Codes CallWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Codes Call returned the following results.
RSS What is RSS?
Related Categories

 •   Source Code Control
 •   Automated Security Auditing/ Source Code Analysis
 •   Text and Code Editing
 •   Automated Software Quality (ASQ)
 •   Application Security
 •   Testing and Analysis
 •   Network Security
 •   Application Management and Maintenance
 •   Embedded Application Development
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Active Codes
 •   Codes Call Arizona
 •   Codes Call Arkansas
 •   Codes Call National
 •   Codes Call Online
 •   Codes Starting
 •   Offices Codes Call
 •   Publishing Codes
 •   Repair Codes
 •   Warehouse Codes Call
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 01, 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

How Malware Can Sneak Into Your Company Networks and How to Deal With It by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them. 
(WHITE PAPER) READ ABSTRACT |

Understanding Avaya IP Office Short Codes by Global Knowledge

May 01, 2013 - (Free Research)
This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Cut Coding for Faster Service Desk Deployments by Nimsoft, Inc.

January 04, 2012 - (Free Research)
Learn an alternative to legacy service management solutions that is fast to deploy, easy to configure, and can help your organization realize faster time to value and lower total cost of ownership, both immediately and in the long term. 
(WHITE PAPER) READ ABSTRACT |

Reduce CPU Usage with 'SMART' SQL by BMC Software, Inc.

November 30, 2009 - (Free Research)
This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9. 
(WHITE PAPER) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

Convert IBM Cloud image parameters into Java using JAXB: JAXB and Plain Old Java Objects morph XML cloud image parameters in usable Java code by IBM

July 14, 2011 - (Free Research)
Get under the hood:  This technical note describes how to transform XML response into a Java™-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 10, 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

Hot Knives Through Butter: Evading File-Based Sandboxes by FireEye

February 28, 2014 - (Free Research)
This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick. 
(WHITE PAPER) READ ABSTRACT |

Innovation from the Ground Up: The Next Generation of Enterprise Business Solutions by Workday

July 2008 - (Free Research)
This paper describes three step approach taken to create the next generation of enterprise business solutions "from the ground up". 
(WHITE PAPER) READ ABSTRACT |

SQL Compatibility in DB2 9.7-- From triggers to object enhancements: A demonstration of the new PL/SQL compatibility features by IBM

September 2010 - (Free Research)
This article overviews the new PL/SQL compatibility features in IBM DB2 software version 9.7, making it easier to adopt and allowing you to take advantage of its autonomic and high-performance characteristics.  
(WHITE PAPER) READ ABSTRACT |

Deliver Application Integration Projects in Days by Cast Iron Systems

February 2009 - (Free Research)
This white paper details the Cast Iron Integration Solution, which dramatically simplifies application integration today. As a purpose-built solution designed exclusively for application integration, it eliminates complexity from an integration problem and enables companies to implement projects in days, rather than weeks or months. 
(WHITE PAPER) READ ABSTRACT |

Managing IT projects for business change. Dealing with trouble. by ComputerWeekly.com

April 2014 - (Free Research)
Jeff Morgan and Chris Dale offer advice on managing unanticipated events that can disrupt IT projects in this extract from their book, Managing IT Projects for Business Change. 
(PRESENTATION) READ ABSTRACT |

Benefits Management: How to increase the business value of your IT projects by ComputerWeekly.com

February 2013 - (Free Research)
This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business. 
(BOOK) READ ABSTRACT |

Stories That Move Mountains: Improve your presentation skills by ComputerWeekly.com

November 2012 - (Free Research)
Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals. 
(BOOK) READ ABSTRACT |

E-Guide: Key Grounding and Voltage Considerations In the Data Center by Schneider Electric

January 2011 - (Free Research)
This e-guide explains the reasons for implementing grounding methods and the problems that can occur if it is done incorrectly. Find out how to design your data center’s power system with key components in mind and how much power to implement in your data center. 
(EGUIDE) READ ABSTRACT |

SAP® Support of the Healthecare Supply Chain's Ongoing Effort to Ensure Patient Safety and Drive Business Value by SAP AG

June 2009 - (Free Research)
The Center for Healthcare Supply Chain Research (formerly the HDMA Research & Education Foundation) recently published an important study concerning data management and data sharing in the healthcare supply chain. This whitepaper discusses the key conclusions of their study. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide to Antimalware by Panda Security

October 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

Buyer’s Guide to Antimalware by AVG Technologies USA, Inc.

November 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

JobClock by Exaktime

JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine. Each worker carries keytabs on their own keyring that identifies them in the system. 
(HARDWARE PRODUCT)

6 Best Practices for Preventing Enterprise Data Loss by RSA, The Security Division of EMC

February 2009 - (Free Research)
Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements. 
(WHITE PAPER) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts