code

Results 226 - 250 of 488Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
    
MuleSoft
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet
    
Panda Security
Published By: Mocana     Published Date: Jun 18, 2010
Until recently, designing or building a wireless device meant cobbling together whatever security implementations you could find, often with open source and other code that is usually too big and too slow for device environments.
Tags : 
mocana, nano wireless security, wpa2, device developer, open source code
    
Mocana
Published By: Attachmate     Published Date: Feb 05, 2014
Watch this video and find out how easy it can be to make your legacy mainframe applications work with new technologies. Using Attachmate Verastream, you can roll out integrated, fully functional applications tailored to each line of business. They get the modern capabilities they need and you get quick development cycles because you don’t have to change host application code. The demo breaks the process down into some basic steps that will help you breathe new life into your legacy mainframe assets.
Tags : 
attachmate, verastream, functional applications, development cycle, best practices, legacy applications, legacy systems, legacy modernization
    
Attachmate
Published By: Twilio     Published Date: Aug 21, 2012
Twilio is a cloud communications platform that lets you use standard web languages to build voice, VoIP and SMS applications via a simple web API. Build intelligent communication solutions in the cloud.
Tags : 
twilio, csc, common short codes, short code marketing, sms marketing, business technology
    
Twilio
Published By: Jive Software     Published Date: Dec 02, 2014
Join Jive and Rajat Paharia -- "the father of gamification" -- for a discussion on how to better motivate, engage, and create true loyalty. Jive is digging into the hottest books in the social collaboration space. Join the Jive Book Club for exclusive invites to webinars with the authors, an invite to the Jive Community group to share your thoughts with your peers and the chance to win prizes – you might even learn something new! Their first selection is Loyalty 3.0: How Big Data & Gamification are Revolutionizing Customer & Employee Engagement by Rajat Paharia — the “father of gamification.” Loyalty 3.0 is a Wall Street Journal and New York Times best-seller that cracks the code on the ways big data and gamification can motivate, engage, and create true loyalty your customers, employees, and partners.
Tags : 
employee engagement, customer engagement, social collaboration, big data
    
Jive Software
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn how to keep your data on endpoints beyond your network.
Tags : 
deduplication,  worker productivity,  backup solution,  recover data, data security,  protecting data
    
Code42
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn more about how OneDrive creates these security issues when used as a backup solution.
Tags : 
onedrive,  backup solution,  backup,  restore data,  cyber protection, data security,  security issues
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues, enterprise applications
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : 
data protection, data control, code 42, data visibility, data security
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Dramatic changes are underway in offices around the world, with Macs rapidly gaining market share in modern enterprises. Read this white paper to discover the industry-wide transitions to Macs, and tips to smooth your integration of Apple devices.
Tags : 
mac, code 42, apple devices, modern offices, business technology
    
Code42
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption, compliance, data encryption, data protection, regulation compliance, efficiency
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
Learning about containers is a bit like learning about Linux or learn? ing about Go: it’s potentially a huge topic! But everyone has to begin somewhere. This lesson will give you an introduction to some of the key concepts of containers and walk you through some examples of using Docker containers with Go code.
Tags : 
    
Microsoft
Published By: Eaton     Published Date: Jul 12, 2019
Every three years, members of the National Fire Protection Association (NFPA) meet to review, modify and add new National Electrical Code (NEC), or NFPA 70, requirements to enhance electrical safety in the workplace and the home. This year’s code review is well underway: the second draft of NEC 2020 is complete and the annual NFPA Conference and Expo is scheduled for late June. What follows is a preview of what are, in my opinion, the most significant code changes on track to pass. In this blog, I’ll explore the reasoning for each change and the future steps the NEC may take beyond 2020 regarding: Ground fault circuit interrupter (GFCI) protection Service entrance equipment Reconditioned equipment Performance testing Load calculations Available fault current and temporary power This is a high-level overview. In the coming months, my Eaton colleagues and I will dig deeper into each topic as part of a continuing series on the 2020 code review cycle.
Tags : 
    
Eaton
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
    
Trillium Software
Published By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn more about how EFSS creates these security issues when used as a backup solution.
Tags : 
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn how automatic endpoint backup eliminates the issues created by antiquated network drive backup.
Tags : 
    
Code42
Published By: Code42     Published Date: Apr 04, 2017
Download the white paper today to learn why local dedupe is the superior choice to global dedupe.
Tags : 
    
Code42
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com