• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

developers

Results 201 - 225 of 267Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jan 05, 2016
To make the most of the cloud, developers need to have the right foundations in place. If you’re working with enough freedom - and without having to worry about things like cost and data security – then you can concentrate on creating services and innovations that move your organisation forward.
Tags : 
    
Cisco
By: Cisco     Published Date: Apr 15, 2016
There’s a Private Cloud alternative your developers will love.
Tags : 
cloud management, cloud services, cloud management, best practices, infrastructure, cloud computing
    
Cisco
By: Cisco     Published Date: Apr 15, 2016
To make the most of the cloud, developers need to have the right foundations in place. If you’re working with enough freedom - and without having to worry about things like cost and data security – then you can concentrate on creating services and innovations that move your organisation forward.
Tags : 
cloud management, cloud services, cloud management, best practices, business intelligence, business management, business metrics, content integration, content management system, productivity
    
Cisco
By: Cisco     Published Date: Apr 18, 2016
If you’re like most people, the reason you’re looking at OpenStack for a private cloud is because your developers fell in love with public cloud, and you want to give them the same experience, but with better economics, control, and performance of a private cloud. The reality is that instead of looking to replicate the public cloud experience, privately, we often run in to people that want to fiddle with every aspect of the infrastructure and OpenStack® itself. Companies start off looking for a public cloud experience, but quickly become more interested in the choice of hypervisor, network models and storage architecture -- none of which are even up for discussion in a public cloud. These questions aren’t wrong to ask, they just shouldn’t matter to you. What should matter is the experience your developers will have in your private cloud, how your apps will run, and how your private cloud will integrate with your existing systems and apps.
Tags : 
    
Cisco
By: New Relic     Published Date: Jun 13, 2014
In this eBook you'll find the top five DevOps tools you should be using and how to use them.
Tags : 
new relic, development tools, it operations, developers, application perfomrance, apm, application performance management, enterprise software, database development, web development, productivity, project management, software compliance
    
New Relic
By: Localytics     Published Date: Jul 18, 2014
This 28-page ebook gives app developers & marketers the best practices, use cases and how-to steps required to boost user engagement and personalize app experience.
Tags : 
in-app messaging, push messaging, messaging best practices, in-app marketing, push marketing, user analysis, app personalization, personalize app, engage users, app user engagement, app engagement, engagement campaigns, measuring campaign, app campaign, user segments, segment app users, user retention, retain users, user value, lifetime value
    
Localytics
By: Salesforce.com     Published Date: Jun 14, 2013
This report, which is the vision report of the mobile app development playbook for application development and delivery (AD&D) professionals, focuses on the changes application developers need to understand if they want to build modern applications that deliver contextual customer experiences.
Tags : 
mobile applications, application development, contextual experience, customers, technology, multi service endpoints, modernization, software development, data management
    
Salesforce.com
By: Riverbed     Published Date: Sep 05, 2014
Applications in today's distributed, cloud-based IT environment need to perform at their peak at all times. Unfortunately, most do not. And while many developers and IT professionals have Application Performance Management (APM) solutions, they often don't know how to take full advantage of the benefits. This SlashGuide gives IT professionals and developers practical advice they need to get the most out of APM.
Tags : 
apm, application, management, solutions, cloud, benefits, advice, application performance management
    
Riverbed
By: Stackify     Published Date: Nov 19, 2014
Have you ever had to work with your log files once your application left development? If so, you quickly run into a few pain points. Learn how to create a “culture of logging” and work smarter, not harder.
Tags : 
log management, developer tools, error tracking, log analytics, stackify, application support, debugging tools, software logging, log files, application monitoring
    
Stackify
By: IBM     Published Date: Oct 22, 2013
Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change.
Tags : 
ibm, integration testing, optimize test efficiency, incremental integration, employ test virtualization, system-level testing, asset sharing, effective data management, e2e testing, applications, data management, application integration, business integration, content integration
    
IBM
By: IBM     Published Date: Jan 10, 2014
Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This whitepaper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
ibm, rational, integration, integration testing, incremental integration, testing, virtulization, data management, asset sharing, application performance, it management, test and measurement, application performance management, content integration
    
IBM
By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : 
ibm, bluemix, cloud-computing, middleware, networking, security, software development, it management
    
IBM
By: IBM     Published Date: Jan 26, 2015
IBM Bluemix, a robust platform as a service (PaaS) to host and deploy your app, also provides a wide range of enterprise grade tools that can be used in your applications to run your business needs. The Analytics Warehouse Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence (BI) and analytics tasks. Check out this upcoming webcast to learn how you can create a ready-to-use BI and analytics service on Bluemix, in just a few clicks, and even access those results on an Android app.
Tags : 
analytics service, open cloud platform, ibm, web developers, mobile developers, business integration, security, it management, enterprise applications, data management
    
IBM
By: IBM     Published Date: Jan 30, 2015
IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment. This session provides an overview of IBM Bluemix capabilities.
Tags : 
paas, ibm, infrastructure solutions, middleware challenges, knowledge management, enterprise applications, data management
    
IBM
By: IBM     Published Date: Feb 03, 2015
A recent survey conducted by Slashdot Media asked mobile developers four key questions that look into the most pressing challenges they face today, how their development approach is changing, which mobile platforms are taking the forefront in the coming years, and how they are ensuring that their apps will meet the quality standards that users demand. Here are the results of the survey.
Tags : 
mobile development, enterprise challenges, application quality standards, mobile apps, internal business apps, enterprise applications, mobile data systems, analytical applications, database development
    
IBM
By: IBM     Published Date: Feb 03, 2015
This SlashGuide discusses the results of a recent Slashdot Media survey that looks at the challenges facing developers today, how the primary development target is evolving, and how strategies are changing to embrace public, private, and hybrid-Cloud models. Respondents to the survey were asked four questions regarding their challenges in development and their needs regarding infrastructure and PaaS. Here are the results.
Tags : 
hybrid cloud targets, multiple mobile platforms, slashdot media, primary development targeting, it management, enterprise applications, data management, content management system
    
IBM
By: Symantec     Published Date: Nov 30, 2015
By code signing software, developers can ensure the integrity of their application, protect their intellectual property and brand image and help combat malware.
Tags : 
    
Symantec
By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
symantec, mobile, mobile applications, security, pki, security management
    
Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware, security management
    
Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates, security management, security policies, vulnerability management
    
Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing, application security, security policies
    
Symantec Corporation
By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec, application security, security policies
    
Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps, software development
    
Symantec Corporation
By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware, software development
    
Symantec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter