Coding Blue Cross BlueWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Coding Blue Cross Blue returned the following results.
RSS What is RSS?
Related Categories

 •   Content Delivery Networks/ Web Application Acceleration
 •   Application Management and Maintenance
 •   Network Management
 •   Application Security
 •   Network Security
 •   Business Intelligence Solutions
 •   WAN/ LAN Solutions
 •   Automated Security Auditing/ Source Code Analysis
 •   Networks
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Asp Coding Blue
 •   Coding Blue Cross Schedules
 •   Coding Blue Graph
 •   Coding Blue Implementation
 •   Coding Portals
 •   Coding Regional
 •   Coding Spreadsheets
 •   Hardware Coding Blue Cross
 •   Outsourcing Coding
 •   Sales Coding
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Case study: Blue Cross Blue Shield of Kansas cuts mainframe software costs with IBM (May 2013) by IBM

May 31, 2013 - (Free Research)
Lear how Blue Cross and Blue Shield of Kansas were able to migrate their mainframe software toward an equally functional but significantly lower-cost system - without heavy impact on users and the IT environment. 
(CASE STUDY) READ ABSTRACT |

IT and Analyst Testimonials: TCO Considerations for PC Refresh and Intel vPro Technology by Intel Corporation

May 27, 2009 - (Free Research)
In this video IT professionals from the Symantec ManageFusion Conference discuss how PC refresh and Intel vPro technology helps minimize total cost of ownership. 
(VIDEO)

E-Guide: Building a Successful SOA Strategy by Oracle Corporation

October 20, 2010 - (Free Research)
This e-guide discusses an architecture-driven SOA paradigm, and what's been holding back adoption of this type of approach. It also looks at the cultural, organizational and operational impact of an architecture-driven SOA, and why the SOA architect needs to step up and lead. 
(EGUIDE) READ ABSTRACT |

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises by Global Knowledge

October 2008 - (Free Research)
This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Triboo Manages 10 Million Unique Website Users Per Month with Riverbed by Riverbed Technology, Inc.

November 2011 - (Free Research)
Triboo specializes in managing e-commerce activities and performance marketing for many Italian companies. The company’s website was struggling to support over 2 million page views and 45 million hits each day, so they turned to Riverbed Stingray Traffic Manager. 
(CASE STUDY) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by SearchSecurity.com

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Application security testing: Protecting your application and data by IBM

November 2011 - (Free Research)
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns. 
(EBOOK)

Ajax at Adobe with Dreamweaver CS4, Adobe AIR and More by Adobe Systems, Inc.

February 2009 - (Free Research)
Hear Kevin Hoyt, platform evangelist at Adobe, discuss building Ajax apps using the latest version of Dreamweaver CS4 and extending apps outside the browswer with Adobe AIR. 
(VIDEO) READ ABSTRACT |

jQuery on Rails (The Real Ones) by The Ajax Experience

January 2009 - (Free Research)
The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users. 
(PODCAST) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Defend Against Injection-based Attacks by Klocwork

December 2013 - (Free Research)
This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks. 
(WHITE PAPER) READ ABSTRACT |

Blue Coat Accelerates Automated CLI Testing, Reaps New Efficiencies with FanfareSVT by Fanfare

December 2006 - (Free Research)
Blue Coat needed to improve its test automation practices with tools & solutions that automate test cases during the development phase, increase test coverage, & identify changes that are not easily identified from build to build. Read why Blue Coat selected FanfareSVT test automation software to work seamlessly within its existing infrastructure. 
(CASE STUDY) READ ABSTRACT |

Five New Year's Networking Resolutions for 2009 by BlueCoat

March 2009 - (Free Research)
Time to ring out your old-school networking, ring in an Application Delivery Network. Let Blue Coat help make 2009 the year you get your network in shape (both performance-wise and economically). To kickoff a great year, here are some resolutions to set for yourself and the team. 
(WHITE PAPER) READ ABSTRACT |

Kelley Blue Book Case Study by Microsoft

July 2007 - (Free Research)
In 2006, Kelley Blue Book implemented a new analytical capabilities solution based on Microsoft Business Intelligence technologies. Now Kelley Blue Book has improved sales staff efficiency and created a compelling new Web analytics product that can provide its business customers with more targeted data for their marketing efforts. 
(CASE STUDY) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Adobe Flash Builder 4 by Adobe Systems, Inc.

January 2011 - (Free Research)
Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more. 
(DOWNLOAD)

Optimize Application Delivery for GlobalDeployment Of SAP® BusinessObjects™ Enterprise with Blue Coat Systems Acceleration by BlueCoat

July 2011 - (Free Research)
Blue Coats SAP BusinessObjects Enterprise Software is a market leading Business Intelligence solution, enabling customers to discover and share business insight for optimal decision making. 
(WHITE PAPER) READ ABSTRACT |

Blue Coat: The Technology Leader in Application Delivery Networking by BlueCoat

June 2009 - (Free Research)
Check out this comprehensive microsite to view white papers, videos, press releases, case studies, and webcasts highlighting Blue Coat's application delivery networking solutions. 
(MICROSITE)

Blue Coat WebFilter by BlueCoat

December 2008 - (Free Research)
Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them. 
(DATA SHEET) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Symantec Protection Suite Enterprise Edition by Symantec Corporation

June 2009 - (Free Research)
Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure. 
(TRIAL SOFTWARE)

Web application firewalls: How they can help protect customers by Astaro

April 2012 - (Free Research)
In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts