<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / it</title>
<link>http://netvouz.com/lillymark/tag/it?feed=rss&amp;pg=18</link>
<description>lillymark&#39;s bookmarks tagged &quot;it&quot; on Netvouz</description>
<item><title>How to Survive an OCR Investigation</title>
<link>http://www.egestalt.com/blog/2011/10/15/how-to-survive-an-ocr-investigation/</link>
<description>Does the term ‘OCR Investigation’ send shivers down your spine? Well, if so, you’re definitely not alone. Every healthcare entity today faces multiple challenges with regard to information security and compliance. Incidents of data breach have become more frequent with increased use of mobile devices like laptops, smart phones, and portable storage devices like USB drives.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 12 Jul 2012 10:20:51 GMT</pubDate>
</item><item><title>How to Survive an OCR Investigation</title>
<link>http://www.egestalt.com/blog/2011/10/15/how-to-survive-an-ocr-investigation/</link>
<description>Does the term ‘OCR Investigation’ send shivers down your spine? Well, if so, you’re definitely not alone. Every healthcare entity today faces multiple challenges with regard to information security and compliance. Incidents of data breach have become more frequent with increased use of mobile devices like laptops, smart phones, and portable storage devices like USB drives.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 12 Jul 2012 10:23:30 GMT</pubDate>
</item><item><title>Hybrid apps are the future of mobile</title>
<link>http://www.estuate.com/estuate-blog/112-custom-applications/567-hybrid-apps-are-the-future-of-mobile</link>
<description>The proliferation of the bring-your-own-device trend means many IT departments have to consider a wide range of platforms when developing applications and determining which employee devices to support. However, enterprise mobility is about more than just BYOD, and company-provisioned models are becoming increasingly diverse to meet new business demands.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 15 Jul 2014 04:11:13 GMT</pubDate>
</item><item><title>IBM Pulse 2013: Emphasis on communication</title>
<link>http://www.estuate.com/estuate-blog/111-software-management/525-ibm-pulse-2013-emphasis-on-communication</link>
<description>Many modern application development paradigms have emerged in an effort to improve quality while streamlining processes. At IBM Pulse 2013, the company highlighted the value of DevOps and called for a more comprehensive implementation of the framework.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 04 Mar 2014 04:15:29 GMT</pubDate>
</item><item><title>IEEE Computer Society Seeks Contributors for IT Guide</title>
<link>http://www.computer.org/portal/web/pressroom/IEEE-Computer-Society-Seeks-Contributors-for-IT-Guide</link>
<description>The IEEE Computer Society is accepting applications for contributing authors for the Guide to the Information Technology Body of Knowledge (ITBOK Guide).For more information, visit http://www.computer.org/portal/web/certification/ITBOK-Call.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 19 Mar 2013 11:24:52 GMT</pubDate>
</item><item><title>Implement End-to-End ALM SDLC</title>
<link>http://www.youtube.com/watch?v=A6zpChN5SqQ&amp;feature=plcp</link>
<description>This webinar is for those who think that a reasonable solution to this problem is impossible! Kovair&#39;s Omnibus Integration Platform can integrate a wide range of multi-vendor tools seamlessly and it is available today for any size of organization.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 12 Jun 2012 09:27:50 GMT</pubDate>
</item><item><title>Implement End-to-End ALM SDLC</title>
<link>http://www.youtube.com/watch?v=A6zpChN5SqQ</link>
<description>This webinar is for those who think that a reasonable solution to this problem is impossible! Kovair&#39;s Omnibus Integration Platform can integrate a wide range of multi-vendor tools seamlessly and it is available today for any size of organization</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 25 Apr 2014 04:48:19 GMT</pubDate>
</item><item><title>Implementing Help Desk Solutions</title>
<link>https://www.amazines.com/article_detail.cfm?articleid=5245749</link>
<description>Customer assistance, regardless of what your enterprise offers is what is crucial for consumer satisfaction. Quality consumer satisfaction leads to business and greater revenue generation and is a core element that makes an organization successful in today’s competitive market scenario.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 04 Jan 2013 07:51:19 GMT</pubDate>
</item><item><title>Implementing software security: Threat modeling</title>
<link>http://www.estuate.com/estuate-blog/111-software-management/571-implementing-software-security-threat-modeling</link>
<description>Software security has emerged as a prevalent concern in the application development industry, particularly for organizations deploying Web-connect software. However, all businesses could benefit from evaluating their processes and improving security. One method that can be employed to do this is threat modeling, a strategy that focuses on determining what type of attack is mostly likely to target a piece of software.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 22 Jul 2014 05:17:36 GMT</pubDate>
</item><item><title>Importance of Enhancing Your Security Posture</title>
<link>http://www.netmagicsolutions.com/blog/improve-IT-organizations-security#.U6kOGpSSyiw</link>
<description>Increasing cost and complexity of technology, proliferation of cyber crime, stringent nature of compliance and ever increasing sophistication of advanced threats are all leading to security to become extremely important for organizations to sit up and take notice, explains Rishikesh Kamat, Netmagic Solutions</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 07 Jul 2014 11:35:45 GMT</pubDate>
</item></channel></rss>