Code Download DefinitionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Download Definition returned the following results.
RSS What is RSS?
Related Categories

 •   Automated Security Auditing/ Source Code Analysis
 •   Testing and Analysis
 •   Application Lifecycle Management(ALM)
 •   Software Configuration Management (SCM)
 •   Security Monitoring
 •   Automated Software Quality (ASQ)
 •   Application Management and Maintenance
 •   Application Security
 •   Security Policies
 •   Project Management Solutions

Related Searches
 •   Backups Code Download Definition
 •   Chart Code
 •   Code Disk
 •   Code Download Compliance
 •   Code Download Definition Solution
 •   Code Download Distribution
 •   Code Download Report
 •   Code Expense
 •   Code Reservation
 •   Starting Code Download Definition
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Rational Requirements Composer by IBM

September 11, 2009 - (Free Research)
Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle. 
(TRIAL SOFTWARE) READ ABSTRACT |

DevOps definition: Best explained by what it's not by CA Technologies.

September 18, 2013 - (Free Research)
Much has been written about what DevOps is, but in this tip guide, explore how software professionals describe DeOps by what it is not. 
(EGUIDE) READ ABSTRACT |

System Grounding and Ground Fault Protection for Data Centers by Square D Critical Power Competency Center

November 2008 - (Free Research)
This paper presents the fundamentals of power system grounding, definitions and requirements of the National Electrical Code with respect to grounding, the need for low voltage ground fault protection and how it is implemented. 
(WHITE PAPER) READ ABSTRACT |

IBM Rational Team Concert Express-C Edition - FREE for up to 10 developers . Download Now! by IBM

November 2010 - (Free Research)
Rational Team Concert enables Agile development teams to track work items, control source code, create and manage defects, and manage the lifecycle of software projects. Download now and get RTC-Express-C free for up to 10 developers or get your hands dirty in our live sandbox with no download required. 
(DOWNLOAD) READ ABSTRACT |

JIRA 4.1.2 by Atlassian

August 2010 - (Free Research)
IT Problem: JIRA provides issue tracking and project tracking for software development teams to improve code quality and the speed of development. Combining a clean interface for organising issues with customisable workflows, JIRA is the perfect fit for your team. 
(DOWNLOAD)

Mobile banking strategies - maximise your revenues by ComputerWeekly.com

December 2010 - (Free Research)
Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”. 
(WHITE PAPER) READ ABSTRACT |

A Computer Weekly buyer's guide to testing and code quality by ComputerWeekly.com

May 2014 - (Free Research)
Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

AppDynamics Lite by AppDynamics

July 2010 - (Free Research)
AppDynamics Lite troubleshoots java performance problems in production environments. It organizes an application into business transactions, helping identify slow, stalled, and failed transactions. The application is free. Download now. 
(TRIAL SOFTWARE) READ ABSTRACT |

Multi-Layer Security Platforms: The New Definition of Best of Breed by Fortinet, Inc.

June 2006 - (Free Research)
Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution. 
(WHITE PAPER) READ ABSTRACT |

Cybercrime and warfare: All that matters by ComputerWeekly.com

December 2013 - (Free Research)
Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters. 
(BOOK) READ ABSTRACT |

Case Study: Modernize Your Requirements Management Practice by HP Software

July 2011 - (Free Research)
View this webcast to how Novartis, a global health care company, improved requirements management in their SAP environment to provide more complete traceability, ensuring that they developed against their requirements and successfully tested them. 
(WEBCAST) READ ABSTRACT |

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations by Websense, Inc.

September 2011 - (Free Research)
Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Download Acronis Backup & Recovery 11.5 to Protect Your Windows Servers by Acronis

February 2014 - (Free Research)
Download Acronis Backup & Recovery 11.5 now to protect your Windows Servers. 
(DOWNLOAD) READ ABSTRACT |

Docmosis V2.0 by Docmosis

June 2009 - (Free Research)
Generating reports from Java applications has traditionally been a difficult task with heavy coding effort in development and maintenance. Even where graphical tools are provided, users must learn how to use a new and sometimes cumbersome tool. 
(TRIAL SOFTWARE)

Embarcadero® DB Optimizer™ by Embarcadero Technologies, Inc.

May 2009 - (Free Research)
Poor performing SQL code is costly in terms of dollars and customer satisfaction. Discovering performance bottlenecks once they're in production is costly. 
(TRIAL SOFTWARE) READ ABSTRACT |

Safety Analysis Using UML by IBM

December 2010 - (Free Research)
This paper discusses the use of the fault tree analysis (FTA) approach to safety analysis and the use of the UML® profiling mechanism to create a safety analysis profile, including the definition of its normative metamodel. 
(WHITE PAPER) READ ABSTRACT |

Overview Of Near Field Communication by ComputerWeekly.com

August 2013 - (Free Research)
This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers. 
(BOOK) READ ABSTRACT |

iOS 6 Foundations by ComputerWeekly.com

July 2013 - (Free Research)
Jesse Feiler, author of iOS 6 Foundations, introduces basic programming techniques for Apple's iPhone and iPad operating system. 
(BOOK) READ ABSTRACT |

Windows 8 Secrets by ComputerWeekly.com

June 2013 - (Free Research)
Download a step by step guide to installing Windows 8 from the book Windows 8 Secrets and receive a 30% discount on the full book. 
(BOOK) READ ABSTRACT |

Download Now: Acronis Backup & Recovery 11.5 – Virtual Edition for Hyper-V by Acronis

February 2014 - (Free Research)
Download Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V so you can rest easy knowing your data and Hyper-V environment are well protected. 
(DOWNLOAD) READ ABSTRACT |

E-Guide: Virtual Tape Libraries and Data Deduplication in Enterprise Storage Today by Fujitsu America, Inc.

December 2010 - (Free Research)
Download this guide to learn more about the solutions surrounding virtual tape libraries and data deduplication in today’s enterprise storage environments. 
(EGUIDE) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

BI: The Inconvenient Truth by Kalido

June 2008 - (Free Research)
What’s the truth behind the failure of many BI projects? Read this paper to learn the main factors leading to disappointment. These pitfalls are not those of new entrants to BI but have been repeated by smart and well managed companies worldwide. 
(WHITE PAPER) READ ABSTRACT |

ManageEngine OpManager 8.5 by ManageEngine

July 2010 - (Free Research)
OpManager helps IT admins quickly identify & resolve network performance problems using built-in troubleshooting tools and provides a single console for monitoring servers (physical & virtual), applications, network devices, bandwidth, WAN links, VoIP etc. 
(TRIAL SOFTWARE) READ ABSTRACT |

Manufacturing IT Best Practices: Business Intelligence by SearchManufacturingERP

April 2012 - (Free Research)
In this e-book experienced technology writer, Lauren Gibbsons Paul shares her insight on utilizing BI in the manufacturing field. 
(EBOOK)

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts