Social Whitepaper CodingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Social Whitepaper Coding returned the following results.
RSS What is RSS?
Related Categories

 •   Social Networks and Community Management
 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Policies
 •   Intrusion Prevention Solutions
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Anti-Virus Solutions
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Audit Social
 •   Budget Social Whitepaper Coding
 •   Issues Social Whitepaper Coding
 •   Manual Social Whitepaper
 •   Rfp Social Whitepaper
 •   Social Solutions
 •   Social Technologies
 •   Social Whitepaper Coding Office
 •   Social Whitepaper Consulting
 •   Social Whitepaper Plan
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to Avoid Hand-Coding Data Integration Issues by SnapLogic

January 30, 2014 - (Free Research)
This whitepaper discusses a smart alternative to hand-coding that utilizes a “hub-and-spoke” model and supports cloud integration. 
(WHITE PAPER) READ ABSTRACT |

Retailer Maximizes ROI on Digital Investments with Agility and Self-service by SnapLogic

December 31, 2013 - (Free Research)
In this brief case study, learn how a major retailer leveraged a cloud-based integration technology to achieve rapid integration of social media data across a variety of channels. Explore their integration strategy and discover the other benefits they experienced. 
(CASE STUDY) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 14, 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 27, 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Social Engineering: Hacking People, Not Machines by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 23, 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Turning Social Media into a Game-Changing Customer Care Channel by Aspect

May 23, 2013 - (Free Research)
Today's customers demand highly personalized, engaging experiences, and leveraging social media to transform your contact center is a way to surpass these expectations. Access this whitepaper to learn how combining contact center best practices with social media CRM technologies can increase the effectiveness of your customer interactions. 
(WHITE PAPER) READ ABSTRACT |

Inspiring disruption: Tech Trends 2014 by ComputerWeekly.com

February 26, 2014 - (Free Research)
This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Social 101: Using and Managing Social in SharePoint 2013 by Dell Software

July 18, 2013 - (Free Research)
This whitepaper challenges you to rethink the word social with SharePoint 2013's new features. 
(WHITE PAPER) READ ABSTRACT |

Unlock the 6 Secrets to Social Success by Jive Software

July 25, 2013 - (Free Research)
Uncover the top six secrets to social success and receive help implementing and/or adjusting your framework for the addition of social. Also view in-depth key actions you should take and questions you must answer to ensure your social strategy is a beneficial one. 
(WHITE PAPER) READ ABSTRACT |

Mobile Social Networking and the Next Generation of Handheld Devices by BlackBerry

February 25, 2009 - (Free Research)
This paper explains how social networking and the next generation of handheld devices will improve business decision-making through efficient, unified communications and location awareness. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

The Perfect Combo: ITIL, ITSM and Social Media by BMC Software, Inc.

February 24, 2014 - (Free Research)
This whitepaper details how social media is changing IT and covers the value it can bring to your service desk. 
(WHITE PAPER) READ ABSTRACT |

Running a Successful Enterprise 2.0 Pilot by NewsGator

May 17, 2010 - (Free Research)
NewsGator has years of experience running effective social computing solution pilots. Running a successful pilot not only boosts the value you can derive from your solution, it also prepares you for a successful companywide launch. This whitepaper will provide a framework for a successful pilot, give best practice tips and tricks, and more! 
(WHITE PAPER) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 10, 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

More Scale at Lower Cost with Scalable Video Coding by Polycom, Inc.

October 18, 2011 - (Free Research)
The demand for personal video for organizational communication is growing rapidly. By 2015, over 200 million workers globally will run corporate-supplied video conferencing from their desktops. 
(WHITE PAPER) READ ABSTRACT |

2010 Threat Report by Websense, Inc.

January 11, 2011 - (Free Research)
Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: July 2009 Update by Sophos, Inc.

July 01, 2009 - (Free Research)
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers. 
(WHITE PAPER) READ ABSTRACT |

Web 2.0 @ Work: How CIOs Can Help Drive Business Returns by Improving Organizational Effectiveness by IBM

January 15, 2009 - (Free Research)
Without access to historical information, organizations today would be severely limited in their ability to make informed, appropriate decisions regarding even the most basic aspects of their business. This whitepaper outlines the four keys to success and discusses the ROI of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

ABBYY TextGrabber + Translator Mobile App by ABBYY

September 29, 2011 - (Free Research)
This video details a text-grabbing and translator app that lets you save printed text from any magazine, book, document, etc. – in more than 60 languages – on your device. View now to learn how this app can immediately edit, translate, publish to social media, or forward by e-mail or SMS. 
(VIDEO) READ ABSTRACT |

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse by Instantiations

February 12, 2008 - (Free Research)
This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development. 
(WHITE PAPER) READ ABSTRACT |

Bringing Order to the Chaos of “Bring Your Own Device” by Enterasys

April 30, 2012 - (Free Research)
In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this. 
(WHITE PAPER) READ ABSTRACT |

Taking A User-Centric Approach to IT by BMC Software, Inc.

March 21, 2014 - (Free Research)
This whitepaper covers a solution that will help you deliver a more mobile, social and user-centric approach to IT. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Data scientists helping businesses navigate ‘big data’ seas by Sybase, an SAP company

February 29, 2012 - (Free Research)
Data scientists are adept at a combination of analytical, statistical, machine-learning, coding and quantitative skills, with the desire and willingness to explore voluminous amounts of data. Check out this expert tip guide from SearchBusinessAnalytics.com to learn how a data scientist can help your business navigate the big data landscape. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts