Storage CodeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Storage Code returned the following results.
RSS What is RSS?
Related Categories

 •   Source Code Control
 •   Automated Software Quality (ASQ)
 •   Text and Code Editing
 •   Automated Security Auditing/ Source Code Analysis
 •   Testing and Analysis
 •   Application Security
 •   Embedded Application Development
 •   Code Algorithms
 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance

Related Searches
 •   Developments Storage Code
 •   Documents Storage Code
 •   Firms Storage Code
 •   Improvements Storage Code
 •   Projects Storage Code
 •   Storage Code Functions
 •   Storage Code Plan
 •   Storage Code Reseller
 •   Storage Code Tracking
 •   Storage Multi
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - April 2010: Endpoints on the Loose by Information Security Magazine

April 07, 2010 - (Free Research)
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more. 
(EZINE)

More Scale at Lower Cost with Scalable Video Coding by Polycom, Inc.

October 18, 2011 - (Free Research)
The demand for personal video for organizational communication is growing rapidly. By 2015, over 200 million workers globally will run corporate-supplied video conferencing from their desktops. 
(WHITE PAPER) READ ABSTRACT |

Successfully Scanning Shipping Container Codes by Intermec

August 13, 2013 - (Free Research)
Read this case study to learn how a large European shipping company integrated an Intermec Imaging Solution to resolve issues associated with their manual recording process of container codes and estimates considerable man-hour savings and improved container code recording accuracy. 
(CASE STUDY) READ ABSTRACT |

SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies by SearchWinIT

May 18, 2010 - (Free Research)
When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk. 
(EZINE)

Presentation Transcript: Data Protection Methods for Object Stores by Quantum Corporation

November 21, 2012 - (Free Research)
If you have billions and billions of files and you want to use a storage system that doesn't have the restrictions of a standard file system, you can use an object store. Check out this expert transcript to learn more about object store and four different data protection methods used for this type of storage. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SAP System Build and Landscape Management Activities by Cisco Systems, Inc.

June 30, 2010 - (Free Research)
Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components. 
(WHITE PAPER) READ ABSTRACT |

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks by IronKey

March 06, 2009 - (Free Research)
Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Backup Challenges and Expert Recommendations to Address Them by SearchStorage.com

November 12, 2013 - (Free Research)
This e-guide reports today's top backup challenges companies are struggling to address and explains how erasure coding, object storage, and other innovative approaches can eliminate the need to restore, enabling instant recovery instead. Read on now to learn more. 
(EGUIDE) READ ABSTRACT |

Technical Evolution to Deliver Business Value by IBM

October 31, 2013 - (Free Research)
This in-depth resource explores flash adoption rates, how IT organizations are implementing flash, and where flash can be valuable to your organization. 
(WHITE PAPER) READ ABSTRACT |

Write Java code 17% faster by eliminating app server restarts by ZeroTurnaround

March 31, 2014 - (Free Research)
Software development is an iterative process, meaning that developing a single component can result in cycles of code change, deploy, and test. However, multiple deployments and restarts to different application servers can be time-consuming. Fortunately, this white paper introduces a way for developers to instantly see the results of code changes. 
(WHITE PAPER) READ ABSTRACT |

Code with Java simpler, faster, and easier by ZeroTurnaround

December 31, 2012 - (Free Research)
Java developers know that testing code changes can be a huge pain, and waiting for an application to redeploy after a code fix can take an eternity. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages? 
(WHITE PAPER) READ ABSTRACT |

Norman Regional Increases Coding Productivity, Manages RAC Processes, and Prepares for ICD-10 by Nuance

February 28, 2013 - (Free Research)
This white paper dives into a case study of one health organization that implemented a top coding solution to improve coder productivity and accuracy, and ensure long term retention of exceptional coders by transitioning to remote coding. 
(WHITE PAPER) READ ABSTRACT |

Software Agitation: Your Own Personal Code Reviewer by Agitar Software

March 10, 2011 - (Free Research)
Agitator helps you debug your code while you write it - a benefit that no other existing Java Testing tool can claim. Agitator can also be extremely beneficial when run on legacy code - even code that has been reviewed by other developers and deemed to be “sufficient” and “properly written.” Learn how Agitar can be your own personal code reviewer. 
(WHITE PAPER) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Secure Coding for C/C++ by Klocwork

September 2011 - (Free Research)
When budgets, customers and reputations are at stake, software developers need every available tool to ensure that applications and code are as secure as possible. Going a step above and beyond, this interactive online learning center provides detailed lessons for securing C/C++ code. 
(RESOURCE CENTER) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Empower your Developers by Coverity

May 2011 - (Free Research)
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development. 
(WHITE PAPER) READ ABSTRACT |

Malicious Code Detection Technologies by Kaspersky Lab

February 2008 - (Free Research)
This white paper provides an overview of the evolving combat tactics used in the antivirus battle, giving both simplified explanations of technological approaches as well as a broad chronological perspective. 
(WHITE PAPER) READ ABSTRACT |

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse by Instantiations

February 2008 - (Free Research)
This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development. 
(WHITE PAPER) READ ABSTRACT |

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by IBM

March 2009 - (Free Research)
This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code. 
(WHITE PAPER) READ ABSTRACT |

A Computer Weekly buyer's guide to testing and code quality by ComputerWeekly.com

May 2014 - (Free Research)
Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

August 2012 - (Free Research)
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more. 
(WHITE PAPER) READ ABSTRACT |

Can I Really Roll-out a Code Review Process That Doesn’t Suck? by SmartBear Software

August 2012 - (Free Research)
This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more. 
(WEBCAST) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts