Recommended Standard Analysis SourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Recommended Standard Analysis Source returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Open Source
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Security Monitoring
 •   Security Policies
 •   Data Center Management
 •   Storage Security

Related Searches
 •   Guideline Recommended Standard Analysis
 •   Implementations Of Recommended
 •   National Recommended Standard
 •   Profile Recommended
 •   Recommended Buy
 •   Recommended Erp
 •   Recommended Roi
 •   Recommended Standard Louisiana
 •   Recommended Standard View
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

SAP Procurement Savings eBook by SAP America, Inc.

August 2012 - (Free Research)
Many of today's companies have third-party costs that equal up to 70% of revenue. To remain competitive, it is essential to use procurement applications to identify and accelerate savings and contribute to the bottom line. Access this eBook to learn how to close the loop between spend analysis, sourcing, and contract management. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc. (E-mail this company)

WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support every level of the global organization – executive, analytical, & operational – and make data available, accessible, and meaningful to every person or application that needs it. 
(SOFTWARE PRODUCT)

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

How to Certify or Re-certify Twisted-Pair Cabling for 10 Gb/s Ethernet by Fluke Networks

June 2008 - (Free Research)
This paper provides a background and an overview of the performance requirements for the twisted-pair cabling and methods to measure and certify the performance of the installed cabling system. 
(WHITE PAPER) READ ABSTRACT |

Scalable BI for Every Enterprise How Open Source BI Meets Enterprise-Class Requirements. by Jaspersoft

December 2010 - (Free Research)
Not every BI provider seeks to serve the scalable enterprise, but those that do must meet certain scalability criteria that are common to nearly every enterprise. This investigation exposes key scalability requirements for BI, and examines how the world's most widely used BI solution— notably, one that's open source— meet these requirements. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Core IMPACT Essential by Core Security Technologies

January 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Preparing an RFI for Virtualization and the PCI Data Security Standard by HyTrust

March 2011 - (Free Research)
This paper discusses how protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards and the requirements and guidelines for securing cardholder data are specified in the Payment Card Industry (PCI) Data Security Standard (DSS). 
(WHITE PAPER) READ ABSTRACT |

ER/Studio 7.5 by Embarcadero Technologies, Inc.

March 2008 - (Free Research)
Embarcadero® ER/Studio®, an industry-leading data modeling tool, helps companies discover, document, and re-use data assets while providing intuitive reverse engineering, logical modeling, and physical modeling. 
(DEMO) READ ABSTRACT |

SAP® Support of the Healthecare Supply Chain's Ongoing Effort to Ensure Patient Safety and Drive Business Value by SAP AG

June 2009 - (Free Research)
The Center for Healthcare Supply Chain Research (formerly the HDMA Research & Education Foundation) recently published an important study concerning data management and data sharing in the healthcare supply chain. This whitepaper discusses the key conclusions of their study. 
(WHITE PAPER) READ ABSTRACT |

Dirk Hohndel on Intel and the Linux Foundation by Intel

November 2010 - (Free Research)
In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel. 
(VIDEO)

Application Note: Structured Testing - The Path to Thorough Code Coverage by McCabe Software, Inc.

March 2011 - (Free Research)
Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing. 
(WHITE PAPER) READ ABSTRACT |

GlobalSCAPE’s Cloud-based Managed File Transfer Solution Helps AVI-SPL Streamline Global Operations by GlobalScape

July 2011 - (Free Research)
In this case study you will learn how GlobalSCAPE's cloud-based manged file transfer solution was able to help one business tremendously. Not only will you get insight into the different benefits of the solution, but you will also find out why GlobalSCAPE comes highly recommended due to customer service as well. 
(CASE STUDY) READ ABSTRACT |

Sun Business Intelligence Solution for Web Infrastructure by Sun Microsystems, Inc.

October 2009 - (Free Research)
The combination of Sun Open Storage and the commercial open-source Infobright data warehousing and Pentaho business intelligence and ETL software packages dramatically lowers the cost of entry and simplifies deployment of a powerful, sophisticated BI infrastructure. 
(PRODUCT OVERVIEW) READ ABSTRACT |

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems by McCabe Software, Inc.

April 2012 - (Free Research)
<p>Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.</p> 
(CASE STUDY) READ ABSTRACT |

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension

March 2009 - (Free Research)
Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions. 
(WHITE PAPER) READ ABSTRACT |

James Reinders Talks about Open Source Software by Intel

November 2010 - (Free Research)
Watch this video to learn how Intel tools support open source: supporting Linux operating systems, providing standards, and creating open source projects that enable developers to do truly innovative work. 
(VIDEO)

Top Four Considerations for Securing Microsoft SharePoint by Sophos, Inc.

March 2011 - (Free Research)
Microsoft SharePoint is now the standard for internal and external collaboration and content management in much the same way Microsoft Exchange has become the enterprise standard for email. And like Exchange, SharePoint comes with a similar set of adoption challenges: The need to maximize ROI, protect against malware and data loss and establish... 
(WHITE PAPER) READ ABSTRACT |

Solving Four Primary Security Challenges of Microsoft SharePoint by Sophos UK

November 2009 - (Free Research)
This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Power Management & Security within Open Source Private Cloud with Intel & OpenStack by Intel

September 2011 - (Free Research)
Security and compliance are primary concerns that are slowing cloud adoption in many enterprises. This white paper discusses open, standards-based cloud computing solutions designed to safely support scalable cloud infrastructures. Learn how you can leverage these technologies to ensure a highly efficient and secure cloud experience. 
(WHITE PAPER)

z Cisco Catalyst 2950 Series Switches with Standard Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Understanding EPO and Its Downtime Risks by APC by Schneider Electric

January 2005 - (Free Research)
This white paper describes the advantages and disadvantages of EPO for protecting data centers and small IT equipment rooms containing UPS systems. 
(WHITE PAPER) READ ABSTRACT |

CIO Guide: The Strategic Value of MySQL by Sun Microsystems, Inc.

March 2009 - (Free Research)
This white paper examines a model whereby CIOs can reduce their database costs significantly by adopting a heterogeneous database architecture and implement MySQL for a large part of their business critical and operational applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts