Code Business ResearchWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Business Research returned the following results.
RSS What is RSS?
Related Categories

 •   Automated Security Auditing/ Source Code Analysis
 •   Application Security
 •   Source Code Control
 •   Testing and Analysis
 •   Automated Software Quality (ASQ)
 •   Vulnerability Assessment
 •   Intrusion Prevention Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Open Source

Related Searches
 •   Capacity Code Business
 •   Code Business Development
 •   Code Business Research Reviews
 •   Code Business Research Vendors
 •   Code Conversion
 •   Code Desktops
 •   Import Code
 •   Market Code Business
 •   Procedures Code Business
 •   Sql Code Business Research
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Desktops: Corporate IT Buying Behavior & Customer Satisfaction Survey by Dell, Inc. and Intel®

June 03, 2009 - (Free Research)
This Technology Business Research (TBR) study examines the results of the corporate desktop satisfaction competition for Q1 of 2009, for which Dell ranked in the top position. Read this to learn about each brand's competitive strengths, weaknesses, challenges, and overall satisfaction rankings. 
(ANALYST REPORT) READ ABSTRACT |

Semantic Integration & The Data Life Cycle by Progress

November 23, 2011 - (Free Research)
Read this paper to discover an alternative approach to data integration that ensures that not only is data correct and valid based on your business rules, but more importantly provides the means to fully operationalize those rules in a manner that is both intelligible to business and agile across all segments of the change lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Master Data Management Projects in Practice - An Information Difference Research Study by Talend

December 01, 2009 - (Free Research)
Organizations are often turning to Master Data Management as a key enabler in improving the timeliness, quality and reliability of BI with the ultimate goal of improving business performance. This survey report presents recommendations on the "do and don't" of MDM as well as some findings on the use of open source and manual coding in MDM projects. 
(WHITE PAPER) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 27, 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps by Red Hat

March 31, 2014 - (Free Research)
In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues. 
(WHITE PAPER) READ ABSTRACT |

SAP® Support of the Healthecare Supply Chain's Ongoing Effort to Ensure Patient Safety and Drive Business Value by SAP AG

June 02, 2009 - (Free Research)
The Center for Healthcare Supply Chain Research (formerly the HDMA Research & Education Foundation) recently published an important study concerning data management and data sharing in the healthcare supply chain. This whitepaper discusses the key conclusions of their study. 
(WHITE PAPER) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 10, 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

Lowering the Cost of Test with Integrated Switch Management by National Instruments

February 01, 2002 - (Free Research)
National Instruments Switch Executive is a significant innovation in the design and implementation of automated test systems. 
(WHITE PAPER)

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Malware: Osterman Research by Sunbelt Software

September 2008 - (Free Research)
This paper addresses the variety of issues organizations face in context of their security challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities. 
(WHITE PAPER) READ ABSTRACT |

Close Encounters of the Third Kind by IBM

March 2011 - (Free Research)
This paper presents results of research performed by IBM into client-side JavaScript vulnerabilities using a JavaScript Security Analyzer (JSA), which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process. 
(WHITE PAPER) READ ABSTRACT |

Shutting the Door on Data Theft by Websense, Inc.

September 2011 - (Free Research)
Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you. 
(WEBCAST) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

November 2010 - (Free Research)
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time. 
(WEBCAST) READ ABSTRACT |

Magic Quadrant for Static Application Security Testing by Veracode, Inc.

February 2011 - (Free Research)
In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Frost & Sullivan – 2013 Global VC Technology Leadership Award by Vidyo, Inc.

December 2012 - (Free Research)
This Frost & Sullivan research paper details why Vidyo was awarded their Technology Leadership award in the videoconferencing market and how the solution meets today's top VC benchmarks. 
(WHITE PAPER) READ ABSTRACT |

The Role of Open Source Data Integration - An Analyst White Paper, by Mark Madsen by Talend

January 2009 - (Free Research)
This report by Mark Madsen will explain what data integration is, and especially the difference between Operational Data Integration and Analytic Data Integration. It highlights the benefits of open source for data integration, and provides a series of recommendations to make the integration job easier, repeatable and more productive. 
(ANALYST REPORT) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

2011 Second Annual Ponemon Cost of Cybercrime Study by ArcSight, an HP Company

August 2011 - (Free Research)
This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organization determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(ANALYST REPORT) READ ABSTRACT |

Second 'Annual Cost of Cyber Crime' Study by ArcSight, an HP Company

August 2011 - (Free Research)
This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(ANALYST REPORT) READ ABSTRACT |

Enterprise Security Architecture by ComputerWeekly.com

March 2013 - (Free Research)
Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young offers advice to security leaders on developing a robust Enterprise Security Architecture. 
(PRESENTATION) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Code Signing: Leveraging HSMs to Safeguard Trust and Protect Your Business by SafeNet, Inc.

February 2014 - (Free Research)
This white paper explains how code signing works and why you need to add it to your online distribution security strategy. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts