• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

software

Results 26 - 50 of 5225Sort Results By: Published Date | Title | Company Name
By: Veracode     Published Date: Jun 26, 2019
DevSecOps is the future of Software Development
Tags : 
    
Veracode
By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
By: Instructure     Published Date: Jun 25, 2019
The How-to Guide to Developing Your Employees and Retaining Top Talent. Many organisations are finding it difficult to attract, engage and retain the right people. However, companies ranked among 2019’s top places to work all agree on one thing: ‘employee development’ is the secret sauce. Your people need more than fun perks and competitive pay - they require ongoing, personal development to be productive, loyal and engaged. This guide covers: Why ‘employee development’ is key Tips & tricks for setting your employees up for success Effective employee development must-haves How the Bridge employee development platform helps you tackle all this This guide is designed to help HR and L&D leaders to successfully engage their workforce and foster a culture of learning, development and growth. About Bridge Bridge, from the makers of Canvas, is employee development software that creates a positive employee experience and increases engagement through purposeful learning, continuous feed
Tags : 
    
Instructure
By: Motorola Solutions     Published Date: Jun 24, 2019
At Motorola Solutions, our purpose is simple; we create mission-critical communication solutions to help our customers build safer cities and thriving communities. That’s why we recently acquired Avigilon, an industry leader in video, access control and video analytics solutions, in our ongoing effort to provide trusted security solutions to our customers to help them be their best in the moments that matter. In the modern world of utilities, when it comes to providing electricity to light the family kitchen, transporting clean drinking water across many miles to the tap, or delivering the natural gas that heats the oven — everything must follow a process. At the frontline of ensuring these processes remain consistent, is having the ability to instantly know when an incident occurs that can disrupt the critical work that needs to be done. Avigilon access control and video management software is available to help utility operations ensure their critical processes are protected, so servi
Tags : 
    
Motorola Solutions
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
The cloud is ubiquitous. Whether we think about it consciously or not, almost all of us are using cloud services. That could be a music service such as Spotify, storage such as Dropbox, communications via Gmail, or a software-as-a-service application such as Salesforce. Cloud services touch all of our lives.
Tags : 
    
Group M_IBM Q3'19
By: VMware     Published Date: Jun 21, 2019
Hyperconverged infrastructure (HCI) has emerged as a breakthrough IT technology over the past several years. With the right HCI solution, IT teams can lower costs, increase agility, and reduce complexity— leveraging a modern software-defined IT platform that provides a seamless path to hybrid cloud. IT continues to embrace HCI in great numbers, with the market expected to grow at a compound annual rate of 42 percent through 2023.1
Tags : 
    
VMware
By: VMware     Published Date: Jun 21, 2019
Prime your business for growth with a software-defined approach. The current business-enterprise climate demands robust connectivity and delivery in services. As IT executives continue to invest in integrated infrastructure, companies that remain committed to hardware-centric infrastructure are being left behind and subsequently are exposing their enterprises to risk and loss. Liabilities include time wastage and financial costs in the management and maintenance of legacy infrastructure, creating a deficit in executives’ energy when it comes to innovation and future planning. VMware’s Hyperconverged Infrastructure (HCI) is a malleable, sophisticated solution which facilitates the vital transition from physical to virtualized storage solutions. HCI is the foundation for the Software-Defined Data Center (SDDC) destined for leading enterprise operations.
Tags : 
    
VMware
By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
By: Red Hat     Published Date: Jun 19, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another. In March 2018, Re
Tags : 
    
Red Hat
By: Red Hat     Published Date: Jun 19, 2019
Business success is increasingly based on your ability to react to change. As new disruptive players enter markets and technology upends what consumers expect, organizations increasingly need to change plans in much shorter cycles than ever before. Modern software architectures and processes can make organizations more effective at dealing with this change and emerging as winners in their markets. A new architectural framework called agile integration brings together three important architectural capabilities: containers, distributed integration, and application programming interfaces (APIs). This framework addresses how these key capabilities promote agility and power new processes within your organization to create competitive advantage. Industries like travel and hospitality have been transformed by new ways of doing business—new services are now offered, and consumers interact with services differently. This trend of disruptive change is extending across other major industries—from
Tags : 
    
Red Hat
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployed—it’s deployed on a frequent basis.
Tags : 
    
F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
    
F5 Networks Singapore Pte Ltd
By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
By: TIBCO Software     Published Date: Jun 14, 2019
Reinventing the Yellow Pages Directory: How YellowAPI Became an Engine for Digital Transformation
Tags : 
    
TIBCO Software
By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
By: CheckMarx     Published Date: Jun 07, 2019
Artificial Intelligence (AI) software is everywhere being leveraged by many industries such as healthcare, fintech, and e-commerce. But how does AI impact the security space? Join Maty Siman, Checkmarx Founder and CTO, to get both a white hat and black hat perspective to AI and security.
Tags : 
    
CheckMarx
By: Forcepoint     Published Date: Jun 06, 2019
Cost, speed, and reliability are all important to consider when designing a network, but balancing all three is no easy task. As your organization expands, you need a resilient, fast, and secure network—especially in large, distributed environments. And it needs to be affordable. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Five false assumptions about SD-WAN By now, almost everyone knows something about software-defined-wide-area networking (SD-WAN). SD-WAN is getting a lot of buzz over its MPLS counterpart, but every innovation in tech comes with certain misconceptions—it’s just part of the territory. Can SD-WAN take the place of internet? SD-WAN doesn’t require on-premises hardware, right? Outside of cost, is it really better than MPLS? Read “Secure Enterprise SD-WAN Myths” for answers to these questions and more, clarity around SD-WAN’s advantages and limitations, and how Forcepoint can help you implement secure SD-WAN for your distributed enterprise. And yes—SD-WAN really is better than MPLS.
Tags : 
    
Forcepoint
By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure, cloud, hyperconverged
    
DataCore
By: DataCore     Published Date: Jun 06, 2019
Nothing in Business Continuity circles ranks higher in importance than risk reduction. Yet the risk of major disruptions to business continuity practices looms ever larger today, mostly due to the troubling dependencies on the location, topology and suppliers of data storage. Get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure
    
DataCore
By: Ahead     Published Date: Jun 05, 2019
Digital Business Demands Better Software, Faster In your organization, you’ve probably heard questions like these asked of the application development and/or infrastructure and operations organizations. > Why can’t our software development teams keep up with new business requirements? > Why are we always waiting on infrastructure teams? > Why do our business initiatives become outdated before their required software is even deployed? > Is our software development team aligned with corporate goals like engaging younger consumers on their mobile devices?
Tags : 
    
Ahead
By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter