Subscribe: Most Popular White Papers and WebcastsSoftware and Web Development Research
http://www.bitpipe.com/rss/multi/ka_bp_softdev.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
application security  application  cloud  data  delivery  expert guide  guide  learn  mobile  published citrix  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSoftware and Web Development Research

Most Popular White Papers and Webcasts Software and Web Development Research



White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe



Published: Wed, 20 Sep 2017 14:40:20 EDT

Last Build Date: Wed, 20 Sep 2017 14:40:20 EDT

 



Guide to Early Application Testing and Understanding Dev and Ops Responsibilities

Tue, 19 Sep 2017 24:00:00 EDT

Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices. Published by: IBM



How to Increase Security for your Login on Mobile Applications

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data. Published by: IBM



How to Secure Mobile Applications in a Private Cloud

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications. Published by: IBM



How to Boost Mobile Application Security

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks. Published by: IBM



How to Build an Enterprise Application Security Program

Mon, 18 Sep 2017 24:00:00 EDT

In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing. Published by: IBM



Antimalware Protection and the Fundamentals of Endpoint Security

Tue, 29 Aug 2017 24:00:00 EDT

In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools. Published by: OPSWAT inc



How Secure is Open Source Software?

Thu, 24 Aug 2017 24:00:00 EDT

In this expert e-guide, learn about open source security requirements to consider and who should be responsible for security and support. Discover how to keep track of open source software for licensing and security purposes. Published by: Flexera Software



5 SAP HANA Implementation Tips CIOs Should Know

Tue, 22 Aug 2017 24:00:00 EDT

In this e-guide, Jawad Akhtar – long-time SAP expert in everything from SCM to products like HANA and Hybris – explores how to make your SAP HANA implementation successful. Uncover 5 tips to light your way towards a smooth, seamless SAP HANA adoption. Published by: SNP America, Inc.



Focus: Open source

Tue, 29 Aug 2017 24:00:00 EDT

Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies. Published by: ComputerWeekly.com



The Crisis of IT Operations & The Journey to Agility

Mon, 28 Aug 2017 24:00:00 EDT

Access this infographic to learn about a three phase process to automating your application and infrastructure delivery and how you stand to benefit. Published by: VMware



CW Nordics August 2017

Thu, 24 Aug 2017 24:00:00 EDT

The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more. Published by: ComputerWeekly.com



Manage Risk by Protecting the Apps and Data That Drive Business Productivity

Mon, 21 Aug 2017 24:00:00 EDT

Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. See why customers around the globe rely on Citrix to help them address the growing cybersecurity threats of today while preparing for future requirements. Published by: Citrix



How to Select and Leverage an IoT Platform

Tue, 08 Aug 2017 24:00:00 EDT

In this expert e-guide, hear from Chief Research Officer Bill McBeath about the importance of selecting the right IoT platform provider to suit the needs of your development team. Drill down into the IoT platform framework and learn about 3 IoT healthcare use cases. Published by: Aeris



Designing a Modern Enterprise Architecture

Fri, 04 Aug 2017 24:00:00 EDT

For a modern enterprise architecture to keep up with IOT and millions of mobile customers, they'll have to adopt similar characteristics to cloud apps. In this expert guide, 20-year industry veteran Kurt Marko, reveals what the future will look like for a next-generation architecture and what will be required. Published by: ERwin



Composable Infrastructure Overview

Wed, 02 Aug 2017 24:00:00 EDT

Composable infrastructure, or disaggregation, undoes traditional resource grouping, enabling you to mix and match resources as needed to meet specific workload demands. Access this e-guide to learn how composable infrastructure, its limitations, and the type of impact it will have on your organization. Published by: VeriStor



Cross Platform & Hybrid Database Monitoring

Mon, 31 Jul 2017 24:10:36 EDT

Today's DBAs are expected to do more than ever, including managing several different databases hosted on different platforms. Inside this Q&A, learn about tools that can simplify the job and improve database performance. Published by: Quest



Buyer's Guide to SAP HANA Infrastructure Hardware

Tue, 25 Jul 2017 24:00:00 EDT

Download this buyer's guide to learn how to select the proper infrastructure hardware for SAP HANA, with a particular look into Lenovo's X6 server models that provide HCI-like architecture for both single node and scale-out systems, for database performance. Published by: Lenovo and Intel



Focus: Cloud application development

Mon, 24 Jul 2017 24:00:00 EDT

In this e-guide we take a close look at some of the latest trends in cloud application development, with in-depth interviews with the likes of Cloud Foundry and Pivotal, and find out how one public sector organisation is tapping into all these ideas in their quest for efficiency. Published by: ComputerWeekly.com



The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery

Wed, 19 Jul 2017 24:00:00 EDT

In the next few months you will need to overcome several customer demand-driven challenges. This eBook delves into the primary drivers and implications for a hybrid application delivery infrastructure, and the key capabilities you should prioritize when identifying an ADC to support it. Published by: Citrix



Reducing the Costs of Your Next ADC Refresh

Wed, 19 Jul 2017 24:00:00 EDT

As application delivery controllers (ADCs) evolve, you need to determine what you want for the future flexibility of your network, your ability to move work functions to the cloud, and the costs of refresh in years to come. Use this e-book as your ADC strategy planning guide and examine the 3 possible strategies for your ADC refresh investment. Published by: Citrix



Workspaces of the Future

Wed, 31 Aug 2016 24:00:00 EDT

Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments. Published by: Citrix



7 ADC Essentials to Bridge the Gap Between Traditional and DevOps Application Delivery

Tue, 18 Jul 2017 24:00:00 EDT

Your organization is entering the stage where you need to support both legacy 3-tier and DevOps-enabled microservices applications architectures to meet app delivery demands. This infographic reveals the seven essentials that you need to look for in an ADC to bridge the gap from traditional to DevOps application delivery. Published by: Citrix



Is the Endpoint Security Nightmare Ending?

Mon, 17 Jul 2017 24:00:00 EDT

In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more. Published by: SearchSecurity.com



Mobile Apps Risk: Protect without Hindering Productivity

Mon, 10 Jul 2017 24:00:00 EDT

Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps. Published by: Blue Cedar



Mobile Security Risk Mitigation and Tips for Success

Tue, 11 Jul 2017 24:00:00 EDT

Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems. Published by: Blue Cedar



5 Post-Hot Patch App Ban Risks and the Value of Security Assessments

Tue, 11 Jul 2017 24:00:00 EDT

Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches. Published by: Blue Cedar



Computer Weekly – 11 July 2017: The data analytics behind the Wimbledon tennis championships

Fri, 07 Jul 2017 24:00:00 EDT

In this week's Computer Weekly, we find out how the All England Lawn Tennis Club is working with IBM to use data analytics to engage with fans of the Wimbledon championships. We examine whether IT automation will kill jobs or solve the skills gap. And we look at the issues around data portability in the cloud. Read the issue now. Published by: ComputerWeekly.com



IoT Future: Field Service Software Puts IoT to Practical Use

Thu, 22 Jun 2017 24:00:00 EDT

The Internet of Things isn't just for folks to know how much milk is left in the fridge. Discover how field technicians and the software to support them is changing the game for IoT, and how the industrial internet, bringing together predictive analytics and asset management, is progressing. Published by: ServiceMax by GE Digital



Starting and Scaling DevOps in the Enterprise

Wed, 21 Jun 2017 24:00:00 EDT

DevOps is a shift in how leading edge companies are starting to manage their software and IT work. However, many larger organizations face challenges supporting a DevOps culture with their legacy architecture, which is not conducive to a small team environment. Published by: SearchITOperations



Building a World-Class Web Application Security Program

Thu, 08 Jun 2017 24:00:00 EDT

Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system. Published by: Rapid7



Application Security Buyers Guide: 15 Requirements

Tue, 06 Jun 2017 24:00:00 EDT

In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision. Published by: Rapid7



7 Questions to Ask Your Dynamic Application Security Scanning Vendor

Tue, 06 Jun 2017 24:00:00 EDT

In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision. Published by: Rapid7



How to Buy The Best ADC, and The Changes to App Load Balancing

Tue, 30 May 2017 24:00:00 EDT

This expert e-guide outlines what you need to know in order to buy the best application delivery controller (ADC) for your company. As a bonus, learn about the new wave of application load balancing. Published by: A10 Networks



The human side of DevOps

Mon, 05 Jun 2017 24:00:00 EDT

In this e-guide, we'll share best practice and real-world examples of organisations who have successfully addressed the human side of DevOps. Published by: ComputerWeekly.com



The Next Step for Advanced Analytics: Data Science Platforms

Tue, 14 Feb 2017 24:00:00 EST

To help you survey the field of available options and pick the best data science platform for your business, this Gartner Magic Quadrant evaluates 16 of the top vendors and their offerings. From IBM and SAP to SAS and Quest, find out which platforms came out on top for advanced analytics, machine-learning, data integration, and more. Published by: SAS



Quarles & Brady Successfully Simplifies Windows 10 Rollout

Tue, 26 Jul 2016 24:00:00 EDT

In this video, you'll learn from law firm Quarles & Brady, and how to successfully roll out Windows 10 with ease and continuously manage the new OS with help from Citrix XenDesktop in a three-stage approach. Tune in now to rollout your W10 deployment. Published by: Citrix



Public Housing Authority Builds Its Future on Cloud Desktop Delivery

Thu, 18 Aug 2016 24:00:00 EDT

Watch this video to evaluate cloud-managed app and desktop delivery's ability to reduce infrastructure costs and increase the speed of service delivered to your customers. Provide employees with personalized workspaces accessible anywhere, while ensuring business continuity and reducing both capital and operating expenses. Published by: Citrix



The Importance of Open Ecosystem Analytics

Fri, 26 May 2017 24:00:00 EDT

In this white paper, learn more about why organizations are adopting these open source analytics programs, as well as what the SAS analytics ecosystem can provide. Published by: SAS



5 Steps to Maximizing the Value of Hadoop

Thu, 25 May 2017 24:00:00 EDT

The International Institute for Analytics has compiled a list of 5 steps to maximizing the value of a Hadoop big data project. Uncover key considerations and recommendations for getting started. Published by: SAS



How to Resolve a Web Application Security Vulnerability

Thu, 18 May 2017 24:00:00 EDT

Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments. Published by: Veracode, Inc.



Computer Weekly:Global Ransomware Attack Could Be a Security Wake-Up Call

Tue, 23 May 2017 24:00:00 EDT

In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management. Published by: ComputerWeekly.com



Considerations for virtual application delivery vs. full desktops

Fri, 19 May 2017 24:00:00 EDT

Choosing between virtual desktop and virtual application delivery can be a difficult decision. Desktop and app virtualization are often grouped together but are actually two separate technologies. Download this e-guide to determine if your organization should implement desktop or application virtualization, or a combination of the two. Published by: Citrix



How SD-WAN now benefits deployment and app delivery

Wed, 17 May 2017 24:00:00 EDT

Deploying SD-WAN technology can solve a lot of problems in the wide area network, but networking pros still need to do their homework before they buy. This TechTarget guide to SD-WAN deployment has the info you need to pick the right SD-WAN for your organization. Published by: SearchSDN.com



Enterprise Integration PaaS: How Informatica Compares to Other Vendors

Thu, 30 Mar 2017 24:00:00 EDT

This 2017 Gartner Magic Quadrant explores how to leverage integration PaaS (iPaaS) to implement data, app, API, and process integrations spanning cloud and on-premise endpoints. Discover which enterprise iPaaS providers came out on top and learn how to support a variety of integration scenarios, including B2B, mobile, and more. Published by: INFORMATICA



Redesigning the Workplace to Achieve Better Business and Employee Outcomes

Tue, 31 May 2016 24:00:00 EDT

Download this resource to receive instruction on redesigning the workplace to deliver secure access to apps, desktops, data and services—from any device and over any network—to allow complete freedom and flexibility in how people choose to work. Learning how to foster a collaborative workforce starts here. Published by: Citrix



Top Cloud Trends for IT Leaders

Tue, 09 May 2017 24:00:00 EDT

In this e-guide, read about the market potential for public cloud services in the Asia-Pacific (APAC) region, Oracle's plans to meet the cloud computing needs of APAC enterprises and how perennial concerns around cloud security are being addressed by the industry. Published by: ComputerWeekly.com



End Web Application Security Risks with WAF

Mon, 01 May 2017 24:00:00 EDT

In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities. Published by: F5 Networks



Free Download: CISSP Certification Strategic Guide

Fri, 18 Apr 2014 24:00:00 EDT

For security professionals, CISSP certification is globally recognized as a standard of achievement which is why we partnered with (ISC)2 to create CISSP Certification: A step-by-step strategic guide. Fill out this short survey to receive immediate access to this resource and one step closer certification. Published by: TechTarget



Mobile App Development: Android vs. iOS vs. Windows vs. Cross-platform

Wed, 19 Feb 2014 24:00:00 EST

Whether your company develops native apps for Apple, Android or Windows products, or wants to develop hybrid apps that span all major OSes – our e-guide, App Development Tools: Android vs. iOS vs. Windows vs. Cross-platform explains how to assess each product to help you decide which tools you should choose for your company. Published by: TechTarget



Mitigating data quality complexities in your analytical database

Fri, 21 Feb 2014 24:00:00 EST

Inconsistencies in your data can disrupt your strategic business moves, prevent you from planning for the future, and limit your ability to prescribe swift actions across your organization. Download this new e-guide and uncover 13 common data quality management problems and gain expert advice on how to mitigate them for optimal DB performance. Published by: TechTarget