it developers

Results 126 - 150 of 196Sort Results By: Published Date | Title | Company Name
Published By: Pentaho     Published Date: Jan 16, 2015
This ebook is recommended for IT managers, developers, data analysts, system architects, and similar technical workers, who are faced with having to replace current systems and skills with the new set required by NoSQL and Hadoop, or those who want to deepen their understanding of complementary technologies and databases. Sponsored by Pentaho.
Tags : 
big data, hadoop, data delivery, data management, business intelligence, data center
    
Pentaho
Published By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : 
ibm, bluemix, cloud-computing, middleware, networking, security, software development, it management
    
IBM
Published By: Red Hat     Published Date: May 11, 2016
Maximizing your developers effectiveness and efficiency is key to enabling growth and positioning your IT Infra- structure as an asset within your organization. Making certain you have considered all the angles is crucial in your Platform-as-a-Service (PaaS) success. The following checklist will help you assess your needs and possible business impacts to aid in your decision process for choosing which PaaS will benefit your developers, your infrastructure team, and your business.
Tags : 
red hat, paas, development, platform, infrastructure, enterprise applications
    
Red Hat
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI
Published By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
    
AWS
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
With increasing demands being made on enterprise IT departments to keep up with the accelerating pace of business, infrastructure has to enable more dynamic, eficient application and IT service delivery. Unfortunately, more ofen than not, IT provisioning can be a bottleneck. Traditional means are ofen ineficient. When developers plan their projects and estimate the server, networking, and storage resources they need, they ofen overestimate and pad their requests to ensure what actually gets provisioned is adequate. The formal request comes via an IT ticket, and then the waiting begins. Days, possibly weeks go by before they get the resources they need, and all the while they’re unable to iterate on and evolve core business oferings.
Tags : 
    
SolidFire_NetApp
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates, security management, security policies, vulnerability management
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec, application security, security policies
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps, software development
    
Symantec Corporation
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security, enterprise applications
    
Veracode
Published By: Glider     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Glider
Published By: Red Hat     Published Date: Jan 01, 2013
IT provisioning was slowing Cigna’s developers. In response, they developed Infrastructure-as-a-Service (IaaS) self-service provisioning using Red Hat and Red Hat-supported open source projects. Success led to a development infrastructure that speeds results and boosts the bottom line.
Tags : 
red hat, cigna, provisioning processes, infrastructure-as-a-service, innovations, agility, seamless interactions, superior engineering
    
Red Hat
Published By: Red Hat     Published Date: Aug 22, 2018
Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic.
Tags : 
    
Red Hat
Published By: Coverity     Published Date: Apr 20, 2012
Download this white paper to learn how you can empower your developers to manage security risks during development.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases
    
Coverity
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In today’s application economy, interaction between a business and its customers, partners and employees is increasingly through apps. And omni-channel access to these applications—from anywhere at any time—is dependent on APIs. These APIs provide an interface for developers to code against, and must be robust enough to support ever-growing demand. As a result, APIs are perhaps the most critical technology in digital business design today. APIs sit between your application clients —apps, websites and devices—and application backends. By leveraging APIs, you can securely stretch the boundaries of your enterprise by tapping into a broad array of digital businesses, digital customers and digital devices. But just as important as the API, is the application backend itself. Behind the API, the data access layer and application logic layer are doing the heavy lifting—implementing business rules, maintaining data consistency and managing interactions with various data sources. These three com
Tags : 
    
CA Technologies EMEA
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Many Learning and Talent Management platforms don’t have the flexibility to customize the type of reporting that users want, or it’s too complicated to figure out. Bluewater’s team of developers and designers can create completely customized pages within your Learning and Talent Management System* for a seamless delivery of what you need,
Tags : 
    
Bluewater Learning
Published By: Hostway Services, Inc.     Published Date: Aug 13, 2015
This is a whitepaper outlining what designers and developers should look for in a potential reselling partner.
Tags : 
hosting, developer, reselling, services, service, it management, knowledge management
    
Hostway Services, Inc.
Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media, software development, web services
    
Integration New Media
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media
    
Integration New Media, Inc.
Published By: Limelight Network     Published Date: Aug 12, 2019
The UK’s number one property website, Rightmove.co.uk, provides home hunters with both website and mobile access to over one million available properties daily. Their website and mobile platforms make searching for and researching properties to buy or rent, easy. Rightmove continues to grow with over 50 million-page impressions a day, often topping 55 million. Since its initial launch in 2000, there have been almost 40 million properties listed, with a library of over 2.5 billion active and archived images. Rightmove customers, including UK and overseas-based estate and letting Agents as well as new home developers are uploading 2 million images every day. Tim Harding, Head of Operations at Rightmove, is responsible for ensuring these images are available to home hunters visiting the site at all times, no matter what device they are using or where they are located. After two years at Rightmove, Tim has seen a tremendous increase in the amount of images posted per property, along with g
Tags : 
    
Limelight Network
Published By: Juniper Networks     Published Date: Oct 25, 2017
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where we’ll go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, it’s important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure team’s mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.