Code Learning AboutWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Learning About returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Data Security
 •   Virtualization
 •   Backup Systems and Services
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disaster Recovery
 •   Network Security
 •   Endpoint Security
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Code Expense
 •   Code Learning About Buys
 •   Code Learning About Orders
 •   Developments Code Learning About
 •   Forms Code Learning
 •   Guides Code Learning
 •   Operational Code Learning
 •   Planner Code Learning
 •   Pricing Code Learning About
 •   Video Code Learning About
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 19, 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 01, 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

SAP NetWeaver Business Process Management by SAP AG

September 15, 2011 - (Free Research)
Read this white paper for an overview of a new approach to BPM which allows you to quickly model and execute new business processes, without error-prone and time-consuming coding. Learn how this strategy drives business flexibility and speed by allowing the quick change or implementation of business processes. 
(WHITE PAPER) READ ABSTRACT |

How to Migrate CORBA Applications to Web Services by Rogue Wave Software

July 2008 - (Free Research)
This white paper discusses the steps necessary for migrating CORBA applications to Web services. Learn how to evolve existing applications without sacrificing business logic. 
(WHITE PAPER) READ ABSTRACT |

BTS Consultant Thought Leadership Paper: Business Case for Value Realization Business Case for Value Realization During Implementation by SAP America, Inc.

October 2010 - (Free Research)
Find out more about value management and building value realization practices into every IT project. Discover how using value realization best practices during the lifecycle of your implementation can help you achieve greater value from your IT investments. Learn about the value of ASAP methodology and SAP offerings. 
(WHITE PAPER) READ ABSTRACT |

Why Hackers have turned to Malicious JavaScript Attacks by Sophos, Inc.

April 2011 - (Free Research)
Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant. 
(WHITE PAPER) READ ABSTRACT |

Ten Mistakes to Avoid by SAS

April 2014 - (Free Research)
Access the following white paper to uncover the top 10 mistakes most organizations make when launching a data governance program. Learn about the common pain points, how to avoid them, and much more. 
(WHITE PAPER) READ ABSTRACT |

Profitably Improving Site Infrastructure Energy Efficiency by Upsite Technologies, Inc.

October 2008 - (Free Research)
Learn about the causes of energy overconsumption and how to improve your organization's overall energy efficiency, resulting in huge cost savings. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings by Trend Micro, Inc.

June 2011 - (Free Research)
3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection. 
(WHITE PAPER) READ ABSTRACT |

Developing a disaster recovery plan for virtual machines by Overland Storage

July 2009 - (Free Research)
Virtual machine (VM) disaster recovery (DR) is a multifaceted activity that fails over a VM from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery in this tutorial. 
(EBOOK) READ ABSTRACT |

ESG Backup and Recovery for Enterprise Applications in VMware Environments by EMC Backup and Recovery Solutions

June 2011 - (Free Research)
This ESG white paper confirms that momentum continues to build around server virtualization. Learn about an in-depth survey of 463 senior IT professionals in both large midmarket and enterprise-class organizations in North America and resulting trends. 
(WHITE PAPER) READ ABSTRACT |

Demystifying the scale up vs. scale out debate for data warehousing by SAP America, Inc.

December 2012 - (Free Research)
In this expert guide, IT analyst Tony Iams, SVP, Ideas International, delves deeper into the scale up vs. scale out debate. Learn about the growing popularity of scaling out options, such as massively parallel processing (MPP) and distributed computing approaches. 
(EGUIDE) READ ABSTRACT |

Top Five Obstacles Companies Face and How to Overcome Them by SAP America, Inc.

January 2012 - (Free Research)
This white paper addresses five obstacles that small businesses and midsized companies face. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Backup to the Future by EMC Backup and Recovery Solutions

May 2010 - (Free Research)
Join EMC's Shane Jackson, Senior Director of Product Marketing for EMC's Backup Recovery Systems division and Gaz Khan, Manager Data Protection Services, Global Systems of Transaction Network Services. They will provide some specific examples of how EMC backup and recovery solutions are at the forefront of next-generation data protection. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IDC: In the Enterprise Long Tail: Will IT Matter? by SAP America, Inc.

May 2007 - (Free Research)
Read how a firms key business and IT priorities and their experience with acquiring, implementing, and support of SAP solutions influences business. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It by Sophos, Inc.

February 2010 - (Free Research)
Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Consolidate and Simplify Backup and Recovery for Your VMware Environment by EMC Backup and Recovery Solutions

August 2008 - (Free Research)
In this webcast you will learn about this powerful solution, hear about specific deployments and the resulting benefits. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Consolidate and Simplify Backup and Recovery for Your VMware Environment by EMC Backup and Recovery Solutions

April 2009 - (Free Research)
In this presentation you will learn about this powerful solution, hear about specific deployments and the resulting benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) by Brocade

December 2011 - (Free Research)
As the transition from IPv4 to IPv6 occurs, the challenge of accommodating both protocols becomes a big challenge. Learn about four transition technologies, along with their advantages and disadvantages. 
(WHITE PAPER) READ ABSTRACT |

Virtual Fabrics Provide Administrative Flexibility in a Shared Storage Environment by Brocade

January 2009 - (Free Research)
Learn about a technology that enables you to better manage your SAN assets by creating logical groups of separately managed devices, ports, and switches within your SAN - all without disrupting existing environments. 
(WHITE PAPER) READ ABSTRACT |

Jason Nolet Details New Solutions for Enterprise by Brocade

October 2011 - (Free Research)
This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements. 
(VIDEO)

Re-architecting the Data Protection Process with Data Deduplication using Symantec Backup Exec and Data Domain (Podcast) by EMC Backup and Recovery Solutions

February 2009 - (Free Research)
This podcast explores the changes in storage requirements and the efficiencies that can be achieved by deployment of new technologies as it relates to enterprise level backup and DR practices. 
(PODCAST) READ ABSTRACT |

Streamline Your Windows 7 Migration with Novell ZENworks 11 by Novell, Inc.

November 2010 - (Free Research)
This white paper offers best practices and consideration for an enterprise migration to Windows 7. Learn what questions need to be answered before migrating and 5 crucial steps to a smooth and efficient migration. Also learn about Novell’s migration, maintenance, security and service management tool, ZENworks 11. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Big Data and Big Insights with Dell, SAP and Hadoop by SAP America, Inc.

January 2014 - (Free Research)
Tune in to this live webcast on January 28, 2014 at 12:00 PM EST to learn about the needs of big data and how the SAP HANA platform gives you the power to store, process, and analyze growing data volumes with ease. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts