Methods Programming IntrastructuresWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Methods Programming Intrastructures returned the following results.
RSS What is RSS?
Related Categories

 •   Application Lifecycle Management(ALM)
 •   Project Management Solutions
 •   Business Process Management (BPM)
 •   Security Policies
 •   Security Monitoring
 •   Testing and Analysis
 •   Collaborative Tools
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Data Security

Related Searches
 •   Management Methods Programming
 •   Methods Configuration
 •   Methods Programming Wyoming
 •   Methods Request
 •   Summary Methods
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

5 Levels of Agile Planning: From Enterprise Product Vision to Team Stand-up by Rally Software

August 2008 - (Free Research)
Existing agile methods often focus on small, single-team projects, overlooking the broader impact of large programs. This paper outlines a distinct planning framework that has been successful in large-scale agile software development projects and relies.. 
(WHITE PAPER) READ ABSTRACT |

8 Simple Rules for Designing Threaded Applications by Intel Software Network

November 2007 - (Free Research)
This article gives 8 Simple Rules that you can add to your palette of threading design methods. By following these rules you will have more success in writing the best and most efficient threaded implementation of your applications. 
(WHITE PAPER)

Incremental Updates vs. Full Reload Change Data Capture: Minutes vs. Hours by CONNX Solutions

June 2008 - (Free Research)
This white paper discusses the five different ways to move changed data, including a solution that can free up programming resources, save processing time and more. 
(WHITE PAPER) READ ABSTRACT |

5 Keys to Developing an Awareness Program by Polivec

April 2008 - (Free Research)
Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program. 
(WEBCAST) READ ABSTRACT |

Taming Transactional Email: Tips to Gain Control and Determine If Outsourcing Makes Sense by Silverpop Systems Inc.

January 2007 - (Free Research)
This white paper reviews the key steps necessary to implement a transactional email marketing campaign. It also recommends methods to ease the pain of implementation while improving the results. 
(WHITE PAPER) READ ABSTRACT |

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

Change Management Best Practices for the Engineering and Construction Industry by Oracle Corporation

April 2009 - (Free Research)
The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a construction project, and provide a process to effectively manage changes on construction projects. 
(WHITE PAPER) READ ABSTRACT |

Object Persistence and Agile Software Development by Versant Corp.

December 2009 - (Free Research)
Agile Software Development is one of the most effective methodologies to develop application software. This paper examines and compares RDBMS with several object persistence methods within the context of Agile Software Development by quantifying the impact of these methods on the velocity and success of an agile application development project. 
(WHITE PAPER) READ ABSTRACT |

A Guide to a Scaled Agile Framework by Rally Software

May 2013 - (Free Research)
You're probably familiar with agile methods for software development, but did you know that agile development isn't only useful at the team level? This resource explores a strategy for implementing a Scaled Agile Framework™ (SAFe) in your organization and how to extend agile and lean principles to an enterprise scale. 
(WHITE PAPER) READ ABSTRACT |

5 Levels of Agile Planning: From Enterprise Product Vision to Team Stand-up by Rally Software

June 2012 - (Free Research)
This paper assesses agile methods used in multi-team projects. Read more inside to explore evaluations of the requirements associated with scaling projects and applying basic agile principles to those requirements. Additionally, learn about the impact that an agile framework has on core lean principles muri, mura, and muda. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

The Global State of the PMO 2012 by ComputerWeekly.com

May 2012 - (Free Research)
This 2012 benchmarking survey from ESI assesses the role of the Project/Programme Management Office (PMO), its development to full-blown maturity and value to the business. 
(IT BRIEFING) READ ABSTRACT |

Leaning IT : Applying the Principle of "Pull" to Scale Agile Teams by Rally Software

April 2009 - (Free Research)
Is your organization ready for this Agile "means to an end" or is Agile adoption inadvertently creating a classic "fix that fails?" Can Agile truly work at the Program level? This white paper is based on actual experiences of professionals who helped steer many of the largest Agile implementations done over the last five years. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Top 10 Project Management Trends for 2013 by ComputerWeekly.com

January 2013 - (Free Research)
A global panel of experts identify the top 10 trends in project management in 2013 
(ESSENTIAL GUIDE) READ ABSTRACT |

Top 10 Project Management Trends for 2013 by ComputerWeekly.com

January 2013 - (Free Research)
A global panel of experts identify the top 10 trends in project management in 2013 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks by SearchSecurity.com

June 2011 - (Free Research)
Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them. 
(EGUIDE) READ ABSTRACT |

Protecting Your APIs Against Attack & Hijack by CA Technologies.

December 2012 - (Free Research)
Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures. 
(WHITE PAPER) READ ABSTRACT |

How RFID Technology Can Enhance Your Asset Management Program by Infor

February 2007 - (Free Research)
With today's RFID technology, more data can be gathered faster and less expensively than ever before. Read this white paper and learn how RFID can help you gain significant time savings and enable better asset management. 
(WHITE PAPER) READ ABSTRACT |

Best practices for planning for data integration process by IBM

January 2012 - (Free Research)
Integrating data and planning a data integration process can be difficult for any organization. In this brief yet informative e-guide, readers will learn standard methods and best practices, such as implementing a data profiling program as a production process, to ensure a successful transition. 
(EGUIDE) READ ABSTRACT |

5 Oauth Essentials for API Access Control by CA Technologies.

February 2014 - (Free Research)
View this resource to uncover an application programming interface (API) authentication solution fit for the enterprise. Read on for 5 things to consider before deployment. 
(WHITE PAPER) READ ABSTRACT |

Scaling Agile: Fractals of Innovation by Rally Software

May 2013 - (Free Research)
Many organizations are under the impression that agile development practices are only applicable to small teams - but that just isn't the case. Check out this helpful resource to explore scaling existing agile frameworks across multiple teams, including the program and portfolio levels. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts