Information About Performance CodesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information About Performance Codes returned the following results.
RSS What is RSS?
Related Categories

 •   Source Code Control
 •   Text and Code Editing
 •   Application Management and Maintenance
 •   Application Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Testing and Analysis
 •   Automated Software Quality (ASQ)
 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions
 •   Embedded Application Development

Related Searches
 •   Architecture Information
 •   Cost Information About
 •   Information About Features
 •   Information About Performance Manuals
 •   Information About Systems
 •   Information Demonstrations
 •   Pos Information About Performance
 •   Work Information About Performance
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Performance Optimization: Extending the IT Infrastructure by Embarcadero Technologies, Inc.

May 29, 2009 - (Free Research)
Performance optimization is a key ingredient in the struggle to stretch an invested IT dollar to its absolute limit. Read this whitepaper to learn about the 3-step 'prevent, find, fix' approach to handling performance optimization problems at any stage of the development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Giving Your Oracle Hardware Performance a Shot in the Arm by SearchOracle

March 12, 2013 - (Free Research)
This expert resource details how to pick the best server hardware for your Oracle environment. Also included is a report on how to determine where the database bottlenecks are and then find the right tools to help open then up. And finally, examine the increasing role that RAM is playing in database and application environments. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 10, 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by IBM

March 13, 2009 - (Free Research)
This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code. 
(WHITE PAPER) READ ABSTRACT |

Challenging Some of the Myths About Static Code Analysis by Klocwork

November 30, 2013 - (Free Research)
This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Master Data Management Projects in Practice - An Information Difference Research Study by Talend

December 01, 2009 - (Free Research)
Organizations are often turning to Master Data Management as a key enabler in improving the timeliness, quality and reliability of BI with the ultimate goal of improving business performance. This survey report presents recommendations on the "do and don't" of MDM as well as some findings on the use of open source and manual coding in MDM projects. 
(WHITE PAPER) READ ABSTRACT |

Speeding the Time to Intelligence: Effective Information Management through Business Intelligence Competency Centers and Performance Management by SAS

May 2008 - (Free Research)
This article explains in detail about how to arrive at and implement an effective business intelligence strategy, using both a BICC and performance management technology. 
(WHITE PAPER) READ ABSTRACT |

Can I Really Roll-out a Code Review Process That Doesn’t Suck? by SmartBear Software

August 2012 - (Free Research)
This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more. 
(WEBCAST) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

Information Security Magazine - April 2010: Endpoints on the Loose by Information Security Magazine

April 2010 - (Free Research)
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more. 
(EZINE)

Forrester Report: Development Testing: A New Era In Software by Coverity

November 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Application Note: Structured Testing - The Path to Thorough Code Coverage by McCabe Software, Inc.

March 2011 - (Free Research)
Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing. 
(WHITE PAPER) READ ABSTRACT |

Oracle Database 11g Application Development by Oracle Corporation

June 2007 - (Free Research)
Application development organizations have a wide variety of programming languages and technologies to choose from. In this white paper learn how Oracle Database 11g delivers a highly productive and powerful set of application development tools. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database Tools for Auditing and Forensics by SearchSecurity.com

March 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

JobClock by Exaktime

JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine. Each worker carries keytabs on their own keyring that identifies them in the system. 
(HARDWARE PRODUCT)

BI Trends and Strategies E-Zine Issue 8 by SearchBusinessAnalytics

August 2012 - (Free Research)
Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes. 
(EGUIDE) READ ABSTRACT |

5 Tips to Break Through ELT Roadblocks by Syncsort

February 2014 - (Free Research)
Learn how to put an end to the ETL vs. ELT debate once and for all and take a smarter approach to a high-performance ETL solution that overcomes the limitations of both SQL coding and conventional data integration tools. 
(EBOOK) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Giving Your Oracle Hardware Performance a Shot in the Arm by EMC Corporation

March 2013 - (Free Research)
In this expert handbook, discover three ways to boost Oracle database and application performance that normal Oracle development thinking might cause you to overlook: selecting metrics for server hardware, improving project management, and harnessing in-memory processing. 
(EBOOK) READ ABSTRACT |

State of Software Security Report by Veracode, Inc.

February 2011 - (Free Research)
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing by IBM

January 2011 - (Free Research)
Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts