it development

Results 351 - 375 of 1108Sort Results By: Published Date | Title | Company Name
Published By: Epicor     Published Date: Aug 03, 2012
Risk-averse distributors may feel that the safest and simplest IT strategy is to stay with their existing "homegrown" enterprise resource planning (ERP) solution. But just as sticking your money under the mattress offers no protection against inflation, maintaining an outdated system can rob you of a distinct competitive advantage.
Tags : 
immediacy, erp software, data duplication, data discrepancies, lack of testing, lack of vision, new advances, systems architecture, learning management system, easy integration, epicor, software development, batch system, real-time
    
Epicor
Published By: Evariant     Published Date: Nov 08, 2018
Health systems gain a competitive edge when they identify the right physicians and target those physicians to develop unsurpassed loyalty. Learn how to cultivate relationships with physicians that lead to an increase in cases being referred, which results in smarter provider engagement, increased margins, optimized network utilization and health system growth. But which doctors? In which service lines? And what kinds of cases? And what touch points? This guide discusses how to reimagine how network development teams work that results in the ability to demonstrate indisputable ROI from network development activity and liaison outreach.
Tags : 
physician relationship management, network utilization, market development
    
Evariant
Published By: Evergage, Inc.     Published Date: Feb 17, 2015
Our free eBook, The Ultimate Web Personalization Planning Guide, includes everything you need to know to get started with real-time web personalization or to advance your current program. Start improving visitor engagement, conversion rates and revenue generation on your site today!
Tags : 
evergage, web personalization, web personalization planning, real time web personalization, marketing strategy, personalization program, website marketing, website development, customer engagement, emerging marketing, internet marketing, customer experience/engagement
    
Evergage, Inc.
Published By: Evergage, Inc.     Published Date: Jun 01, 2015
Every e-commerce website is different in terms of content, offerings, layout and navigation. And every shopper is unique with diverse intentions, tastes and purchase patterns. That’s why personalization is critical to help you meet your business and website goals.
Tags : 
evergage, web personalization, web personalization planning, real time web personalization, marketing strategy, personalization program, website marketing, website development, customer engagement, emerging marketing, social media, internet marketing, crm & customer care, e-commerce
    
Evergage, Inc.
Published By: Evident.io     Published Date: Nov 19, 2015
This report will help IT executives and development teams understand the new approaches to security required in a continuous deployment environment.
Tags : 
evident, security, continuous deployment environment, dev ops approach
    
Evident.io
Published By: Evident.io     Published Date: Sep 13, 2017
Letting security slip for even a moment can be detrimental to your enterprise. Unfortunately, fast-moving and changing cloud environments don’t make things easier. To avoid making costly mistakes in the first place, everyone must do their part. With "The Six Essentials for DevOps Team Excellence," learn how DevOps teams can incorporate security and development and maintain agility.
Tags : 
    
Evident.io
Published By: Expert System     Published Date: Jul 18, 2019
For publishers and information providers, your competitive advantage starts with optimizing your most valuable resource: content. In this context, semantic content enrichment has evolved from a game changing capability into a de-facto requirement for both competition and innovation. Expert System’s solutions based on our cognitive technology, Cogito®, help publishers take full advantage of content to ensure its complete availability for providing compelling content, supporting new product development, building new revenue streams and improving workflow productivity.
Tags : 
    
Expert System
Published By: ExtraHop     Published Date: Jul 25, 2013
Practice Fusion, the leading provider of web-based electronic medical records, used ExtraHop to improve collaboration between its Development and Operations teams. “We’re not just remediating problems faster, but preventing problems from occurring in the first place,” says John Hluboky, VP of Technical Operations.
Tags : 
collaboration, storage, technology, extrahop, best practices
    
ExtraHop
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 is a worldwide Oracle Certified Partner, a proud member of Oracle Partner Network (OPN), and works closely with Oracle on the development and refinement of joint solutions including their Maximum Availability Architecture (MAA). By taking advantage of F5’s Application Ready Network for Oracle Application Server 10g, an integral part of Oracle Fusion Middleware, organizations can achieve an secure and optimized platform for delivering Oracle applications across the LAN and WAN.
Tags : 
application ready network guide, application server, oracle, maximum availability architecture, internet-enabled enterprise software, application delivery networking, oracle applications
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 is a worldwide Oracle Certified Partner, a proud member of Oracle Partner Network (OPN), and works closely with Oracle on the development and refinement of their Maximum Availability Architecture (MAA). Oracle E-Business Suite is a fully integrated, comprehensive suite of business applications for the enterprise. In fact, Oracle is one of F5’s largest customers, providing application delivery networking to Oracle.com, and all of their internal and external enterprise applications for Oracle employees worldwide.
Tags : 
oracle, internet-enabled enterprise, application ready network guide, oracle e-business suite, business applications, external enterprise applications, internal enterprise applications
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Feb 19, 2013
Download this whitepaper to view Cisco's move limiting Application Control Engine development which shows that the time for stand-alone load balancers has passed. IT leaders should now focus on leveraging more advanced application delivery.
Tags : 
load balancers, refocus, application delivery, advanced, improve, controller
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Cisco's move limiting Application Control Engine development shows that the time for stand-alone load balancers has passed. IT leaders should focus on leveraging more advanced application delivery controller features to improve application deployments.
Tags : 
refocus, application delivery, control engine, adcs, streamline data center operations
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : 
f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud, mobile, application deployment, application delivery
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
With the cloud transforming application development and deployment—enabling organizations to improve flexibility, automate processes, and decrease time to market—some big questions remain. One of the most important issues an organization must address is how it can best employ the smarter tools and limitless scale that the cloud offers. One way that enterprises take advantage of the benefits of the cloud is by deploying their own private cloud, which is a computing model that fosters agility while allowing organizations to maintain control of their infrastructure, while better securing their applications and their data.
Tags : 
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
Despite the tech industry’s collective best efforts to bolster 2CONFIRME,D D2ATA BREACH0ES IN 201710 secure application development practices, half of all applications remain vulnerable to attacks.
Tags : 
    
F5 Networks Inc
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployed—it’s deployed on a frequent basis.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
    
FICO
Published By: FICO     Published Date: Jan 11, 2018
Many organizations consider optimization only for their largest or most challenging business problems, often utilizing a small number of Operations Research professionals. But in our age of Big Data, market globalization and increased competition, many organizations are successfully making the case that optimization can be applied to a wider variety of business and operational decisions, and be developed by a new group of users — the organization’s business analysts. With a proven track record of results demonstrating that organizations can increase profitability with business analysts applying optimization to many types of business problems, FICO’s proven development methodology is giving organizations the confidence to extend optimization practices across their enterprises.
Tags : 
business analyst, optimization, fico, partnership, credit, collections, banking, finance
    
FICO
Published By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
Published By: First Advantage     Published Date: Apr 30, 2018
If you’re reading this ebook, you get it. Organizations like yours know that background screening is becoming a service without borders. You simply must screen the people who work for your organization, no matter where they’re from or where they work, or you risk the integrity and worldwide credibility of your company. Global screening can be very different from U.S. background screening. Availability of information, and the time and requirements to conduct the searches are different than what is standard in the U.S. That complexity is what drove the development of this eBook.
Tags : 
    
First Advantage
Published By: Fitbit     Published Date: Jan 23, 2018
Springbuk recently announced its America’s 100 Healthies Employers for 2017. This annual list celebrates the healthies in population health, taking into account organizational vision, success metrics, the impact on company culture, development of internal expertise and use of technology.
Tags : 
    
Fitbit
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.