Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

build software

Results 1 - 25 of 110Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
cisco, power, radio, wi-fi, network, architecture
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
Building on 25 years of server market leadership, the HPE ProLiant Gen9 portfolio—which includes HPE OneView software for simplified, converged management—offers optimal performance, increased storage, reduced energy consumption, and greater visibility and control across IT environments. Now everyone from enterprises to small and medium businesses (SMBs) can lower the cost of IT services, reduce delivery times, and improve their overall performance to gain a competitive edge. Download this white paper to learn more about the HPE ProLiant Gen9 portfolio.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Dec 11, 2018
Miercom was engaged by Cisco Systems to independently configure, operate and assess aspects of campus-scale, wireless and wired network infrastructures from Cisco and Huawei Technolgies. Our evaluation found that, where Cisco and Huawei both offer all the comparable components for building a campus-wide, wireless and wired, network infrastructure, test after test found that the Cisco package offers certain positive advantages that Huawei does not. Cisco showcased superior performance against the Hauwei wireless solution with a highly developed resource management, hardware, software and security platform to provide the most optimized, trustworthy system to ever customer. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Commvault     Published Date: Jul 06, 2016
Forget about the complex task of building your own solution. Commvault offers a portfolio of integrated backup appliances that allow you to go from power-up to backup in less than an hour. Each appliance combines Commvault’s industry-leading software with pre-configured and optimized hardware, including an option that uses NetApp’s category-leading NetApp E-Series storage system. To further simplify ordering and deployment, the appliances include a licensing option aligned to the usable storage capacity (e.g., 36TB of NetApp E-Series storage includes 36TB of Commvault back-end terabyte licensing). Or you can purchase the hardware separately and use it with Commvault’s traditional front-end terabyte capacity licensing. Either way, Commvault serves as the single point of contact for software and hardware support issues, and the installation wizard allows you to be up and running quickly regardless of the option you choose.
Tags : 
commvault, backup appliances, netapp e-series, backup, industry leading software, netapp, turnkey solution, converged, it management
    
Commvault
Published By: Cisco     Published Date: Jun 21, 2016
Transform your business with services that allow you to innovate faster, simplify operations, and reduce risk. Building on an open, software-driven approach that uses virtualization, automation, analytics, and cloud, our networkwide architecture prepares you to respond to new opportunities at digital speed.
Tags : 
    
Cisco
Published By: Dell EMC     Published Date: Nov 04, 2016
VCE VxRail Appliances enable organizations to create IT certainty by eliminating complexity and collapsing cost structures while leveraging their existing VMware investments. Based on VMware's market-leading Hyper-Converged Software, VxRail delivers a known and proven building block for the software defined data center. It provides IT organizations with a full range of options to create a flexible, optimized infrastructure that dramatically simplifies their IT operations while reducing costs.
Tags : 
storage, vmware, protection, hyper-convergence, ssd, hdd
    
Dell EMC
Published By: BMC Software     Published Date: Aug 12, 2013
Don’t miss out on the perspective provided in the latest Forrester Thought Leader Cloud Survey. In-depth responses provided by 300 cloud decision makers show you: • Why users go around IT for cloud services • Why you should embrace hybrid cloud – for yourself and the business • A best-practices checklist to help build and run a cloud that fits your business needs • Four key recommendations from Forrester to reach Cloud success Compliments of BMC Software.
Tags : 
cloud, cloud services, bmc, forrester
    
BMC Software
Published By: Skillsoft     Published Date: Apr 29, 2015
A Skillsoft whitepaper on Overcoming the skills deficit: the response of UK organisations to the workforce development challenge
Tags : 
skills deficit, overcoming the skills deficit, uk skills shortage, skill builders, l & d software, skillsoft
    
Skillsoft
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: Red Hat     Published Date: Jun 23, 2016
CA Technologies, a software company servicing the majority of the Global Fortune 500, wanted to help its internal development teams get its world-class apps to market faster. By using OpenShift Enterprise by Red Hat, CA Technologies was able to provide a Platform-as-a-Service (PaaS) for its internal teams to more quickly build and deploy Software-as-a Service (SaaS) applications for its external customers. Development times dropped from months to weeks in most cases. In addition, the new system offers maximum scalability by automatically spinning up or spinning down servers based on user load.
Tags : 
technology, best practices, global fortune 500, development, productivity
    
Red Hat
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 30, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Workday     Published Date: Jul 19, 2017
Multi-tenancy is a key feature of Workday and enables multiple customers to share one physical instance of the Workday system in a highly secure environment. Multi-tenancy is enabled through the Workday Object Management Server (OMS). Workday OMS allows servers to host multiple customer tenants simultaneously and builds “security walls” between each of the tenants. Thanks to Workday OMS, there is no way for any worker in one tenant to access the information of another tenant. Workday delivers its software using a continuous development model. Builds are rolled out weekly that contain new features, bug fixes, or performance improvements. Twice a year, Workday takes all the features put into preview and releases them to production for all customers. Workday customers are never landlocked on an old release, and all customers can utilize new features for the products they purchased as soon as they are live.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
Workday
Published By: Splunk     Published Date: Nov 29, 2018
DevOps allows teams to effectively build, test, release, and respond to your software. But creating an agile, data-driven culture is easier said than done. Developer and devops teams struggle with lack of visibility into application monitoring tools and systems, accelerated time-to-market pressure, and increased complexity throughout the devops lifecycle process. As a Splunk customer, how are you using your machine data platform to adopt DevOps and optimize your application delivery pipeline? Download your copy of Driving DevOps Success With Data to learn: How machine data can optimize your application delivery The four key capabilities DevOps teams must have to optimize speed and customer satisfaction Sample metrics to measure your DevOps processes against
Tags : 
devops, devops tools, continuous delivery, devops methodology
    
Splunk
Published By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: Juniper Networks     Published Date: Oct 02, 2018
How do you connect to public clouds and drive hybrid IT while prioritizing legacy needs? This detailed eBook on cloud integration provides our most in-depth report. • Build a secure, agile, modern network • Integrate cloud without leaving legacy software behind • What are the common barriers to adopting cloud solutions—and how do we solve them?
Tags : 
    
Juniper Networks
Published By: Salesforce     Published Date: Aug 01, 2016
This e-book will help you learn how to build a great software as a service (SaaS) business. It will show you how partnering with Salesforce gives you an unparalleled advantage in the marketplace to build, market, sell, and grow faster.
Tags : 
salesforce, saas, software as a service, business growth, trusted business apps, software development, enterprise applications
    
Salesforce
Published By: Oracle     Published Date: Mar 01, 2019
Using PaaS to build and extend the functionality of cloud software products (SaaS) means that you: - No longer have the cost of maintaining hardware and / or a data center (especially if it is not being utilized 100% of the time) \ lowering costs and expanding resources - Can set up development environments quickly and easily, boosting speed, innovation and agility - Save time, improving speed and agility and reducing time to market - Only pay for what you use, further reducing costs and increasing flexibility …which, in turn, will provide faster time-to-value.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2019
Most cloud infrastructure vendors offer companies a stable and secure environment on which to build and run their applications without having to manage a data center, invest in hardware, or install and update software. While most cloud vendors provide the same types of services, they differ in how they charge for and deliver those services.
Tags : 
    
Oracle
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: EMC     Published Date: Jun 13, 2014
Discover how private clouds add value while maintaining simplicity, enabling automation and driving self-service
Tags : 
building the cloud, private clouds, public clouds, it as a service, software-defined data centers
    
EMC
Published By: SAS     Published Date: May 24, 2018
This paper provides an introduction to deep learning, its applications and how SAS supports the creation of deep learning models. It is geared toward a data scientist and includes a step-by-step overview of how to build a deep learning model using deep learning methods developed by SAS. You’ll then be ready to experiment with these methods in SAS Visual Data Mining and Machine Learning. See page 12 for more information on how to access a free software trial. Deep learning is a type of machine learning that trains a computer to perform humanlike tasks, such as recognizing speech, identifying images or making predictions. Instead of organizing data to run through predefined equations, deep learning sets up basic parameters about the data and trains the computer to learn on its own by recognizing patterns using many layers of processing. Deep learning is used strategically in many industries.
Tags : 
    
SAS
Start   Previous   1 2 3 4 5    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.