Coding Unix Basic StatisticsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Coding Unix Basic Statistics returned the following results.
RSS What is RSS?
Related Categories

 •   Operating Systems and Subsystems
 •   Data Center Management
 •   Enterprise Systems Management
 •   Open Source
 •   Application Management and Maintenance
 •   Automated Security Auditing/ Source Code Analysis
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Migration Tools and Services
 •   Programming Languages

Related Searches
 •   Automated Coding Unix
 •   Coding Group
 •   Coding Providers
 •   Coding Unix Basic Address
 •   Coding Unix Basic Publishing
 •   Coding Unix Check
 •   Commercial Coding Unix
 •   Issues With Coding
 •   Parts Of Coding Unix
 •   Storage Coding
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows by IBM

January 2008 - (Free Research)
Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs. 
(WHITE PAPER) READ ABSTRACT |

Moving From Solaris To Red Hat Enterprise Linux by Red Hat and HP

August 2009 - (Free Research)
Red Hat® Enterprise Linux® is a standards-based UNIX®-like operating system that provides a development environment similar to SunTM SolarisTM. This paper looks to highlight some of the major differences between Solaris and Red Hat Enterprise Linux to help application developers port their code. 
(WHITE PAPER) READ ABSTRACT |

iOS 6 Foundations by ComputerWeekly.com

July 2013 - (Free Research)
Jesse Feiler, author of iOS 6 Foundations, introduces basic programming techniques for Apple's iPhone and iPad operating system. 
(BOOK) READ ABSTRACT |

Presentation Transcript: The Mainframe - Best Practices 2009 by CA Technologies.

July 2009 - (Free Research)
In this videocast transcript, expert Wayne Kernochan talks about consolidation of more than 20 applications onto the mainframe, global demand of business transactions in IT leading to long term cost structures and rapid changes in the environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Introduction to Secure Coding for C/C++ by Klocwork

September 2011 - (Free Research)
When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code. 
(RESOURCE CENTER) READ ABSTRACT |

Embarcadero® DB Optimizer™ by Embarcadero Technologies, Inc.

May 2009 - (Free Research)
Poor performing SQL code is costly in terms of dollars and customer satisfaction. Discovering performance bottlenecks once they're in production is costly. 
(TRIAL SOFTWARE) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

Mastering the Iteration : The Heartbeat of Agile Development by Rally Software

August 2008 - (Free Research)
This white paper is an excerpt from the book "Scaling Software Agility: Best Practices for Large Enterprises", and describes the iteration pattern and activities that a team engages in to create tested, value-delivered code in a short time box. 
(WHITE PAPER) READ ABSTRACT |

Get started with JavaScript by IBM

April 2011 - (Free Research)
This knowledge path begins with an overview of the JavaScript language to provide a foundation for writing JavaScript code. It then covers more advanced topics such as object-oriented JavaScript and DOM modification for HTML page manipulation before covering introductory Asynchronous JavaScript + XML (Ajax) concepts and how to make Ajax requests. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Scanning Production Applications by IBM

December 2010 - (Free Research)
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications. 
(EBOOK) READ ABSTRACT |

Salary Report: Trends in IT Compensation and Certifications by Global Knowledge Network, Inc.

May 2006 - (Free Research)
Global Knowledge keeps up to date with trends in IT careers, certifications, and compensation. In this, our inaugural quarterly report, we offer a look at salaries for the top 25 IT jobs, organized by region. We also offer a look at the top certifications and in-depth analysis from our resident market research analyst. 
(ANALYST REPORT) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Software Internationalization/Translation/Localization Services by Globalization Partners International

Globalization Partners International (GPI) provides Global Translation, Localization (L10N) and Internationalization (I18N) services into over 50 languages helping companies develop global software. 
(SERVICE)

Using Technologies to Increase Perfect Order Metrics by Intermec

August 2008 - (Free Research)
Companies are continually finding new ways to get the right goods to the right customers on time. This white paper explains how each aspect of perfect order performance can be improved through enhancements to data collection processes and technologies. 
(WHITE PAPER) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

The Return on Investment of Open Source Data Integration by Talend

July 2008 - (Free Research)
This white paper explains the different alternatives to open source data integration, and presents the visible and hidden costs of these alternatives, on several types of projects. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of Integration by Talend

January 2007 - (Free Research)
Over the recent years, data integration has been growing from simple data movement to complex transformation functions, and modern data integration technology now enables organizations to deploy data integration technology. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

Developing WS-Management Solutions for Intel® Active Management Technology by Intel

October 2009 - (Free Research)
This article describes how to develop flexible WS Management-based solutions for Intel® Active Management Technology using the .NET development environment. The basic ingredients and building blocks of a WSMan-based solution will be presented. We've included some coding samples (written using Windows 2008) to help illustrate this information. 
(TECHNICAL ARTICLE)

How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets by APC by Schneider Electric

January 2011 - (Free Research)
Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. This paper analyzes several of these incidents and makes recommendations for how a basic monitoring system can help reduce the occurrence of these unanticipated events. 
(WHITE PAPER) READ ABSTRACT |

The US Department of Defense Maintains Application Security and Eliminates Software Conflicts When Deploying Applications to Locked-down Desktops by Thinstall

January 2008 - (Free Research)
The DOD chose Thinstall to address the demanding deployment requirements, using it initially for 12 applications. 
(CASE STUDY) READ ABSTRACT |

Basic Building Blocks: Preparing for PCI DSS 2.0 by Veracode, Inc.

October 2010 - (Free Research)
With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts