Webcast Top Statement CodingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Webcast Top Statement Coding returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Application Security
 •   Business Process Management (BPM)
 •   Automated Security Auditing/ Source Code Analysis
 •   Application Lifecycle Management(ALM)
 •   Testing and Analysis
 •   Endpoint Security
 •   Intrusion Prevention Solutions
 •   Database Tuning
 •   Database Administration

Related Searches
 •   Codes Webcast
 •   Group Webcast Top
 •   Mac Webcast Top
 •   Objectives Webcast Top
 •   Profile Webcast
 •   Statements Webcast
 •   Webcast Contacts
 •   Webcast Top Plan
 •   Webcast Top Sql
 •   Webcast Top Statement White Paper
Advertisement

ALL RESULTS
1 - 25 of 450 | Next Page

VIPRE Takes A Bite Out Of Bloatware by Sunbelt Software

July 30, 2009 - (Free Research)
Sunbelt Software's new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges by Panaya, Inc.

April 07, 2010 - (Free Research)
This presentation transcript of the webcast “Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges” explores the top challenges of an SAP ERP 6.0 upgrade and provides must-know advice, real-world examples, technical tips and other tricks to help you solve them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Embarcadero® DB Optimizer™ by Embarcadero Technologies, Inc.

May 14, 2009 - (Free Research)
Poor performing SQL code is costly in terms of dollars and customer satisfaction. Discovering performance bottlenecks once they're in production is costly. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Mobile App Top 10 Risks by Veracode, Inc.

February 15, 2011 - (Free Research)
This expert webcast reveals the top 10 mobile application risks facing organizations today. 
(WEBCAST) READ ABSTRACT |

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities by McCabe Software, Inc.

November 10, 2010 - (Free Research)
The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Providing Top-Notch Customer Service With the Latest Communications Technologies by Cisco Systems, Inc.

July 15, 2013 - (Free Research)
This informative case study examines how a full-service financial institution utilized a collaboration platform to meet a broad set of requirements, including high availability and scalability, intelligent call routing and integration with email and existing solutions. 
(WHITE PAPER) READ ABSTRACT |

Niksun NetDetectorLIVE Data Sheet by NIKSUN

NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks. 
(HARDWARE PRODUCT)

TCO of Unified Communications (Mason Analysis) by Cisco Systems, Inc.

January 28, 2014 - (Free Research)
This informative paper discusses how your organization can adopt a feature-rich, future-proof unified communications (UC) solution for significantly less cost than similar solutions on the market, and compares the TCO of some of the leading UC tools. 
(ANALYST REPORT) READ ABSTRACT |

Desktop Virtualization Solutions Overview: Features, Benefits by Cisco Systems, Inc.

July 15, 2013 - (Free Research)
View this video overview to hear about the features and benefits of an advanced desktop virtualization platform built upon leading technologies that delivers agile, cost-effective and reliable desktop virtualization for your business. 
(VIDEO) READ ABSTRACT |

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 01, 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server by EnterpriseDB Corporation

March 14, 2008 - (Free Research)
This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code. 
(TRAINING GUIDE) READ ABSTRACT |

Norman Regional Increases Coding Productivity, Manages RAC Processes, and Prepares for ICD-10 by Nuance

February 28, 2013 - (Free Research)
This white paper dives into a case study of one health organization that implemented a top coding solution to improve coder productivity and accuracy, and ensure long term retention of exceptional coders by transitioning to remote coding. 
(WHITE PAPER) READ ABSTRACT |

Can I Really Roll-out a Code Review Process That Doesn’t Suck? by SmartBear Software

August 27, 2012 - (Free Research)
This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more. 
(WEBCAST) READ ABSTRACT |

Service-Oriented Messaging by LEGACY DO NOT USE - IBM Corporation

December 2007 - (Free Research)
This Webcast explores the key elements necessary for improved SOA messaging. In this Webcast, you will examine the messaging benefits associated with JMS, HTTP, REST, SOAP, WS-Addressing, WS-ReliableMessaging, traditional message queues and intermediaries. You will how to leverage various messaging constructs during the services design process. 
(WEBCAST)

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Predicting Oracle Performance Issues by Dell Software

December 2010 - (Free Research)
View this white paper to learn how to predict common Oracle database performance problems before they become issues for your applications. Learn how to ensure business continuity and reduce the cost of database performance "brown-outs" by reading now. 
(WHITE PAPER) READ ABSTRACT |

Avoiding the Top Three Challenges of Custom-Coded SharePoint Applications by Dell Software

February 2013 - (Free Research)
This white paper discusses the top three challenges of custom-coded SharePoint applications and how to avoid them. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Path to a Secure Application by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Slash Document Archive Storage Costs up to 90% and Enhance ePresentment Performance by Xenos Group Inc.

February 2009 - (Free Research)
This White Paper is intended for Enterprise Architects, Senior Line of Business Managers, and Managers of Marketing, CRM, High Volume Output and Archiving. The challenges of handling the costs and achieving the customer retention benefits related to archiving and online ePresentment of High Volume Transactional Output are identified... 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Worst Practices in SOA Implementation: Why Service-Oriented Architectures Fail by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
Service-oriented architecture (SOA) enables different programs, applications, and tools to interact via self-contained services that do not depend on the context or state of the other service. This white paper provides insight into the top-four worst practices for SOA integration, and how to avoid and/or overcome these worst practices. 
(WHITE PAPER) READ ABSTRACT |

Top Data Integration Trends and Best Practices by Talend

April 2011 - (Free Research)
Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations. 
(EBOOK)

Performance Optimization: Extending the IT Infrastructure by Embarcadero Technologies, Inc.

May 2009 - (Free Research)
Performance optimization is a key ingredient in the struggle to stretch an invested IT dollar to its absolute limit. Read this whitepaper to learn about the 3-step 'prevent, find, fix' approach to handling performance optimization problems at any stage of the development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Onboarding suppliers to sustainable supply chain by IBM

January 2012 - (Free Research)
It is essential to convey sustainability in a meaningful way to manufacturers and clear manner for suppliers. In this tip guide, you will learn best practices for green manufacturing policies, tips for overcoming resistance to green supply chain management and expert insights to identify and manage performance metrics. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 450 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts