Software  >   Applications Software  >   Portal Applications Software  >  

Business to Employee Applications Software

RSS Feed    Add to Google    Add to My Yahoo!
Business to Employee Applications Software White Papers (View All Report Types)
 
Continuous Improvement Requires Continuous Innovation
sponsored by Contino
WHITE PAPER: Rapid decision-making is critical in a dynamic digital environment. Learn how to move to a cycle of continuous delivery and improvement, adopt methods such as agile development, and more to keep pace.
Posted: 22 May 2017 | Published: 22 May 2017

Contino

Putting Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how DevOps helps you weave security testing, validation, and monitoring into each stage of the app lifecycle. Find out how to enable secure DevOps app development, and pave the way for continuous integration and continuous deployment.
Posted: 03 May 2017 | Published: 30 Oct 2015

Veracode, Inc.

Availability and Risk Avoidance for the Software-Defined Data Center
sponsored by Veeam Software
WHITE PAPER: Users demand access to information and applications at any given time from anywhere and any device, without tolerance for downtime or data loss. Access this white paper to learn how to keep your software-defined data center up and running at all times with backup and replication that won't leave you in the dark like legacy tools.
Posted: 01 Jun 2017 | Published: 16 Aug 2016

Veeam Software

5 ways to accelerate transformation with Google for Work
sponsored by Accenture
WHITE PAPER: Learn 5 ways Google for Work can enable retailers to take charge of digital transformation to deliver the frictionless experiences customers demand, including: enhance employee productivity, improve inventory management, create a true omnichannel experience, and 2 more.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Accenture

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

Preparing Your Toolbox for the SharePoint Framework
sponsored by Progress
WHITE PAPER: Explore the new SharePoint Framework and the variety of benefits for HTML5, JavaScript, and SharePoint app developers. Discover how to customize SharePoint easily by leveraging the open source framework's key features and web stack tools, including built-in themes, a SharePoint-tailored DataSource component, and more.
Posted: 14 Dec 2016 | Published: 14 Dec 2016

Progress

Unified Workspace eBook
sponsored by Lenovo Software
WHITE PAPER: Unified Workspace is designed to provide a technology-independent user experience that securely connects users to a comprehensive selection of files, applications, and reporting tools. Learn how Unified Workspace can provide a simple, consistent interface across devices, increased productivity, reduced costs and more.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Lenovo Software

A Structured Design Approach to Business Process Automation & Custom Software Development
sponsored by Red Hat
WHITE PAPER: Discover how to modernize business automation by capitalizing on advances in software development infrastructure, and incorporate them into a new structured, 6-step design approach that eliminates additional risk.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Red Hat

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Thycotic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement