Own Cisco CodeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Own Cisco Code returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Network Management
 •   Automated Security Auditing/ Source Code Analysis
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Application Security
 •   Text and Code Editing
 •   Data Security
 •   Vulnerability Assessment
 •   Content Delivery Networks/ Web Application Acceleration

Related Searches
 •   Asp Own Cisco
 •   Demo Own Cisco Code
 •   Measurement Of Own Cisco Code
 •   Own Cisco Code Form
 •   Own Cisco Plan
 •   Processing Own Cisco Code
 •   Procurement Own
 •   Researching Own
 •   Use Own Cisco
 •   Vendors Own Cisco
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Software Agitation: Your Own Personal Code Reviewer by Agitar Software

March 10, 2011 - (Free Research)
Agitator helps you debug your code while you write it - a benefit that no other existing Java Testing tool can claim. Agitator can also be extremely beneficial when run on legacy code - even code that has been reviewed by other developers and deemed to be “sufficient” and “properly written.” Learn how Agitar can be your own personal code reviewer. 
(WHITE PAPER) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

August 28, 2012 - (Free Research)
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more. 
(WHITE PAPER) READ ABSTRACT |

Software Agitation:Your Own Personal Code Reviewer by Agitar Software

April 19, 2012 - (Free Research)
<p>Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.</p> 
(WHITE PAPER) READ ABSTRACT |

Cisco ScanSafe and AVC Support Cloud Intelligent Network by Cisco Systems, Inc.

July 11, 2012 - (Free Research)
This case study showcases how, in just two years, Cisco was able to move their enterprise resource planning (ERP), sales force management (SFA) and customer relationship management (CRM) applications to a private cloud. Along with leveraging public cloud software as a service, Cisco significantly reduced TCO and boosted their agility. 
(CASE STUDY) READ ABSTRACT |

BYOD Financial Assessment Tool by Cisco Systems, Inc.

November 13, 2013 - (Free Research)
This exclusive resource allows you to assess the incremental value from implementing a BYOD policy more strategically in your business. 
(ASSESSMENT TOOL) READ ABSTRACT |

10 BYOD Financial Insights by Cisco Systems, Inc.

November 12, 2013 - (Free Research)
This exclusive paper analyzes a survey of more than 2,400 users across 18 industries and 6 countries, discussing BYOD's financial impact and the effects that the trend is having on business as a whole. 
(WHITE PAPER) READ ABSTRACT |

Is BYOD worth the risk? BYOD Benefits Model for Global Companies by Cisco Systems, Inc.

November 12, 2013 - (Free Research)
This informative resource examines the financial impact of BYOD in organizations in six different countries, analyzing what kind of value BYOD is delivering and how your organization can increase this value. 
(WHITE PAPER) READ ABSTRACT |

Cisco Prime Network Control System 1.1 by Cisco Systems, Inc.

June 22, 2012 - (Free Research)
This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Future of Business: Preparing to Meet its Challenges by Cisco Systems, Inc.

March 15, 2011 - (Free Research)
Cisco is addressing today's dominant trends and their implications for transforming IT architectures and critical business processes. This paper examines these trends, describes why the network is the logical starting point for transforming business, and offers insight into the most strategic IT investments that businesses should consider today. 
(WHITE PAPER)

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely by Cisco (E-mail this company)

June 30, 2011 - (Free Research)
Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 19 November 2013: Software-defined networking explodes by SearchSecurity.com

November 18, 2013 - (Free Research)
In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now. 
(EZINE) READ ABSTRACT |

Deploy Your BYOD Solution—Cisco Design Guide by Cisco Systems, Inc.

January 30, 2014 - (Free Research)
In this exclusive resource, get the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution that fits your organization's needs. 
(WHITE PAPER) READ ABSTRACT |

JobClock by Exaktime

JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine. Each worker carries keytabs on their own keyring that identifies them in the system. 
(HARDWARE PRODUCT)

Mobility, Virtualization and the Next-Generation Workplace by Cisco Systems, Inc.

June 30, 2012 - (Free Research)
By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions. 
(WHITE PAPER) READ ABSTRACT |

SAP System Build and Landscape Management Activities by Cisco Systems, Inc.

June 30, 2010 - (Free Research)
Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components. 
(WHITE PAPER) READ ABSTRACT |

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications by Intermec

March 04, 2009 - (Free Research)
This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations. 
(WHITE PAPER) READ ABSTRACT |

How three SOA integration projects are connecting apps, processes by IBM

November 13, 2013 - (Free Research)
In this expert e-guide, hear three case stories of organizations who created SOA processes -- networking equipment giant Cisco Systems, Southwestern utility powerhouse UNS Energy Corp. and ever-expanding Chilean retailer Cencosud S.A -- and projects that allowed them to implement successful, ongoing integration projects. 
(EGUIDE) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise by Cisco (E-mail this company)

October 31, 2013 - (Free Research)
Access this white paper to take your first step toward an adaptable network platform –this enterprise network architecture provides the open, programmable, and application-aware foundation you need for today's mobile and cloud-connected world. 
(WHITE PAPER) READ ABSTRACT |

At-a-Glance: Cisco Regional WAN Solution Overview by Cisco Systems, Inc.

July 11, 2012 - (Free Research)
Read this white paper to learn how to upgrade your enterprise networking solution to deliver exciting new services such as cloud computing, virtual desktops, videoconferencing, and more to your remote branch-office environments in a secure, highly scalable, tightly integrated manner. 
(WHITE PAPER) READ ABSTRACT |

The Value of Integrated Security by Cisco Systems, Inc.

November 07, 2008 - (Free Research)
Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection. 
(WHITE PAPER) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise by Cisco (E-mail this company)

October 2013 - (Free Research)
Access this white paper to take your first step toward an adaptable network platform –this enterprise network architecture provides the open, programmable, and application-aware foundation you need for today's mobile and cloud-connected world. 
(WHITE PAPER) READ ABSTRACT |

Unleash the business opportunity of modern apps – 9 business challenges and modern app scenarios by Intel

December 2012 - (Free Research)
Access this paper today to learn about the four of the biggest trends influencing modern apps and find nine business scenarios that cover three important aspects of modern apps. Also inside, discover your own business opportunities using modern apps. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts