Software Testing Business FormWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Software Testing Business Form returned the following results.
RSS What is RSS?
Related Categories

 •   Testing and Analysis
 •   Application Lifecycle Management(ALM)
 •   Application Security
 •   Business Process Management (BPM)
 •   Load, Stress & Performance Testing
 •   Endpoint Security
 •   Application Management and Maintenance
 •   Automated Software Quality (ASQ)
 •   Vulnerability Assessment
 •   Network Security

Related Searches
 •   Faq Software Testing
 •   Software Testing Benefit
 •   Software Testing Business Budgeting
 •   Software Testing Business Example
 •   Software Testing Business Expert
 •   Software Testing Business Improving
 •   Software Testing Files
 •   Software Testing Screen
 •   Spreadsheet Software Testing
 •   Trends Software Testing
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Economics of Software Testing: Service Virtualization by IBM

April 22, 2013 - (Free Research)
See how Service Virtualization is helping companies save millions while achieving higher quality and faster releases. 
(WHITE PAPER) READ ABSTRACT |

Why testing is key to software development by Hewlett-Packard Limited

October 28, 2013 - (Free Research)
This expert E-Guide looks at how testing is becoming ingrained in software development and weighs up the options available for software testing. 
(EGUIDE) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-end Approach by Hewlett-Packard Company

December 23, 2008 - (Free Research)
This white paper explains a structured way to manage requirements and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 27, 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 23, 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

CA LISA Service Virtualization by CA Technologies

December 31, 2012 - (Free Research)
In this data sheet, explore business-critical information on service virtualization and how it allows your development team to move more quickly without sacrificing quality or testing. Read on to learn more about service virtualization platforms and your company. 
(WHITE PAPER) READ ABSTRACT |

TestStand 2.0.1 – Reducing the Cost of Manufacturing Test by National Instruments

April 01, 2002 - (Free Research)
With TestStand, manufacturing test developers create automated test systems that dramatically reduce the cost of testing products by increasing throughput and reducing test development time. 
(WHITE PAPER)

Webcast: An integrated testing strategy for your 5-star mobile apps by IBM

May 08, 2013 - (Free Research)
Learn how to test mobile applications quickly and efficiently while keeping costs in line. 
(WEBCAST) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 03, 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

Expert Integrated Systems: Can you put expertise in a box? by IBM

March 18, 2013 - (Free Research)
Can you package expertise? More and more IT executives are adopting a new approach that makes it easier, faster and less expensive to deploy infrastructure and applications by integrating hardware, software and field-tested "patterns of expertise" in the form of expert integrated systems. Find out more. 
(PODCAST) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 30, 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

How to build an effective User Acceptance Testing (UAT) Team by ComputerWeekly.com

September 23, 2013 - (Free Research)
Learn how to build an effective User Acceptance Testing (UAT) team with this extract from User Acceptance Testing, a step by step guide. 
(BOOK) READ ABSTRACT |

Elementool Bug Tracking Keeps Software Fixes on Course by Elementool, Inc.

January 2008 - (Free Research)
Can you list all the issues your software team is working on? Can you sort them by severity, priority, features affected, and other criteria? Can you show the histories of all related actions? This article details how Elementool Bug Tracking can help. 
(ARTICLE) READ ABSTRACT |

8 Seconds to Capture Attention: Silverpop's Landing Page Report by Silverpop Systems Inc.

August 2008 - (Free Research)
It's estimated that up to 50 percent of visitors to landing pages will bail in the first eight seconds. This evaluation explains how putting more effort on nurturing recipients once they hit those landing pages would be time and money well spent. 
(WHITE PAPER) READ ABSTRACT |

Business Rule Management: Automating Policy Management by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses how business rules management systems can be used to meet the diverse range of stakeholder requirements associated with an automated policy management system. 
(WHITE PAPER) READ ABSTRACT |

CW Special report on Capgemini by ComputerWeekly.com

August 2012 - (Free Research)
This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Designing Artificial Intelligence for Games (Part 1) by Intel Software Network

June 2009 - (Free Research)
This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors. 
(WHITE PAPER)

eBook: Must-Know Applications Trends for Oracle Developers by CipherSoft, Inc., A subsidiary of Unify Corp.

August 2009 - (Free Research)
Since Forms technology is widely in use in many Oracle environments, it's critical that developers and IT professionals understand Oracle's short and long term plans that could affect their strategies. Read more about the key trends that may affect how your organization uses Oracle Forms, a component of Oracle Fusion Middleware. 
(EBOOK) READ ABSTRACT |

2010 Endpoint Risk Assessment: Internal Vulnerabilities by Promisec

May 2011 - (Free Research)
This study will show you the most common security issues that were found and how they were dealt with by the various organizations. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

IT@Intel White Paper: Remediating Applications when Migrating from Microsoft Windows XP to Microsoft Windows 7 by Intel

May 2010 - (Free Research)
Read this paper to learn why Intel is migrating from Microsoft Windows XP to Microsoft Windows 7, and how the new system is expected to boost long-term performance, security, manageability, and productivity needs. 
(WHITE PAPER)

Move Web Application Security Testing into Your Development Cycle by IBM

October 2008 - (Free Research)
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so. 
(WHITE PAPER)

FlexiCapture Drives Business For the Insurance Industry by ABBYY

February 2011 - (Free Research)
Insurance agents across the country are saving time, saving money and writing more business using AppReader: The automated form conversion solution that allows applications to upload instantly to carrier systems, regardless of agency management system. Read on and find how how AppReader can benefit your business. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Introducing the PowerEdge M805 and PowerEdge M905 Blade Servers by Dell and Microsoft

December 2008 - (Free Research)
Dell PowerEdge M805 and PowerEdge M905 fullheight blade servers are designed to deliver outstanding performance in virtualized and database-intensive environments. 
(TECHNICAL ARTICLE) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts