Social Whitepaper CodingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Social Whitepaper Coding returned the following results.
RSS What is RSS?
Related Categories

 •   Social Networks and Community Management
 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Policies
 •   Intrusion Prevention Solutions
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Anti-Virus Solutions
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Calendar Social Whitepaper
 •   Download Social Whitepaper
 •   Manual Social Whitepaper
 •   Measured Social
 •   Social Automation
 •   Social Calendars
 •   Social Webcast
 •   Social Whitepaper Coding Office
 •   Social Whitepaper Directory
 •   Social Whitepaper Enterprise
Advertisement

ALL RESULTS
1 - 25 of 451 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Social Engineering: Hacking People, Not Machines by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 14, 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 27, 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 23, 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Inspiring disruption: Tech Trends 2014 by ComputerWeekly.com

February 26, 2014 - (Free Research)
This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Unlock the 6 Secrets to Social Success by Jive Software

July 25, 2013 - (Free Research)
Uncover the top six secrets to social success and receive help implementing and/or adjusting your framework for the addition of social. Also view in-depth key actions you should take and questions you must answer to ensure your social strategy is a beneficial one. 
(WHITE PAPER) READ ABSTRACT |

Mobile Social Networking and the Next Generation of Handheld Devices by BlackBerry

February 25, 2009 - (Free Research)
This paper explains how social networking and the next generation of handheld devices will improve business decision-making through efficient, unified communications and location awareness. 
(WHITE PAPER) READ ABSTRACT |

The Perfect Combo: ITIL, ITSM and Social Media by BMC Software, Inc.

February 24, 2014 - (Free Research)
This whitepaper details how social media is changing IT and covers the value it can bring to your service desk. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 10, 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

More Scale at Lower Cost with Scalable Video Coding by Polycom, Inc.

October 18, 2011 - (Free Research)
The demand for personal video for organizational communication is growing rapidly. By 2015, over 200 million workers globally will run corporate-supplied video conferencing from their desktops. 
(WHITE PAPER) READ ABSTRACT |

2010 Threat Report by Websense, Inc.

January 11, 2011 - (Free Research)
Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats. 
(WHITE PAPER) READ ABSTRACT |

The Future of IT: A Customer First Approach by BMC Software, Inc.

February 13, 2013 - (Free Research)
This whitepaper covers a new approach IT has to take in treating its internal users like customers, focusing on and catering to their needs. 
(WHITE PAPER) READ ABSTRACT |

Running a Successful Enterprise 2.0 Pilot by NewsGator

May 17, 2010 - (Free Research)
NewsGator has years of experience running effective social computing solution pilots. Running a successful pilot not only boosts the value you can derive from your solution, it also prepares you for a successful companywide launch. This whitepaper will provide a framework for a successful pilot, give best practice tips and tricks, and more! 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: July 2009 Update by Sophos, Inc.

July 01, 2009 - (Free Research)
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers. 
(WHITE PAPER) READ ABSTRACT |

ABBYY TextGrabber + Translator Mobile App by ABBYY

September 29, 2011 - (Free Research)
This video details a text-grabbing and translator app that lets you save printed text from any magazine, book, document, etc. – in more than 60 languages – on your device. View now to learn how this app can immediately edit, translate, publish to social media, or forward by e-mail or SMS. 
(VIDEO) READ ABSTRACT |

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse by Instantiations

February 12, 2008 - (Free Research)
This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development. 
(WHITE PAPER) READ ABSTRACT |

Web 2.0 @ Work: How CIOs Can Help Drive Business Returns by Improving Organizational Effectiveness by IBM

January 15, 2009 - (Free Research)
Without access to historical information, organizations today would be severely limited in their ability to make informed, appropriate decisions regarding even the most basic aspects of their business. This whitepaper outlines the four keys to success and discusses the ROI of Web 2.0. 
(WHITE PAPER) READ ABSTRACT |

Bringing Order to the Chaos of “Bring Your Own Device” by Enterasys

April 30, 2012 - (Free Research)
In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Data scientists helping businesses navigate ‘big data’ seas by Sybase, an SAP company

February 29, 2012 - (Free Research)
Data scientists are adept at a combination of analytical, statistical, machine-learning, coding and quantitative skills, with the desire and willingness to explore voluminous amounts of data. Check out this expert tip guide from SearchBusinessAnalytics.com to learn how a data scientist can help your business navigate the big data landscape. 
(EGUIDE) READ ABSTRACT |

Security Threat Report: July 2009 Update by Sophos, Inc.

July 06, 2009 - (Free Research)
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers. 
(WHITE PAPER) READ ABSTRACT |

2010: Cybercrime Coming of Age by ESET

January 01, 2010 - (Free Research)
In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out. 
(WHITE PAPER) READ ABSTRACT |

Evolving APM: Big Data Approach, Integrated End-user Experience Monitoring Bring Deep End-to-end Application visibility by Riverbed Technology, Inc.

January 24, 2014 - (Free Research)
This whitepaper examines a solution that leverages existing big data capabilities, integrates end-user experience monitoring and uses integrated development environment tools to maintain deep end-to-end application visibility. 
(WHITE PAPER) READ ABSTRACT |

Software and Licensing Costs Report: Demanding Pricing That Matches Business Value by Asigra

January 04, 2013 - (Free Research)
This whitepaper describes the software pricing and licensing landscape and explains why implementing an updated software sourcing approach is critical in today's market. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 451 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts