Outsourcing CodingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Outsourcing Coding returned the following results.
RSS What is RSS?
Related Categories

 •   Technology Outsourcing
 •   Automated Security Auditing/ Source Code Analysis
 •   Business Process Outsourcing
 •   Testing and Analysis
 •   Application Security
 •   Business Process Management (BPM)
 •   Embedded Application Development
 •   Vulnerability Assessment
 •   Business Planning
 •   Text and Code Editing

Related Searches
 •   Desktop Outsourcing Coding
 •   Issues Outsourcing Coding
 •   Outsourcing Coding Directory
 •   Outsourcing Coding Display
 •   Outsourcing Formats
 •   Outsourcing Roi
 •   Softwares Outsourcing Coding
 •   Statement Outsourcing Coding
 •   System Outsourcing Coding
 •   Using Outsourcing Coding
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..

Information Security Magazine - April 2010: Endpoints on the Loose by Information Security Magazine

April 07, 2010 - (Free Research)
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more. 
(EZINE)

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by IBM

March 13, 2009 - (Free Research)
This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 10, 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 10, 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

How Will the Transition to ICD-10 codes affect Health IT? by Virtusa Corporation

March 29, 2011 - (Free Research)
As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion. 
(EGUIDE) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 20, 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Unleash the business opportunity of modern apps – 9 business challenges and modern app scenarios by Intel

December 31, 2012 - (Free Research)
Access this paper today to learn about the four of the biggest trends influencing modern apps and find nine business scenarios that cover three important aspects of modern apps. Also inside, discover your own business opportunities using modern apps. 
(WHITE PAPER) READ ABSTRACT |

How Verification Services Fortify Your Software Escrow Solution by Iron Mountain

December 28, 2011 - (Free Research)
This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them. 
(WHITE PAPER) READ ABSTRACT |

SAP NetWeaver Business Rules Management by SAP AG

September 15, 2011 - (Free Research)
This white paper explores a strategy for externalizing business rules for centralized management and consistent implementation across business applications. Also inside, discover how this approach can help close the gap which can occur between the design and coding phases of business rule implementation. 
(WHITE PAPER) READ ABSTRACT |

SAP NetWeaver Business Process Management by SAP AG

September 15, 2011 - (Free Research)
Read this white paper for an overview of a new approach to BPM which allows you to quickly model and execute new business processes, without error-prone and time-consuming coding. Learn how this strategy drives business flexibility and speed by allowing the quick change or implementation of business processes. 
(WHITE PAPER) READ ABSTRACT |

5 things your Development Teams should be doing now by CollabNet

November 08, 2011 - (Free Research)
In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. In this paper, find five tested and proven software development practices your team should be utilizing to accelerate software delivery. 
(WHITE PAPER) READ ABSTRACT |

SaaS-based Service Management: Tailor to the Business with Ease by Nimsoft, Inc.

January 04, 2012 - (Free Research)
Learn how SaaS-based service management can help you eliminate the cost and distraction of platform maintenance, minimize upgrade costs and disruptions, tailor to the business without complex coding, and more. 
(WHITE PAPER) READ ABSTRACT |

A Practical Guide to Cloud Computing Security by Avanade

February 19, 2010 - (Free Research)
Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be. 
(WHITE PAPER) READ ABSTRACT |

Software Internationalization/Translation/Localization Services by Globalization Partners International

Globalization Partners International (GPI) provides Global Translation, Localization (L10N) and Internationalization (I18N) services into over 50 languages helping companies develop global software. 
(SERVICE)

Industrialised delivery: The next stage in outsourcing evolution by Hewlett-Packard Limited

October 25, 2013 - (Free Research)
This on-demand webcast explores how your organization can achieve the true scale of outsourcing with industrialized delivery. 
(WEBCAST) READ ABSTRACT |

DC Hosting, Outsourcing And Colocation Strategies by Hewlett-Packard Company

February 01, 2013 - (Free Research)
This expert e-guide presents selection criteria and opportunities in order to successfully evaluate and leverage data center outsourcing providers to ensure you're getting the highest level of service and benefits from your investment. 
(EGUIDE) READ ABSTRACT |

CW Buyer's Guide: Outsourcing by ComputerWeekly.com

July 05, 2011 - (Free Research)
This in-depth buyer's guide, assesses the trends in outsourcing, the options for small and medium sized companies and the role of governance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 02, 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

Global sourcing trends 2011 by ComputerWeekly.com

January 26, 2011 - (Free Research)
At the beginning of each year, we survey Morrison & Foerster’s Global Sourcing Group lawyers in Asia, Europe, and the United States regarding the current state of the world’s outsourcing market and emerging trends likely to shape that market over the next twelve months. 
(WHITE PAPER) READ ABSTRACT |

SearchCIO.com eBook: Unlock Outsourcing Potential and Change by SearchCIO.com

May 04, 2009 - (Free Research)
The key to unlocking outsourcing potential lies in targeting the right projects, choosing your suppliers wisely and then managing them with an eye on economic conditions at that global site. Here's a step-by-step plan for optimizing savings. 
(EBOOK) READ ABSTRACT |

The Business Case for Outsourcing to Vietnam by LogiGear Corporation

June 14, 2011 - (Free Research)
This white paper provides a business case for considering Vietnam as an offshore outsourcing destination, and offers specific examples from the IT and software industries, including a US software testing firm with a facility in Vietnam. 
(WHITE PAPER) READ ABSTRACT |

The Outsourcing Decision for a Globally Integrated Enterprise: From Commodity Outsourcing to Value Creation by IBM

May 2008 - (Free Research)
The ability to manage operations, expertise and resources more fluidly enables globally integrated enterprises to enter new markets and seize new business opportunities wherever they happen to arise. 
(WHITE PAPER)

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts