Coding How Technology CanWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Coding How Technology Can returned the following results.
RSS What is RSS?
Related Categories

 •   Testing and Analysis
 •   Automated Software Quality (ASQ)
 •   Source Code Control
 •   Automated Security Auditing/ Source Code Analysis
 •   Text and Code Editing
 •   Application Security
 •   Code Algorithms
 •   Vulnerability Assessment
 •   Application Management and Maintenance
 •   Business Process Management (BPM)

Related Searches
 •   Applications Of Coding How Technology
 •   Coding How Check
 •   Coding How Technology Alaska
 •   Coding How Web Casts
 •   Coding Maryland
 •   Coding Rfi
 •   History Coding
 •   Infrastructure Coding How
 •   Learning Coding
 •   Terminal Coding How
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Trends to Watch: Customer Experience and Interaction by Oracle Corporation

October 09, 2013 - (Free Research)
The following article details how technologies are evolving to meet new customer demands, and providing recommendations for both enterprises and vendors. 
(WHITE PAPER) READ ABSTRACT |

2013 Trends to Watch: Customer Experience and Interaction by Oracle Corporation

October 31, 2012 - (Free Research)
This report looks at some of the important changes in the customer experience and interaction market, detailing how technologies are evolving to meet new consumer demands, and provides recommendations for both enterprises and vendors. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 19, 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 14, 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 25 March 2014: Get kids coding by ComputerWeekly.com

March 25, 2014 - (Free Research)
In this week's Computer Weekly, we examine the latest moves to encourage children to learn to code, to help avoid future skills shortages. Facebook's Open Compute Project is bringing open source to the datacentre – we look at what it means for IT. And we profile Salesforce.com as the SaaS firm celebrates its 15th birthday. Read the issue now. 
(EZINE) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 23, 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems by McCabe Software, Inc.

April 19, 2012 - (Free Research)
<p>Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.</p> 
(CASE STUDY) READ ABSTRACT |

Challenging Some of the Myths About Static Code Analysis by Klocwork

November 30, 2013 - (Free Research)
This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 01, 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

What Developers Want: The End of Application Redeploys by ZeroTurnaround

March 31, 2014 - (Free Research)
For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

Using ICD-10 Codes and Electronic Health Records to Achieve Value by Dell, Inc.

June 20, 2012 - (Free Research)
This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers. 
(WHITE PAPER)

How Will the Transition to ICD-10 codes affect Health IT? by Virtusa Corporation

March 29, 2011 - (Free Research)
As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion. 
(EGUIDE) READ ABSTRACT |

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications by Intermec

March 04, 2009 - (Free Research)
This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations. 
(WHITE PAPER) READ ABSTRACT |

NetworkedAssets Improves Development Velocity by 40% by ZeroTurnaround

April 02, 2014 - (Free Research)
In this brief case study, learn how NetworkedAssets improved their development productivity and experienced a 40% increase in velocity by leveraging a technology that enables you to instantly view code changes, eliminating turnaround time. 
(CASE STUDY) READ ABSTRACT |

Eliminate Redeployment: Java Forever Changed by ZeroTurnaround

December 31, 2012 - (Free Research)
Java developers know that testing code changes can be a huge pain, and waiting for an application to redeploy after a code fix can take an eternity. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages? 
(WHITE PAPER) READ ABSTRACT |

Stop Redeploying: View Code Changes Instantly by ZeroTurnaround

March 31, 2014 - (Free Research)
Software development is an iterative process, meaning that developing a single component can result in cycles of code change, deploy, and test. However, multiple deployments and restarts to different application servers can be time-consuming. Fortunately, this white paper introduces a way for developers to instantly see the results of code changes. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Can I Really Roll-out a Code Review Process That Doesn’t Suck? by SmartBear Software

August 27, 2012 - (Free Research)
This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more. 
(WEBCAST) READ ABSTRACT |

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation by Coverity

March 19, 2008 - (Free Research)
This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis by Coverity

March 19, 2008 - (Free Research)
This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by IBM

March 13, 2009 - (Free Research)
This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code. 
(WHITE PAPER) READ ABSTRACT |

How to Avoid Hand-Coding Data Integration Issues by SnapLogic

January 30, 2014 - (Free Research)
This whitepaper discusses a smart alternative to hand-coding that utilizes a “hub-and-spoke” model and supports cloud integration. 
(WHITE PAPER) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

August 28, 2012 - (Free Research)
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts