developers

Results 226 - 250 of 289Sort Results By: Published Date | Title | Company Name
Published By: Localytics     Published Date: Jul 18, 2014
This 28-page ebook gives app developers & marketers the best practices, use cases and how-to steps required to boost user engagement and personalize app experience.
Tags : 
in-app messaging, push messaging, messaging best practices, in-app marketing, push marketing, user analysis, app personalization, personalize app
    
Localytics
Published By: Salesforce.com     Published Date: Jun 14, 2013
This report, which is the vision report of the mobile app development playbook for application development and delivery (AD&D) professionals, focuses on the changes application developers need to understand if they want to build modern applications that deliver contextual customer experiences.
Tags : 
mobile applications, application development, contextual experience, customers, technology, multi service endpoints, modernization
    
Salesforce.com
Published By: Riverbed     Published Date: Sep 05, 2014
Applications in today's distributed, cloud-based IT environment need to perform at their peak at all times. Unfortunately, most do not. And while many developers and IT professionals have Application Performance Management (APM) solutions, they often don't know how to take full advantage of the benefits. This SlashGuide gives IT professionals and developers practical advice they need to get the most out of APM.
Tags : 
apm, application, management, solutions, cloud, benefits, advice
    
Riverbed
Published By: Stackify     Published Date: Nov 19, 2014
Have you ever had to work with your log files once your application left development? If so, you quickly run into a few pain points. Learn how to create a “culture of logging” and work smarter, not harder.
Tags : 
log management, developer tools, error tracking, log analytics, stackify, application support, debugging tools, software logging
    
Stackify
Published By: IBM     Published Date: Oct 22, 2013
Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change.
Tags : 
ibm, integration testing, optimize test efficiency, incremental integration, employ test virtualization, system-level testing, asset sharing, effective data management
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This whitepaper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
ibm, rational, integration, integration testing, incremental integration, testing, virtulization, data management
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
Published By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : 
ibm, bluemix, cloud-computing, middleware
    
IBM
Published By: IBM     Published Date: Jan 26, 2015
IBM Bluemix, a robust platform as a service (PaaS) to host and deploy your app, also provides a wide range of enterprise grade tools that can be used in your applications to run your business needs. The Analytics Warehouse Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence (BI) and analytics tasks. Check out this upcoming webcast to learn how you can create a ready-to-use BI and analytics service on Bluemix, in just a few clicks, and even access those results on an Android app.
Tags : 
analytics service, open cloud platform, ibm, web developers, mobile developers, business integration
    
IBM
Published By: IBM     Published Date: Jan 30, 2015
IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment. This session provides an overview of IBM Bluemix capabilities.
Tags : 
paas, ibm, infrastructure solutions, middleware challenges
    
IBM
Published By: IBM     Published Date: Feb 03, 2015
A recent survey conducted by Slashdot Media asked mobile developers four key questions that look into the most pressing challenges they face today, how their development approach is changing, which mobile platforms are taking the forefront in the coming years, and how they are ensuring that their apps will meet the quality standards that users demand. Here are the results of the survey.
Tags : 
mobile development, enterprise challenges, application quality standards, mobile apps, internal business apps
    
IBM
Published By: IBM     Published Date: Feb 03, 2015
This SlashGuide discusses the results of a recent Slashdot Media survey that looks at the challenges facing developers today, how the primary development target is evolving, and how strategies are changing to embrace public, private, and hybrid-Cloud models. Respondents to the survey were asked four questions regarding their challenges in development and their needs regarding infrastructure and PaaS. Here are the results.
Tags : 
hybrid cloud targets, multiple mobile platforms, slashdot media, primary development targeting
    
IBM
Published By: Symantec     Published Date: Nov 30, 2015
By code signing software, developers can ensure the integrity of their application, protect their intellectual property and brand image and help combat malware.
Tags : 
    
Symantec
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
symantec, mobile, mobile applications, security
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
android, malware, android apps, secure code signing, symantec
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software, developer, apps
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
security, malware, code signing, software, downloads
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
security, software, mobile, mobile application, malware, code signing
    
Symantec Corporation
Published By: Symantec     Published Date: Dec 04, 2014
This white paper explains why PKI is the key to the future of trust on the Internet; what steps must be taken to build a stronger, more trustworthy PKI ecosystem.
Tags : 
pki, pki ecosystem, browser developers, internet security, security, symantec
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.