Code Buy DefiningWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Buy Defining returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Enterprise Systems Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Network Security
 •   Enterprise Information Integration/ Metadata Management
 •   Business Process Management (BPM)

Related Searches
 •   Applications Of Code Buy Defining
 •   Calendar Code Buy
 •   Code Buy Attendance
 •   Code Buy Calendar
 •   Code Buy Defining Fact
 •   Code Buy Defining Maintenance
 •   Code Buy Defining Requirements
 •   Decision Code Buy
 •   Quality Code Buy
 •   Specialists Code Buy
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 27, 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 19 November 2013: Software-defined networking explodes by SearchSecurity.com

November 18, 2013 - (Free Research)
In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now. 
(EZINE) READ ABSTRACT |

Technology industry at the cross-roads: Transforming quote-to-cash operations by ComputerWeekly.com

March 06, 2013 - (Free Research)
This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Technology industry at the cross-roads: Transforming quote-to-cash operations by ComputerWeekly.com

March 05, 2013 - (Free Research)
This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Business Analytics Buying Criteria: The Three Maxims by IBM

August 07, 2012 - (Free Research)
When evaluating business analytics systems, IT leaders must consider the performance and scalability requirements of the underlying infrastructure. This paper examines the types of business analytics software available, highlights the analytical workload demands, and buying criteria to consider for various types of business analytics software. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 28, 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Dimensional Excellence - Build it or Buy it? by Oracle Corporation

August 02, 2010 - (Free Research)
The true total cost of ownership favors the adoption of a proven, configurable, best-of-breed tool for which the costs and implementation timescales are predictable, and through which risks are minimized. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 13, 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Success with Static Analysis for Security: Why Code Audits Fail by Parasoft Corporation

April 01, 2009 - (Free Research)
This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity. 
(WHITE PAPER) READ ABSTRACT |

Comcast’s cable advertising division empowers their 1,500 associate sales force with an Alteryx intranet market analysis and advertising and support application by Alteryx, Inc.

January 11, 2011 - (Free Research)
Comcast Spotlight wanted all of its sales professionals to have immediate access to user-defined market analyses, without having to involve a trained research analyst. Alteryx designed a web-based solution, SpotKnowledge, which enabled increased functionality, accuracy, and faster turn-around times on analysis and reporting. 
(CASE STUDY) READ ABSTRACT |

Worst Practices in SOA Implementation: Why Service-Oriented Architectures Fail by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
Service-oriented architecture (SOA) enables different programs, applications, and tools to interact via self-contained services that do not depend on the context or state of the other service. This white paper provides insight into the top-four worst practices for SOA integration, and how to avoid and/or overcome these worst practices. 
(WHITE PAPER) READ ABSTRACT |

Lightning Fast Recovery to and from the Cloud by Vision Solutions

December 2011 - (Free Research)
The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective and Recovery Point Objective. These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

September Information Security Magazine by SearchSecurity.com

August 2013 - (Free Research)
Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come. 
(EZINE) READ ABSTRACT |

eBook: Embracing SaaS for Smarter Commerce: A Blueprint for IT Success by IBM

October 2013 - (Free Research)
This E-book outlines compelling approaches for CIOs and other IT leaders to establish and lead a defined software-as-a-service (SaaS) strategy for their companies in order to meet line-of-business (LOB) needs for innovation and agility. 
(EBOOK) READ ABSTRACT |

Workload-Optimized Systems For Superior Business Value by IBM

February 2012 - (Free Research)
This brief white paper examines why making the right server choices can help solve many challenges. It contrasts x86 multi-cores with Power Systems and mainframes. Read on to learn how making the right server choices can help an enterprise realize greater ROI while also helping extracting greater business value from the servers that it buys. 
(WHITE PAPER) READ ABSTRACT |

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets by McCabe Software, Inc.

April 2012 - (Free Research)
<p>Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.</p> 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

Sales: Maximize Profitability, Improve Performance, and Deliver Customer Value by SAP America, Inc.

September 2010 - (Free Research)
This paper explains how the SAP CRM application equips your sales professionals with the tools and information they need to plan, execute, and analyze sales operations throughout the sales cycle. Continue reading to learn how to maximize profitability, improve performance, and deliver customer value with SAP CRM. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Common Models in SOA: Tackling the Data Integration Problem by Progress

December 2008 - (Free Research)
You're probably familiar with the use of common formats in integration. These common representations, or in some cases mutually agreed upon formats, are often found in B2B transactions. To see how a common model can simplify SOA development, let's examine the standards at the foundation of SOA and ESB to understand what they include and... 
(WHITE PAPER) READ ABSTRACT |

Sybase CEP Implementation Methodology for Continuous Intelligence by Sybase, an SAP company

October 2010 - (Free Research)
This paper discusses the Sybase CEP Implementation Methodology, which offers analytic developers a set of best practices for implementing Continuous Intelligence using Complex Event Processing. Sybase CEP provides a structured yet flexible approach to rapidly build Continuous Intelligence projects and deliver more analytic modules over time. 
(WHITE PAPER) READ ABSTRACT |

How To Use Open Source Safely In The Enterprise by FuseSource

October 2010 - (Free Research)
Deploying open source projects safely and successfully in an enterprise environment requires thorough understanding and careful evaluation of each project. Read this paper to learn about the benefits, defining characteristics, and requirements for enterprise use of open source software technology. 
(WHITE PAPER) READ ABSTRACT |

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

Software testing: why it needs a new professionalism by ComputerWeekly.com

January 2011 - (Free Research)
We believe that Testing is at a key juncture in its development as a Profession. The demonstrable consequences of this approach are now very clear  - hidden, often major, costs in the  development  lifecycle of code arising both from the costs of fixing defects, and from the costs of managing change late in the lifecycle. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts