code

Results 301 - 325 of 485Sort Results By: Published Date | Title | Company Name
Published By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software
    
VeriSign
Published By: VeriSign     Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
verisign, mobile apps, code signing, mobile application development, signing certificates
    
VeriSign
Published By: Kenshoo     Published Date: Aug 07, 2012
TicketsNow knew that building an engaged fan base on Facebook would drive revenue for its business. Per a SocialCode survey from November 2011, Facebook fans are 291 percent more likely to engage and convert with a brand than non-fans. The challenge for TicketsNow was how to generate new fans in a targeted, efficient, and cost-effective manner.
Tags : 
kenshoo social, ticketsnow, case study, paid search, social media, customer engagement
    
Kenshoo
Published By: SAS     Published Date: Mar 06, 2018
Today's artifical intelligence (AI) solutions are not sentient in the manner popularized in science fiction by scores of self-aware and typically nefarious androids. Even so, the ability to arm such systems with the ability to directly sense and respond to their in situ environment is critical. Why? In the future, our experiences will be smart, intuitive and informed by analytics that are not seen but felt via new business, personal and operational engagement models. Enabling this interaction requires AI applications that can sense, analyze and respond to their environment in an intelligent and interactive manner. Without requiring the end user to write, understand or interpret code. “Sensitive” artificial intelligence enables: • More productive use of expanded (big, often unstructured) information sources • Intuitive man-machine interactions (no code-speak here!) • Adaptive, immersive experiences and environments As frequently touted on the nightly news, AI’s popularity is clear. Ho
Tags : 
    
SAS
Published By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : 
service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars, value-add, reseller, lead generation, marketplace, on force, onforce, roll out, roll outs, on-site, asp, service provider, software development
    
OnForce
Published By: NewField IT     Published Date: Aug 19, 2008
In 2001, the international research group, Gartner released a briefing paper titled 'Rightsizing Output Fleets – The Hidden Gold Mine'. This research paper identified total print costs to be as much as 1-3% of an organization's revenue, a figure far higher than anyone had previously suggested. Gartner argued that print costs are so high they offer a 'goldmine' for any procurement or IT manager looking for savings.
Tags : 
knowledge management
    
NewField IT
Published By: BlackBerry     Published Date: Jun 22, 2010
Fast, accurate communications are the underpinnings of patient care and safety. Yet, today's hospital staff carry so many pagers and other devices, it's become cumbersome. With Amcom Mobile Connect, you can simplify communications and strengthen care by using your BlackBerry smartphone for code alerts, patient updates, lab results, consult requests, and much more. In short, everything.
Tags : 
blackberry, smartphones, wireless, pda, pagers, healthcare, enterprise servers, it management, budget, mobility, software costs
    
BlackBerry
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how you can simplify compliance and automate the transition from development to production with complete traceability.  Benefit from process definition and enforcement, and automatic generation of audit trails.  Add consolidation to single, global repository where you move code into a single software change and configuration management instance that works globally, but performs as if everything were local.  Result: savings and productivity.
Tags : 
serena, compliance, traceability, enforment, software, single software, alm, collaboration, efficiency, productivity, enterprise, application lifecycle management, gartner, mission critical, sox, hippa, cmmi, audit, enforcement, security
    
SERENA Software, Inc
Published By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : 
rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech, werc, eps, roa, intermec
    
Intermec
Published By: Intermec     Published Date: Oct 09, 2008
Find out how to select bar code printers to maximize uptime and output. This white paper explains how different printer types, performance capabilities, features, label media compatibility, integration and support requirements can impact productivity and total cost of ownership (TCO) for users with extended printer duty cycles or harsh environments.
Tags : 
printing, tco, total cost of ownership, productivity, print, wireless, lan, wireless printing, plc, lcd
    
Intermec
Published By: Intermec     Published Date: Mar 14, 2007
Smart printers are a smart investment. They eliminate the need for computers dedicated to controlling them, can act as PLCs to run other devices on production lines, enable fool-proof and error-proof bar code printing, and provide investment protection with advanced features like XML printing and RFID label encoding.
Tags : 
plc, programmable logic controllers, intermec, xml, rfid, erp, bar code printing, fault dots, printing, errorproofing
    
Intermec
Published By: Electric Cloud     Published Date: Aug 07, 2009
Drive quality earlier in the development process with continuous testing. Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for identifying errors early so they can be corrected immediately by the developer who made the code changes.
Tags : 
software development, electriccommander, electric cloud, continuous testing, development, coding, testing, production, errors, ci cycle, intuit, defect tracking, integrated solution
    
Electric Cloud
Published By: Electric Cloud     Published Date: Oct 13, 2009
In this whitepaper I argue that the person most affected by the introduction of agile or extreme programming techniques is not the software or quality assurance engineer, but the build manager. And the build manager can no longer make do with home grown tools; software production automation tools are required to make agile development a build reality.
Tags : 
electric cloud, agile development, coding, testing, code, software development, build, automation, automate
    
Electric Cloud
Published By: Micro Focus     Published Date: Sep 12, 2014
Where green screen apps meet modern interfaces, accelerating efficiency and enhancing the user experience. Provide core system access from Windows, iPad or your web browser – without the risks of new code or reprogramming.
Tags : 
green screen apps, modern interfaces, user experience, cores system access, software development, wireless
    
Micro Focus
Published By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : 
gartner, buyers guide, endpoint security, security, it management
    
Intel Security
Published By: K2     Published Date: Apr 27, 2015
This white paper provides insight on five significant SAP challenges and what to look for when choosing a low-code application platform to overcome these challenges and optimize your SAP investment.
Tags : 
business apps, sap challenges, low-code application platform, optimize sap investment
    
K2
Published By: K2     Published Date: Apr 27, 2015
Download this free report to ensure you have the knowledge you need to retain your customers as you head into 2015.
Tags : 
business process management, cloud-based work orchestration, smart process apps, bpm market, "low-code" platforms, dynamic case management
    
K2
Published By: K2     Published Date: Jan 07, 2016
Microsoft SharePoint users rely on forms daily; it’s where the nitty-gritty work gets done. SharePoint forms that only work for current business needs can stagnate overall business growth. It’s important to plan today for a form that can carry your business processes into tomorrow. You have three options when looking for a SharePoint forms solution: should you buy, code or configure your own forms? Forms that can be delivered quickly, in an adaptable, affordable and future-ready way, are ideal.
Tags : 
microsoft sharepoint, best practices, security, sharepoint solutions, business processes, networking, it management, wireless
    
K2
Published By: Domino     Published Date: Jan 24, 2018
For manufacturers of baked goods and snacks, the need for flexible, high-quality coding and marking solutions has never been greater. The wide array of packaging types and materials already in use today — combined with the SKU proliferation driven by consumer demands — means manufacturers have to print expiration codes and lot numbers on multiple substrates in multiple areas/orientations on their packaging lines. These codes need to be clear, precise and readable by both humans and machines to ensure customer safety and satisfaction. They must also provide traceability in the event of a recall. This white paper from Domino looks at the types of printing technology available today and discusses their various advantages and disadvantages in bakery line applications.
Tags : 
    
Domino
Published By: Code42     Published Date: Feb 28, 2018
Business Continuity Starts with the Ability to Go Back No matter the size of the business, no matter the industry, the business world moves faster than ever. Constant digital innovation is only accelerating that pace. Yet, to keep business moving forward, ensure uninterrupted productivity and guarantee business continuity, organizations need to first focus on the ability to go back— to undo, restore and recover.
Tags : 
    
Code42
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Published By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Sep 16, 2014
IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."
Tags : 
power-based systems, big data, linux, fast deployment, open source infrastructure, data management
    
IBM
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
google, google mobile os, android, hackers, security, emm, enterprise mobility management, networking, software development, it management, wireless
    
IBM MaaS360
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com