Source Codes Network WarehouseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Source Codes Network Warehouse returned the following results.
RSS What is RSS?
Related Categories

 •   Source Code Control
 •   Automated Security Auditing/ Source Code Analysis
 •   Open Source
 •   Application Security
 •   Embedded Application Development
 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance
 •   Enterprise Information Integration/ Metadata Management
 •   Automated Software Quality (ASQ)
 •   Data Warehousing

Related Searches
 •   Canadian Source Codes Network
 •   Guidelines Source
 •   Samples Source Codes Network
 •   Source Article
 •   Source Codes Network Crm
 •   Source Codes Network Diagram
 •   Source Codes Network Nebraska
 •   Source Conversion
 •   Source Researching
 •   Webcast Source
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

IBM Rational Team Concert Express-C Edition - FREE for up to 10 developers . Download Now! by IBM

November 12, 2010 - (Free Research)
Rational Team Concert enables Agile development teams to track work items, control source code, create and manage defects, and manage the lifecycle of software projects. Download now and get RTC-Express-C free for up to 10 developers or get your hands dirty in our live sandbox with no download required. 
(DOWNLOAD) READ ABSTRACT |

Master Data Management Projects in Practice - An Information Difference Research Study by Talend

December 01, 2009 - (Free Research)
Organizations are often turning to Master Data Management as a key enabler in improving the timeliness, quality and reliability of BI with the ultimate goal of improving business performance. This survey report presents recommendations on the "do and don't" of MDM as well as some findings on the use of open source and manual coding in MDM projects. 
(WHITE PAPER) READ ABSTRACT |

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by IBM

March 13, 2009 - (Free Research)
This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code. 
(WHITE PAPER) READ ABSTRACT |

The Event Data Warehouse- Strategies for Improving Business Performance by Hexis Cyber Solutions Inc

July 18, 2011 - (Free Research)
Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 07, 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

The Right Tool for the Right Job: An Application Security Tools Report Card by IBM

August 26, 2010 - (Free Research)
This white paper examines the most common tools found in the enterprise application security environment. 
(WHITE PAPER) READ ABSTRACT |

Driving Business Agility via a Software Supply Chain by Black Duck Software

July 2008 - (Free Research)
The purpose of this white paper is to lay out software development "supply chain" strategies, to nurture community culture, and to discuss techniques to improve code usage as software creation evolves toward greater complexity. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing by IBM

January 2011 - (Free Research)
Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Top Data Integration Trends and Best Practices by Talend

April 2011 - (Free Research)
Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations. 
(EBOOK)

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

Updating Rules for COBOL Generated Code to Use CICS Channels and Containers by IBM

December 2010 - (Free Research)
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM Redpaper™ publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL. 
(WHITE PAPER) READ ABSTRACT |

Sharing Security Intelligence: How to Build a Strong Network by Hexis Cyber Solutions Inc

June 2013 - (Free Research)
This expert e-guide from SearchSecurity.com explores how joining and creating strong security networks within which you share security intelligence data are crucial to avoiding security incidents and remaining secure. 
(EGUIDE) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

SANS Institute Making Database Security an IT Security Priority by Oracle Corporation

November 2009 - (Free Research)
Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Open Source Master Data Management - The Time is Right by Talend

March 2010 - (Free Research)
Proper master data management (MDM) is very valuable when available to enterprise business processes and analytics. However, master data projects are often challenging, architecturally complex, time intensive and expensive. This paper explains why the time is right for open source MDM, and predicts the effects of open source on the MDM marketplace. 
(WHITE PAPER) READ ABSTRACT |

The Role of Open Source Data Integration - An Analyst White Paper, by Mark Madsen by Talend

January 2009 - (Free Research)
This report by Mark Madsen will explain what data integration is, and especially the difference between Operational Data Integration and Analytic Data Integration. It highlights the benefits of open source for data integration, and provides a series of recommendations to make the integration job easier, repeatable and more productive. 
(ANALYST REPORT) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

A New Breed of Data Warehouse by ASG Software Solutions

February 2010 - (Free Research)
Read this paper to learn about an emerging data warehouse technology that addresses many of the implementation challenges organizations face. 
(WHITE PAPER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Successful Business Guide for Data Migration: Re-engineering Data for Optimized Value by Datanomic

April 2008 - (Free Research)
Up to 75% of new systems fail to meet expectations, often because flaws in the migration process result in invalid data. With an understanding of the challenges, managing the migration as part of the investment is much more likely to... 
(WHITE PAPER) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

Agile ALM Trends In SCCS, Requirements Management by Hewlett-Packard Company

June 2012 - (Free Research)
Did you know that the latest innovations for source code control systems (SCCS) and requirements management tools can not only help you enable a more agile software development process but also reap better returns on your application lifecycle management (ALM) investments? Read this expert e-zine to learn more. 
(EZINE)

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts