Code Big IPWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Big IP returned the following results.
RSS What is RSS?
Related Categories

 •   Network Management
 •   Data Security
 •   Networks
 •   Network Security
 •   Virtualization
 •   Application Management and Maintenance
 •   Enterprise Systems Management
 •   Endpoint Security
 •   Unified Communications / Voice & Data Convergence
 •   Business Intelligence Solutions

Related Searches
 •   Code Analyst
 •   Code Big Features
 •   Code Big IP Capture
 •   Code Big IP Decisions
 •   Code Big IP Schedules
 •   Function Code
 •   Market Code Big
 •   Net Code
 •   Reporting Code Big
 •   Request Code Big IP
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Achieving a Higher Level of Business and Network Adaptability with Unified Application Infrastructure Services by F5 Networks

December 2004 - (Free Research)
Although F5's BIG-IP traffic management solutions brings numerous features and benefits to an organization, the goal of this paper is to explore a more fundamental business problem plaguing today's organizations - and how BIG-IP solves it. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

Understanding Avaya IP Office Short Codes by Global Knowledge

May 2013 - (Free Research)
This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Local Traffic Manager by F5 Networks

The BIG-IP® Local Traffic Manager is an application delivery networking system that provides the most intelligent and adaptable solution to secure, optimize, and deliver applications, enabling organizations to effectively and competitively run their business 
(HARDWARE PRODUCT)

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007 by F5 Networks

November 2007 - (Free Research)
One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 25 March 2014: Get kids coding by ComputerWeekly.com

March 2014 - (Free Research)
In this week's Computer Weekly, we examine the latest moves to encourage children to learn to code, to help avoid future skills shortages. Facebook's Open Compute Project is bringing open source to the datacentre – we look at what it means for IT. And we profile Salesforce.com as the SaaS firm celebrates its 15th birthday. Read the issue now. 
(EZINE) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Best Kept Secrets of Peer Code Review: Modern Approach Practical Advice by SmartBear Software

August 2012 - (Free Research)
This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier. 
(EBOOK) READ ABSTRACT |

Building the Next Generation Network Bridge: From Today's Network to the Future by F5 Networks

September 2008 - (Free Research)
The challenges facing SPs today are not so different from the ones enterprise organizations have faced for years when dealing with IP-based application delivery. This paper discusses how they face these challenges. 
(WHITE PAPER) READ ABSTRACT |

Modern Malware Threats and Countermeasures by Sunbelt Software

November 2008 - (Free Research)
Many of the early mass-infection events were highly publicized and very obvious events to the user, modern malware is usually designed to be much more subtle in its behaviors. learn about the newest methods and practices hackers are using. 
(WHITE PAPER) READ ABSTRACT |

More Scale at Lower Cost with Scalable Video Coding by Polycom, Inc.

October 2011 - (Free Research)
The demand for personal video for organizational communication is growing rapidly. By 2015, over 200 million workers globally will run corporate-supplied video conferencing from their desktops. 
(WHITE PAPER) READ ABSTRACT |

How to Make Magic with VoIP: Weighing the Options by Cisco Systems, Inc.

January 2011 - (Free Research)
VoIP with UC can transform a business across four dimensions: lower costs, higher productivity, better customer service, and higher revenues. It can make a small business appear big, and help it outperform larger competitors. There are several ways to implement VoIP. Read this paper to determine which way is best for your business. 
(WHITE PAPER) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Unified Application Delivery by F5 Networks

December 2009 - (Free Research)
By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Data scientists helping businesses navigate ‘big data’ seas by Sybase, an SAP company

February 2012 - (Free Research)
Data scientists are adept at a combination of analytical, statistical, machine-learning, coding and quantitative skills, with the desire and willingness to explore voluminous amounts of data. Check out this expert tip guide from SearchBusinessAnalytics.com to learn how a data scientist can help your business navigate the big data landscape. 
(EGUIDE) READ ABSTRACT |

AGL Resources Relies on F5 Products for Application Traffic Management, Link Load Balancing and Secure Remote Access by F5 Networks, Inc.

December 2004 - (Free Research)
AGL Resources, an Atlanta-based energy services holding company, relies on four different F5 products to support their growing infrastructure investments and to improve their ROI. 
(CASE STUDY) READ ABSTRACT |

IP Networking and Its Impact on Video Surveillance by NETGEAR Inc.

October 2010 - (Free Research)
Video surveillance is critical for business. Different organizations use video surveillance to protect people’s safety, protect valuable assets, or minimize risks associated with criminal activity. One of the biggest trends in surveillance is the accelerating shift to IP from analog. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

MS Learning & Consulting Cuts Redeployment Time by ZeroTurnaround

December 2013 - (Free Research)
In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management. 
(CASE STUDY) READ ABSTRACT |

Unified Access and Optimization with F5 BIG-IP Edge Gateway by F5 Networks

November 2013 - (Free Research)
This exclusive paper examines a gateway solution that integrates security, availability, and application acceleration services to enable context-aware networking, providing the unified access that today's mobile users need while keeping mobile data secure. 
(WHITE PAPER) READ ABSTRACT |

Evolving APM: Big Data Approach, Integrated End-user Experience Monitoring Bring Deep End-to-end Application visibility by Riverbed Technology, Inc.

January 2014 - (Free Research)
This whitepaper examines a solution that leverages existing big data capabilities, integrates end-user experience monitoring and uses integrated development environment tools to maintain deep end-to-end application visibility. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Local Traffic Manager Datasheet by F5 Networks

November 2013 - (Free Research)
This exclusive paper examines a traffic manager tool that can help you deliver your applications to users in a reliable and secure fashion, providing the extensibility and flexibility of an intelligent services framework and the programmability you need to manage a diverse infrastructure. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP SDN Services Help Build Your Cloud Architecture by F5 Networks

November 2013 - (Free Research)
This informative paper discusses a set of software-defined networking (SDN) solutions that can simplify your transition to a cloud network architecture by providing network virtualization to consistently deliver application delivery services across your IT environment. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution by F5 Networks

August 2013 - (Free Research)
This informative resource discusses a solution that can control access, implement challenge/response and anomaly detection engines, and apply the ability to understand application behavior to defend against malicious connections to keep attackers from overwhelming applications. 
(WHITE PAPER) READ ABSTRACT |

Application Security in the Cloud with BIG-IP ASM by F5 Networks

August 2012 - (Free Research)
Access this white paper to discover a high-performance web application firewall that provides a strategic point of control within the infrastructure from which enterprises can adapt to changing conditions. Learn how your organization can benefit from this cloud-ready solution, offering cloud security for virtualized applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts