code

Results 326 - 350 of 473Sort Results By: Published Date | Title | Company Name
Published By: VMS     Published Date: Jul 16, 2009
This paper analyzes case studies aimed to determine how changes in public discussion (unpaid media) correlate to changes in business outcomes. It focuses on analyzing tonality and message, and how they modify the effect of pure media coverage volume in correlations against outcomes.
Tags : 
vms, media coverage, public relations, business outcomes, product sales, prescription volumes, medical procedure codes, customer preference, cpt, vms, tonality, survey, statistics, correlations, preference, advertising
    
VMS
Published By: SPSS Inc.     Published Date: Mar 15, 2010
This paper focuses on six myths that surround direct marketing best practices and discusses how you can use specific analytical techniques and tools to beat these myths, increase response rates and boost ROI.
Tags : 
spss, direct marketing software, campaign optimization, response rate, roi, segmentation, cluster analysis, customer persona, rfm, testing, prospect profiling, purchase score, postal code analysis, up-sell, cross sell
    
SPSS Inc.
Published By: IBM     Published Date: Jun 09, 2010
Learn the correct way to create a secure application with this free white paper from IBM.
Tags : 
secure application, source code, penetration test, ibm, it security
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : 
vulnerabilities, secure application, ibm, source code, software development, it security
    
IBM
Published By: SAS     Published Date: Aug 17, 2018
What if we stopped arguing over which analytics software is best, and decided instead to use them all? With today’s analytics technologies, the conversation about open analytics and commercial analytics is no longer an either/or discussion. You can now combine the benefits of SAS and open source analytics within your organization. Download this e-book to learn how businesses in multiple industries are integrating disparate code and information to deploy models and deliver critical results with analytics.
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management, business technology
    
Cisco
Published By: Symantec     Published Date: Apr 04, 2013
This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
Symantec
Published By: Symantec     Published Date: Apr 04, 2013
How Code Signing Can Bolster Security for Mobile Applications
Tags : 
code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security, app security
    
Symantec
Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
    
Symantec
Published By: Symantec     Published Date: Apr 04, 2013
In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.
Tags : 
code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security, app security
    
Symantec
Published By: Coverity     Published Date: Mar 13, 2012
To maximize efficiencies, developers need to manage security and quality defects as the code is being written and as part of their existing development and triage workflows. Download the complete paper to learn how you can manage security risks!
Tags : 
security, vulnerability, development, testing, costs, quality, workflows, revenue, destroy, trust, customers
    
Coverity
Published By: IBM     Published Date: Aug 16, 2013
Cloud computing give you the opportunity to manage infrastructure as code. This capability provides the ability to manage the delivery pipeline in a way similar to how we manage code, providing repeatable, testable deployments of applications all the way from unit to user acceptance tests, reducing risks and costs, and removing the bottlenecks that occur at the transition from agile development to operational deployment. Join this webcast to learn how Collaborative DevOps solutions from IBM can help turn your delivery pipeline into an agile, automated workflow.
Tags : 
cloud, software delivery, infrastructure, manage delivery, code, applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : 
ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure, system security, ibm pureflex, intrachassis communication, security, storage, data center
    
IBM
Published By: RF Code     Published Date: Sep 03, 2014
A conversation in 2011 between Joel Stone, Vice President of CenturyLink’s Global Data Center Operations and John Alaimo, CenturyLink Data Center Systems Engineer, raised an interesting question: ‘How can we lower the amount we are spending on powering and cooling our data centers?’ Click here to find out how.
Tags : 
rf code, power and cooling, data center, it spending, energy, energy spending
    
RF Code
Published By: RF Code     Published Date: Sep 03, 2014
In the coming months, RF Code will launch the first of its planned new software tools, which the company says will enable users to add data relating to the physical datacenter to any number of other applications. Click here to get a preview.
Tags : 
rf code, sensor technology, rfid, radio frequency, data center power, power and cooling, energy savings
    
RF Code
Published By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : 
autho, industry identity, authentication, database information, custom and proprietary code, security
    
Auth0
Published By: IBM     Published Date: Apr 08, 2016
"Helping enterprise IT developers, architects, and mobile development leaders select the right platform partners The mobile application development platform market continues to grow, evolve and mature in response to escalating customer requirements. Gartner has assessed 20 major vendors that enable enterprise IT developers to create mobile applications for customers, partners, and employees."
Tags : 
ibm, urbancode, mobile, gartner
    
IBM
Published By: IBM     Published Date: Apr 08, 2016
This white paper will examine why becoming a mobile enterprise may be the best choice for your organization, how cloud can help you accelerate your transformation into a mobile enterprise, and the important things to consider when designing a mobile enterprise.
Tags : 
ibm, urbancode, mobile, cloud, mobile enterprise
    
IBM
Published By: IBM     Published Date: Apr 08, 2016
To gain insight into successful mobile application development practices today, the IBM CAI surveyed 585 developers and development managers from nine countries. How do some projects deliver great applications? The secret lies in having the right team and the right approach.
Tags : 
ibm, urbancode, mobile, mobile development, ibm cai, networking, software development, it management, knowledge management, enterprise applications, platforms, data management, business technology
    
IBM
Published By: Neustar     Published Date: Nov 16, 2009
Mobile has hit the mainstream in the U.S. At the end of 2009, the number of mobile subscribers had grown to 280 million, reaching 87% of U.S. households. The availability of unlimited data and text messaging plans has pushed consumer mobile usage beyond voice to text messaging and Internet access.
Tags : 
sms mobile, neustar, roi, csc, common short code, mobile marketing, two-way communication, mobile, text messaging, database, chat, short codes, customer acquisition
    
Neustar
Published By: Neustar     Published Date: Jan 24, 2011
Learn how retailers can use mobile barcodes to attract new customers, keep their existing customers, and build multiple and repetitive sales.
Tags : 
neustar, mobile barcode, 2d barcode, qr code, retail, upc code, ean code, sms, mobile coupons, barcode reader, barcode app, customer loyalty, mobile marketing
    
Neustar
Published By: Neustar     Published Date: Mar 30, 2011
SMS offers a simple and effective way to communicate with consumers when they are in the process of making travel plans and purchase decisions, keeping them up-to-date, and influencing which destination they choose.
Tags : 
sms, ctia, short code, neustar, mobile marketer, sms benefits, smart sms marketing, travel tourism hospitality
    
Neustar
Published By: Neustar     Published Date: Apr 14, 2011
Learn how retailers can use mobile barcodes to attract new customers, keep their existing customers, and build multiple and repetitive sales.
Tags : 
neustar, mobile barcode, 2d barcode, qr code, retail, upc code, ean code, sms, mobile coupons, barcode reader, barcode app, customer loyalty, mobile marketing
    
Neustar
Published By: Bluelock     Published Date: Nov 15, 2012
Codesigned is a technology services firm focused on high quality, collaboration solutions specializing in Microsoft SharePoint. Read on to learn how Bluelock provided a consulting firm, a reliable and industry proven cloud hosting platform.
Tags : 
bluelock, codesign, microsoft sharepoint, sharepoint, collaboration, cloud hosting, it management, data management, business technology, data center
    
Bluelock
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee