Penn National Code ArticlesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Penn National Code Articles returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Testing and Analysis
 •   Text and Code Editing
 •   Source Code Control
 •   Data Center Management
 •   Intrusion Prevention Solutions
 •   Embedded Application Development

Related Searches
 •   Articles About Penn National Code
 •   Disk Penn National
 •   Examples Of Penn
 •   Features Penn
 •   File Penn National Code
 •   Format Penn National Code
 •   Penn National Analysis
 •   Penn National Code Developments
 •   Penn Schedule
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Penn National Insurance: Real-Time Documents Provide Faster Time to Market with a Personal Touch by Exstream Software

April 2008 - (Free Research)
Penn National Insurance wanted to deploy a single, comprehensive infrastructure for its batch and real-time document applications. Exstream Software's Dialogue enterprise personalization solution met this goal, improving time to market ... 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Case Study: Reducing DR Costs and Complexity by IBM

May 2012 - (Free Research)
Penn State Hershey's research and patient care centers rely on a huge volume of data, ranging from files generated by its imaging modality systems to patient records. Penn State Hershey turned to IBM's XIV storage system, which delivered the performance and availability to make their disaster recovery program feasible almost overnight. 
(CASE STUDY) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Lowering the Cost of Test with Integrated Switch Management by National Instruments

February 2002 - (Free Research)
National Instruments Switch Executive is a significant innovation in the design and implementation of automated test systems. 
(WHITE PAPER)

Expert Analyst Reviews the Ins and Outs of Database Encryption by Guardium, an IBM Company

February 2010 - (Free Research)
In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project. 
(EGUIDE) READ ABSTRACT |

Application Note: Structured Testing - The Path to Thorough Code Coverage by McCabe Software, Inc.

March 2011 - (Free Research)
Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Reaping the Benefits of Business Agility with Cloud Computing: Real-World Profiles by VMware, Inc.

August 2013 - (Free Research)
Not every cloud fits every organization, but a well-employed cloud can mean serious cost reductions and significantly increased business agility. Learn how cloud computing platform implementation drives business agility in a number of real-world case studies detailed in the following article. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments by CollabNet

April 2012 - (Free Research)
Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex. 
(EGUIDE) READ ABSTRACT |

System Grounding and Ground Fault Protection for Data Centers by Square D Critical Power Competency Center

November 2008 - (Free Research)
This paper presents the fundamentals of power system grounding, definitions and requirements of the National Electrical Code with respect to grounding, the need for low voltage ground fault protection and how it is implemented. 
(WHITE PAPER) READ ABSTRACT |

Gaming Health Meter with CSS3 by Intel

December 2011 - (Free Research)
This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc. 
(TECHNICAL ARTICLE)

Big Data in Motion by SearchCIO.com

March 2014 - (Free Research)
When large information sets are in transit, bottlenecks inevitably occur. CIOs must overcome these obstacles in order to extract real value from their data. In this SearchCIO handbook, we confront the obstacles posed by big data in motion. 
(EBOOK) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 8 by SearchBusinessAnalytics

August 2012 - (Free Research)
Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes. 
(EGUIDE) READ ABSTRACT |

Developing WS-Management Solutions for Intel® Active Management Technology by Intel

October 2009 - (Free Research)
This article describes how to develop flexible WS Management-based solutions for Intel® Active Management Technology using the .NET development environment. The basic ingredients and building blocks of a WSMan-based solution will be presented. We've included some coding samples (written using Windows 2008) to help illustrate this information. 
(TECHNICAL ARTICLE)

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

8 Simple Rules for Designing Threaded Applications by Intel Software Network

November 2007 - (Free Research)
This article gives 8 Simple Rules that you can add to your palette of threading design methods. By following these rules you will have more success in writing the best and most efficient threaded implementation of your applications. 
(WHITE PAPER)

J2EE without Application Server (J2EE Is Easy!) by Atomikos

February 2008 - (Free Research)
This article proposes a further simplification of J2EE, by showing a way to eliminate the overhead of the runtime platform: the application server. 
(WHITE PAPER) READ ABSTRACT |

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by Sophos, Inc.

April 2011 - (Free Research)
Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore. 
(WHITE PAPER) READ ABSTRACT |

Speeding the Time to Intelligence: Effective Information Management through Business Intelligence Competency Centers and Performance Management by SAS

May 2008 - (Free Research)
This article explains in detail about how to arrive at and implement an effective business intelligence strategy, using both a BICC and performance management technology. 
(WHITE PAPER) READ ABSTRACT |

The Security for Business Innovation Council (SBIC) report, 'Getting Ahead of Advanced Threats' by EMC Corporation

May 2012 - (Free Research)
In an era of advanced threats, having greater situational awareness is vital for detecting and mitigating attacks. Unfortunately, most organizations lack the capability for intelligence gathering and analysis. In this comprehensive report, gain guidance from top security leaders on how to get ahead with intelligence-driven information security. 
(WHITE PAPER) READ ABSTRACT |

Roundup: How to integrate IBM Rational Team Concert with other software by IBM

May 2011 - (Free Research)
Based on the Jazz platform, IBM Rational Team Concert provides a lean collaborative lifecycle management solution by integrating with other software. Check out this listing of articles, demos, and tutorials to see what might help you. 
(RESOURCE CENTER) READ ABSTRACT |

SQL Compatibility in DB2 9.7-- From triggers to object enhancements: A demonstration of the new PL/SQL compatibility features by IBM

September 2010 - (Free Research)
This article overviews the new PL/SQL compatibility features in IBM DB2 software version 9.7, making it easier to adopt and allowing you to take advantage of its autonomic and high-performance characteristics.  
(WHITE PAPER) READ ABSTRACT |

E-Guide: Storage Choices for Virtual Machine Disaster Recovery by Hewlett-Packard Company

September 2008 - (Free Research)
When evaluating storage solutions for DR in a virtual environment, there are several aspects you should consider. In this E-Guide discover several concerns to be aware of when planning for disaster recovery in a virtual server environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts