Code Maintain WhatWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Code Maintain What returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Automated Security Auditing/ Source Code Analysis
 •   Automated Software Quality (ASQ)
 •   Application Lifecycle Management(ALM)
 •   Embedded Application Development
 •   Testing and Analysis
 •   Source Code Control
 •   Data Security
 •   Application Management and Maintenance
 •   Application Security

Related Searches
 •   Buying Code Maintain What
 •   Call Code Maintain What
 •   Code Compare
 •   Code Corporation
 •   Code Flow
 •   Code Maintain Compliance
 •   Code Maintain What Case Study
 •   Consulting Code Maintain
 •   Export Code
 •   Forms Code Maintain
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Protecting Against the New Wave of Malware by GFI Software

March 11, 2011 - (Free Research)
Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges. 
(WHITE PAPER) READ ABSTRACT |

E-Book: New Enterprise Desktop Chapter 1: The Desktop Virtualization Recipe by Pano Logic, Inc

April 27, 2010 - (Free Research)
This e-book will look at some of the trends that may lead to new application delivery methods. Technologies such as application and desktop virtualization, software services and cloud computing as well as a new generation of smart phones are all redefining application delivery. 
(EBOOK) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 14, 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by IBM

March 13, 2009 - (Free Research)
This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code. 
(WHITE PAPER) READ ABSTRACT |

How to Avoid Hand-Coding Data Integration Issues by SnapLogic

January 30, 2014 - (Free Research)
This whitepaper discusses a smart alternative to hand-coding that utilizes a “hub-and-spoke” model and supports cloud integration. 
(WHITE PAPER) READ ABSTRACT |

Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop by Klocwork

November 01, 2009 - (Free Research)
As Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity. 
(WHITE PAPER) READ ABSTRACT |

Evolving APM: Big Data Approach, Integrated End-user Experience Monitoring Bring Deep End-to-end Application visibility by Riverbed Technology, Inc.

January 24, 2014 - (Free Research)
This whitepaper examines a solution that leverages existing big data capabilities, integrates end-user experience monitoring and uses integrated development environment tools to maintain deep end-to-end application visibility. 
(WHITE PAPER) READ ABSTRACT |

ALM and Agile Strategies E-Zine Issue 1 by CA Technologies.

February 17, 2012 - (Free Research)
Using modern-day Agile techniques such as automation and cloud hosting solutions, today’s IT leaders have opportunities to reap better returns on their ALM investments. In this issue, experts will share source code control system automation strategies, hosting options for code repositories and trends in requirements management tools. 
(EZINE) READ ABSTRACT |

Object Persistence and Agile Software Development by Versant Corp.

December 01, 2009 - (Free Research)
Agile Software Development is one of the most effective methodologies to develop application software. This paper examines and compares RDBMS with several object persistence methods within the context of Agile Software Development by quantifying the impact of these methods on the velocity and success of an agile application development project. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 25 March 2014: Get kids coding by ComputerWeekly.com

March 25, 2014 - (Free Research)
In this week's Computer Weekly, we examine the latest moves to encourage children to learn to code, to help avoid future skills shortages. Facebook's Open Compute Project is bringing open source to the datacentre – we look at what it means for IT. And we profile Salesforce.com as the SaaS firm celebrates its 15th birthday. Read the issue now. 
(EZINE) READ ABSTRACT |

Architectural Quality: Design, Development and Testing Rules by hello2morrow, Inc.

September 2008 - (Free Research)
Read this white paper and explore essential architectural quality rules and their individual considerations. Discover a tool that enforces the most important rules automatically during development. 
(WHITE PAPER) READ ABSTRACT |

More Scale at Lower Cost with Scalable Video Coding by Polycom, Inc.

October 2011 - (Free Research)
The demand for personal video for organizational communication is growing rapidly. By 2015, over 200 million workers globally will run corporate-supplied video conferencing from their desktops. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Toad for Oracle 10.5 by Dell Software

July 2010 - (Free Research)
Toad for Oracle v10.5 adds new features and enhances many existing ones. These changes are designed to save you time, increase accuracy and give you better visibility of your work environment - whether you’re a developer working in an unfamiliar database or maintaining legacy code, or a DBA trying to manage multiple databases. 
(WHITE PAPER) READ ABSTRACT |

Lowering the Cost of Test with Integrated Switch Management by National Instruments

February 2002 - (Free Research)
National Instruments Switch Executive is a significant innovation in the design and implementation of automated test systems. 
(WHITE PAPER)

E-Guide: Information Security Essential Guide to Compliance by Information Security Magazine

July 2010 - (Free Research)
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

Challenging Some of the Myths About Static Code Analysis by Klocwork

November 2013 - (Free Research)
This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Updating Rules for COBOL Generated Code to Use CICS Channels and Containers by IBM

December 2010 - (Free Research)
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM Redpaper™ publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL. 
(WHITE PAPER) READ ABSTRACT |

How Will the Transition to ICD-10 codes affect Health IT? by Virtusa Corporation

March 2011 - (Free Research)
As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion. 
(EGUIDE) READ ABSTRACT |

What Developers Want: The End of Application Redeploys by ZeroTurnaround

March 2014 - (Free Research)
For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs. 
(WHITE PAPER) READ ABSTRACT |

The US Department of Defense Maintains Application Security and Eliminates Software Conflicts When Deploying Applications to Locked-down Desktops by Thinstall

January 2008 - (Free Research)
The DOD chose Thinstall to address the demanding deployment requirements, using it initially for 12 applications. 
(CASE STUDY) READ ABSTRACT |

The Full Team Approach to Managing Requirements by SERENA Software, Inc.

February 2011 - (Free Research)
Software development teams are often faced with requirements to add new features to an existing code base. For many reasons, this sort of work can entail a lot of risk. This Expert Tip examines mistakes in managing the requirements process and how by looking at requirements from the perspective of all team members, these mistakes can be avoided. 
(EGUIDE) READ ABSTRACT |

Mainframe Rehosting with Oracle Tuxedo: Accelerating Cost Reduction and Application Modernization by Oracle Corporation UK Ltd

March 2009 - (Free Research)
The backlog is the number-one hurdle to effectiveness for CIOs followed by inadequate budgets and a shortage of time for strategic thinking and planning, reports “The State of the CIO 2006” survey by CIO Magazine. For IT executives managing mainframe applications, these issues are all too familiar. After all, the average Fortune 100 company... 
(WHITE PAPER) READ ABSTRACT |

The Future of Address Validation: Going Beyond Move Update to Cut Costs and Connect with Customers by Pitney Bowes Business Insight

September 2010 - (Free Research)
Today, the need to connect with customers efficiently and effectively is more important than ever. The foundation of these communications is a complete and accurate customer record. This paper describes the validation requirements, opportunities and best practices to increase organizational efficiencies relative to enterprise address validation. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts