Code Latest Research ListWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Latest Research List returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Application Security
 •   Data Center Management
 •   Business Process Management (BPM)
 •   Mobile Device Management
 •   Business Intelligence Solutions
 •   Vulnerability Assessment
 •   Wireless Technologies and Mobile Computing
 •   Network Security

Related Searches
 •   Code Latest Pennsylvania
 •   Code Latest Research Marketing
 •   Code Latest Research Profile
 •   Code Latest Research Risks
 •   Code Ohio
 •   Cycles Code Latest Research
 •   Linux-Based Code
 •   Metrics Code Latest Research
 •   Order Code Latest Research
 •   Web Casts Code
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Realizing Rapid ROI Through Mobility by BlackBerry

February 18, 2010 - (Free Research)
Companies are reaping the benefits from mobile CRM, field service and sales force automation processes with the latest Research In Motion (RIM) offerings. Read this white paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Keep Your Enemies Closer - Get Proactive about Security by AT&T Corp

March 01, 2011 - (Free Research)
Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance. 
(WEBCAST)

Data Management & Architecture by Accenture

Accenture's Data Management & Architecture group addresses how an organization manages data across its entire lifecycle. 
(SOFTWARE PRODUCT)

Building a World-Class Supply Chain – New Insights from Chemical & Petroleum Producers by IBM

February 22, 2011 - (Free Research)
Learn what leading companies do differently to outperform their peers. From strategy decisions to investment in information technology and performance measurement systems, MPI’s latest research explains how your company can realize tangible returns though greater flexibility and improved delivery performance. 
(WHITE PAPER) READ ABSTRACT |

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments by Trend Micro

May 28, 2014 - (Free Research)
Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity. 
(WEBCAST) READ ABSTRACT |

How White Papers Can Boost Your Lead Gen Campaigns by KnowledgeStorm Webinars (E-mail this company)

October 2006 - (Free Research)
In this presentation document, white paper guru Michael Stelzner, author of "Writing White Papers: How to Capture Readers and Keep Them Engaged," will share his secrets on creating effective white papers that attract prospects in droves. 
(ANALYST REPORT) READ ABSTRACT |

How White Papers Can Turbo-Boost Your Lead Gen Campaigns by KnowledgeStorm Webinars (E-mail this company)

September 2006 - (Free Research)
In this upcoming Webcast, "How White Papers Can Turbo-Boost Your Lead Gen Campaigns", white paper guru Michael Stelzner, author of "Writing White Papers: How to Capture Readers and Keep Them Engaged," will share his secrets on creating white papers that attract prospects in droves. This Webcast is presented by KnowledgeStorm. 
(WEBCAST) READ ABSTRACT |

Five Best Practices to Protect Your Virtual Environment by Juniper Networks, Inc.

September 2011 - (Free Research)
This paper lays out five "best practice" ways to fortify your planned or existing virtualized environment, ensuring that it is architected for security, malware suppression, and regulation compliance. 
(WHITE PAPER) READ ABSTRACT |

Accenture CIO Survey: Cultivating High Performance Through Information Management by Accenture

June 2008 - (Free Research)
Accenture surveyed 162 CIOs in North America and Europe about their IT investments and plans, with a focus on information management strategies and technologies. 
(WHITE PAPER) READ ABSTRACT |

Private vs. Hybrid Cloud Adoption: Expert Comparison and Analyst Key Findings by NetApp

November 2013 - (Free Research)
This expert e-guide cites key cloud findings from a recent Gartner report and explains why costs are not the only factor to consider when evaluating these types of services. Read on to learn how to lay a technology foundation that offers room for expansion and read about one company's success story using a hybrid cloud. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Developing for the Future - The New Trend for Hosted VXML by West Interactive

July 2010 - (Free Research)
By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This transcript will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Developing for the Future - The New Trend for Hosted VXML by West Interactive

June 2010 - (Free Research)
By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This webinar will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML. 
(WEBCAST) READ ABSTRACT |

Next Generation Datacentres: The Cloud by ComputerWeekly.com

April 2012 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey reveal the latest research on the deployment of cloud in the datacentre. 
(ANALYST REPORT) READ ABSTRACT |

E-Guide: Data Warehousing for Growing Data Volumes by Dell and Microsoft

June 2012 - (Free Research)
With an influx of big data flooding businesses everywhere, the data warehousing landscape is changing rapidly. To learn more about the latest trends and advances in the big data management and data warehousing market, as well as steps you should take before investing in new technologies, review this expert e-guide now. 
(EGUIDE) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Niksun NetDetectorLIVE Data Sheet by NIKSUN

NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks. 
(HARDWARE PRODUCT)

Sharepoint E-Zine Volume 6: How to Control Workflow Behavior with Custom Lists by SearchWinIT

January 2009 - (Free Research)
Learn how to integrate change management into a document library using SharePoint's own framework. 
(EZINE) READ ABSTRACT |

Agile ALM Trends In SCCS, Requirements Management by Hewlett-Packard Company

June 2012 - (Free Research)
Did you know that the latest innovations for source code control systems (SCCS) and requirements management tools can not only help you enable a more agile software development process but also reap better returns on your application lifecycle management (ALM) investments? Read this expert e-zine to learn more. 
(EZINE)

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

Empower your Developers by Coverity

May 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

New Research: How to Improve Your B2B Email Marketing Results in 2007 by KnowledgeStorm Webinars (E-mail this company)

January 2007 - (Free Research)
Find out how 3,637 marketers responded to tough questions about their open, click and conversion rates. Also, find out which tests work best, what's not working, list growth strategies and how email budgets are changing for 2007. Invite your entire team to attend – attendance for this Webcast is free! 
(WEBCAST) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Storage Budget Picture Brightens by IBM

December 2012 - (Free Research)
This expert E-Guide provides a thorough analysis of the latest statistics concerning storage spending and use of technologies including SSD, cloud computing, archiving, and more. Read now to find out which storage efficiency tools are gaining the most traction and discover the top products your peers are putting on their wish lists. 
(EGUIDE) READ ABSTRACT |

Master Data Management Projects in Practice - An Information Difference Research Study by Talend

December 2009 - (Free Research)
Organizations are often turning to Master Data Management as a key enabler in improving the timeliness, quality and reliability of BI with the ultimate goal of improving business performance. This survey report presents recommendations on the "do and don't" of MDM as well as some findings on the use of open source and manual coding in MDM projects. 
(WHITE PAPER) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts