Review ApplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Review Application returned the following results.
RSS What is RSS?
Related Categories

 •   Text and Code Editing
 •   Source Code Control
 •   Requirements Management
 •   Automated Software Quality (ASQ)
 •   Storage Security
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Open Source
 •   Application Management and Maintenance
 •   Application Security

Related Searches
 •   Displays Review Application
 •   Improving Review
 •   Part Review Application
 •   Review Application Businesses
 •   Review Application Guidelines
 •   Review Application Hardware
 •   Review Application Indiana
 •   Review Application Methods
 •   Review Intranet
 •   Systems Review
Advertisement

ALL RESULTS
1 - 25 of 447 | Next Page

Application Security Assessment Options by Security Innovation

December 03, 2010 - (Free Research)
This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems. 
(EGUIDE) READ ABSTRACT |

Best Kept Secrets of Peer Code Review: Modern Approach Practical Advice by SmartBear Software

August 22, 2012 - (Free Research)
This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier. 
(EBOOK) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 14, 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

August 28, 2012 - (Free Research)
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more. 
(WHITE PAPER) READ ABSTRACT |

Can I Really Roll-out a Code Review Process That Doesn’t Suck? by SmartBear Software

August 27, 2012 - (Free Research)
This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more. 
(WEBCAST) READ ABSTRACT |

The Review Center Playbook: A how-to guide to using the Review Center within Contour by Jama Software

September 21, 2010 - (Free Research)
Review Center is a module within Contour that provides a fast and agile way to collaborate on requirements. It enables teams to discuss, review and approve requirements with stakeholders and customers in real-time. It can also cut requirements approval cycles from weeks to days. This playbook provides a step-by-step guide on how to use it. 
(WHITE PAPER) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Pocket E-Guide Review: Dell Latitude XT2 Review by Dell, Inc. and Intel®

December 2009 - (Free Research)
The Dell Latitude XT2 is a business-grade convertible notebook, offering multi-touch finger and digitized pen controls. Read this full NotebookReview.com review for a features and performance analysis of the Dell Latitude XT2. 
(EGUIDE) READ ABSTRACT |

Automating Your Code Review: Moving to a SaaS Model for Application Security by Veracode, Inc.

February 2009 - (Free Research)
Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security. 
(WHITE PAPER) READ ABSTRACT |

Software Agitation: Your Own Personal Code Reviewer by Agitar Software

March 2011 - (Free Research)
Agitator helps you debug your code while you write it - a benefit that no other existing Java Testing tool can claim. Agitator can also be extremely beneficial when run on legacy code - even code that has been reviewed by other developers and deemed to be “sufficient” and “properly written.” Learn how Agitar can be your own personal code reviewer. 
(WHITE PAPER) READ ABSTRACT |

ESG Lab Reviews Dell Integrated Data Protection: DR4100 with NetVault by Dell, Inc.

September 2013 - (Free Research)
IT teams are faced with swelling data volumes and expanding virtualization, both of which complicate your backup and recovery strategies. The DR4100 appliance, combined with NetVault, protects both physical and virtual servers, increases backup speed and provides recovery assurance for data and applications. Learn more in this ESG Lab review. 
(PRODUCT REVIEW) READ ABSTRACT |

Ensuring Code Quality in Multi-threaded Applications: How to Eliminate Concurrency Defects with Static Analysis by Coverity

March 2008 - (Free Research)
This paper will review the most common pitfalls that software developers face when creating multi-threaded applications. Discover how static analysis techniques can be used to eliminate concurrency defects earlier in the lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 18 October 2011: Download the latest issue of the UK's leading technology publication, where we analyse the latest news in IT and what it means for IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we talk to the CIO of the London 2012 Olympics about progress on the UK's highest-profile IT implementation. We ask customers about Oracle’s long-awaited Fusion Applications; review the latest version of Windows Server; and find out how the Blackberry outage affected corporate customers. Download the new issue now. 
(EZINE) READ ABSTRACT |

Barcodes vs RFID: The pros and cons of each side reviewed by IQMS

October 2013 - (Free Research)
This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction. 
(EGUIDE) READ ABSTRACT |

Entitlement Reviews: A Practitioner's Guide by Varonis

July 2009 - (Free Research)
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data. 
(WHITE PAPER) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

A Manager’s Guide to Perfecting Performance Management: How to Transform Your Employee Review Process by Ultimate Software

April 2013 - (Free Research)
Experts agree that traditional, once-a-year employee reviews are holding back business performance. This resource counts down six simple steps that will help you perfect employee performance management at your organization. 
(WHITE PAPER) READ ABSTRACT |

Pocket eGuide Review: Dell Latitude E6400 XFR by Dell, Inc. and Intel®

December 2009 - (Free Research)
In this review we put the Dell Latitude E6400 XFR through a battery of tests, to see how well it stands up against other fully-rugged notebooks. 
(EGUIDE) READ ABSTRACT |

The Realities of Single Sign-On by PistolStar, Inc.

June 2008 - (Free Research)
Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 20 March 2012: The open data revolution by ComputerWeekly.com

March 2012 - (Free Research)
In this week’s Computer Weekly, Cabinet Office minister Francis Maude talks about releasing government datasets to the public and why open data will drive the next industrial revolution. We also review the latest test version of Windows 8 and see how it shapes up for tablet computers and business users and much more. 
(EZINE)

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games. 
(EZINE)

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam by Global Knowledge

October 2008 - (Free Research)
This paper helps students understand the types of information required to pass the new 640-802 CCNA composite exam by providing a convenient review of the exam's critical concepts. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 447 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts