification, secure socket
    
thawte
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Online visitors are becoming more and more wary about transacting online. One way to provide reassurance that your Web site is reputable and safe is to implement the latest SSL encryption technology on your site. Read this guide to learn about the latest in SSL.
Tags : 
security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate, ev ssl certificate
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Published By: VMS     Published Date: Jul 16, 2009
This paper analyzes case studies aimed to determine how changes in public discussion (unpaid media) correlate to changes in business outcomes. It focuses on analyzing tonality and message, and how they modify the effect of pure media coverage volume in correlations against outcomes.
Tags : 
vms, media coverage, public relations, business outcomes, product sales, prescription volumes, medical procedure codes, customer preference, cpt, vms, tonality, survey, statistics, correlations, preference, advertising
    
VMS
Published By: SPSS Inc.     Published Date: Mar 15, 2010
This paper focuses on six myths that surround direct marketing best practices and discusses how you can use specific analytical techniques and tools to beat these myths, increase response rates and boost ROI.
Tags : 
spss, direct marketing software, campaign optimization, response rate, roi, segmentation, cluster analysis, customer persona, rfm, testing, prospect profiling, purchase score, postal code analysis, up-sell, cross sell
    
SPSS Inc.
Published By: IBM     Published Date: Jun 09, 2010
Learn the correct way to create a secure application with this free white paper from IBM.
Tags : 
secure application, source code, penetration test, ibm, it security
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : 
vulnerabilities, secure application, ibm, source code, software development, it security
    
IBM
Published By: SAS     Published Date: Aug 17, 2018
What if we stopped arguing over which analytics software is best, and decided instead to use them all? With today’s analytics technologies, the conversation about open analytics and commercial analytics is no longer an either/or discussion. You can now combine the benefits of SAS and open source analytics within your organization. Download this e-book to learn how businesses in multiple industries are integrating disparate code and information to deploy models and deliver critical results with analytics.
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management, business technology
    
Cisco
Published By: Symantec     Published Date: Apr 04, 2013
This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
Symantec
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee