RecruitingBlogscom

Follow Us:

 

ios

Results 251 - 275 of 827Sort Results By: Published Date | Title | Company Name
Published By: Jamf     Published Date: Jan 18, 2018
At Jamf we help organizations succeed wit Apple. The Jamf Pro is the leading iOS Mobile Device Management (MDM) tool for organizations to configure, secure, and inventory iPads and iPhones.
Tags : 
    
Jamf
Published By: Jamf     Published Date: Mar 29, 2018
As iPad and iPhone usage continues to grow in higher education institutions around the world, finding the right way to manage iOS devices can be as important as the technology itself. In this e-book, we’ll educate you on the basics of mobile device management (MDM) and explain how you can maximize your education technology purchases. Become an expert in: • The state of iOS in higher education • Best practices and workflows for iPad and iPhone device management • Moving higher education forward with Apple TV
Tags : 
    
Jamf
Published By: Lookout     Published Date: Dec 09, 2016
Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
When it comes to enterprise mobility, both iOS and Android suffer from major security vulnerabilities and are at risk of malicious threats and malware attacks. Read the Lookout’s review of today’s most prevalent issues, including OS, app, and jailbreak threats.
Tags : 
risks, mobile technology, enterprise, ios, android, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Applause     Published Date: Jul 14, 2017
Learn tips, techiques and trends for launching great digital experiences that delight your users in our free guide.
Tags : 
mobile app testing, mobile applications, mobile application testing, software testing, functional testing, usability testing, usability studies, security testing, localization testing, device fragmentation, native apps, quality assurance, applause, android app testing, ios app testing
    
Applause
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Tenuto conto del fatto che la GDPR è stato annunciato formalmente solo di recente, si evidenzia un buon livello di consapevolezza tra i partecipanti. Una volta informati sul regolamento, l'88% degli intervistati ha dichiarato che la propria azienda deve affrontare difficoltà tecnologiche per la compliance alla GDPR. Il percorso verso la compliance è percepito come molto laborioso.
Tags : 
generazione di dati sintetici, virtualizzazione di servizi, controllo e protezione dei database, masking dei dati, warehouse dei dati, ca technologies, gdpr
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Las empresas que actualmente adoran las metodologías ágil y de desarrollo y aplicaciones luchan por lograr cambios rápidos e implementaciones veloces. Para estas compañías, la arquitectura de microservicios supone un regalo, pero no el fin de todas sus preocupaciones. Las organizaciones pueden habilitar a equipos de desarrollo más reducidos, dotados de una agilidad y autonomía mayores. Como resultado, el resto del negocio notará que la TI se ajusta mejor a las cambiantes demandas que se les proponen.
Tags : 
modularidad, velocidad de entrega, cero implementación, implementación automatizada, cohesión, separación de intereses, seguridad, ca technologies, devops, agile, microservices
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Desea ofrecer innovaciones, lanzar aplicaciones más rápido y aprovechar nuevas oportunidades, pero las infraestructuras y aplicaciones heredadas no se lo permiten. Cámbiese a una arquitectura moderna a través de la descomposición de aplicaciones monolíticas en microservicios ágiles, creados, gestionados y escalados de manera independiente. Su negocio podrá actuar más rápido y los desarrolladores estarán encantados con el acceso sencillo a las API, que les ofrece la libertad de centrarse en la experiencia de los clientes.
Tags : 
pequeños en tamaño, utilizan mensajería, delimitados por contextos, desarrollados de forma autónoma, descentralizados, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Generate rich virtual data that covers the full range of possible scenarios and provide the unconstrained access to environments needed to deliver rigorously tested applications on time and within budget. Model complex live system data and apply automated rule-learning algorithms to pay off technical debt and uncover in depth understanding of composite applications, while exposing virtual data to distributed teams on demand and avoiding testing bottlenecks.
Tags : 
virtual services, data, avoid project delays, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A lot can be learned from getting a group of experienced CIOs in a room and encouraging them to talk freely about the topics at the front of their minds. Rarely do they want to discuss technology, and even the latest IT industry ‘hot topics’ usually don’t get that much airplay. Conversations, and sometimes quite heated debates, tend to revolve around broader business-related trends, how these are changing stakeholder and user behaviour and expectations, and how best to respond to such dynamics.
Tags : 
development tools, code management, software build, service virtualisation, automation management, platform building, sdlc, mttr, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
En la actualidad, el software se encuentra en el núcleo de la metodología de las empresas para competir y funcionar de forma eficaz en el siglo XXI. Durante mucho tiempo, la tecnología ha desempeñado un papel decisivo en la estrategia empresarial. Sin embargo, la transformación digital ha ampliado las iniciativas de transformación y aceleración del ciclo de entrega de software, así como los procesos de desarrollo de aplicaciones, a un imperativo que se extiende por toda la empresa y se interseca cada vez más con la otra preocupación que acucia a los directivos: la ciberseguridad.
Tags : 
ampliar el control, automatizar la autorizacion, escalar e integrar, facilitar tanto la monitorizacion, incorporar la capacidad
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
Las cuentas de usuario con privilegios, ya se usurpen, sean objeto de abuso o, simplemente, se usen de forma incorrecta, se encuentran en el corazón de la mayoría de las infracciones relativas a datos. Los equipos de seguridad evalúan, cada vez más, soluciones de gestión de accesos con privilegios (PAM) completas para evitar el perjuicio que podría provocar un usuario malintencionado con privilegios altos o un usuario con privilegios que está cansado, estresado o que, sencillamente, comete un error. La presión que ejercen los ejecutivos y los equipos de auditoría para reducir la exposición de la empresa aseguran el esfuerzo, pero las soluciones de PAM completas pueden acarrear costes ocultos, según la estrategia de implementación adoptada.
Tags : 
almacen de contrasenas, monitorizacion de contrasenas, entornos hibridos
    
CA Technologies EMEA
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. BusinessNewsDaily.com notes that CIOs and business-minded technology leaders are moving beyond being supportive functions and into being an integrated part of overall business strategy and operations. IT is delivering added value, enhanced business performance, and greater security. This best practices paper outlines eight important ways that IT teams can make meaningful progress in their digital transformations."
Tags : 
digital, practices, professional, technology, esignature, docusign
    
DocuSign UK
Published By: Forrester Research     Published Date: Jun 11, 2018
There’s an alarming digital divide within many companies. Marketers are developing nimble software to give customers an engaging, personalized experience, while IT departments remain focused on the legacy infrastructure. The front and back ends aren’t working together, resulting in appealing websites and apps that don’t quite deliver. We’ve arrived at this misalignment for understandable reasons. Previously, most chief information officers (CIOs) were hired to digitize and bring order to companies’ internal systems and processes. They saw websites as marketing channels and were happy to let chief marketing officers (CMOs) oversee that province of technology. They had, and still have, plenty to do just to keep internal operations running smoothly. Marketers soon got into the habit of developing not just content, but also software programs to better reach and transact with customers. But now that websites and apps are becoming cornerstones of the business, the stakes are too high to al
Tags : 
cio, marketers, business, digital, customers
    
Forrester Research
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to “Day Two” challenges of accelerating large-scale PostgreSQL deployments. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. After a PostgreSQL deployment is live, there are a variety of day-two scenarios that require planning and strategizing. The third section of this eBook provides a detailed analysis of all aspects accelerating large-scale PostgreSQL deployments: ? Backups and Availability: strategies, point-in-time recovery, availability and scalability ? Upgrades and DevOps: PostgreSQL upgrade process, application upgrades and CI/CD
Tags : 
    
Stratoscale
Published By: ServiceNow     Published Date: Mar 27, 2014
This paper provides CIOs and IT leaders with an insight into three IT imperatives that IT executives used to re-position IT and transform the enterprise.
Tags : 
enterprise transformation, consolidation, self service, automation, visibility, it innovation, enterprise applications, research
    
ServiceNow
Published By: Here Technologies     Published Date: Apr 02, 2019
In this report, VSI applies HERE’s HD map data to a lane keeping application and examines performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach. VSI tested the lane keeping system with and without map data on a local road in 3 scenarios: Lane lines expanding into a turn or exit lane An intersection without lane lines A widening in the lane The results show that in all scenarios, the computer-vision-only lane keeping systems got confused and made errors in a vehicle’s trajectory when lane markings were out of the ordinary or invisible. Faced with the same road conditions, the map-based lane keeping system stayed within the desired trajectory outperforming the compute- vision-only systems. This report proves that using a lane model from an HD map can solve common issues involved in computer-vision-only lane keeping.
Tags : 
over the air technologies, location data, auto, mapping
    
Here Technologies
Published By: F5     Published Date: May 12, 2016
This white paper examines what CIOs have to consider when embarking on their hybrid cloud journey.
Tags : 
hybrid cloud, cloud, cloud computing, public cloud, hybrid
    
F5
Published By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : 
application protection, app protection, security, cloud, cloud computing, public cloud, security application
    
F5
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: Microsoft     Published Date: Mar 31, 2017
Visual Studio 2015 hilft Ihnen dabei, großartige Ideen in großartige Geschäftsanwendungen zu verwandeln. Mit unserer flexiblen Cloudplattform und den für Unternehmen konzipierten DevOps-Tools können Sie nun noch einfacher skalierbare, hochmoderne Geschäftsanwendungen für jede beliebige Plattform (Web, mobile Geräte, Cloud oder lokal) entwickeln. Erstellen Sie mit der leistungsstarken Entwicklungsumgebung von Visual Studio beeindruckende Apps für Windows, Android, iOS und das Web. Arbeiten Sie über die Cloud zusammen – mit Versionskontrolle, Agilität, Continuous Delivery und App-Analysen sowie mit jeder beliebigen Programmiersprache und für jede beliebige Plattform.
Tags : 
mobile applications, mobile apps, ios, .net, devops, android
    
Microsoft
Published By: Infor     Published Date: Mar 07, 2017
En 2015, la mayoría de los fabricantes obtuvieron unos modestos niveles de rentabilidad debido a los bajos precios de los productos básicos y a la inflación salarial. Este entorno dio lugar a que se empezara a considerar el rol que las nuevas tecnologías ”disruptivas” podrían tener en las empresas manufactureras y posibles estrategias de inversión.
Tags : 
software, manufacturing software
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
Como responsable de ventas y operaciones, usted tiene importantes responsabilidades, tales como establecer prioridades, planificar e implementar estrategias de la cadena de suministro, impulsar mejoras y, al mismo tiempo, adaptarse rápidamente a los requisitos cambiantes del mercado y de los clientes, y ajustar esos cambios en la demanda y en la oferta, y todo sin olvidar los resultados financieros.
Tags : 
    
Infor
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top