What Is Softwares TechniquesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: What Is Softwares Techniques returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Security Monitoring
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance
 •   Network Security
 •   Endpoint Security
 •   Managed Security Services
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Application Of What
 •   Concerns What Is Softwares
 •   Contract What
 •   History What
 •   Version What
 •   What Is Conference
 •   What Is Softwares Forms
 •   What Is System
 •   What Reporting
 •   What Texas
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 16, 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 17, 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 22, 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Coaching Techniques for Dealing with Underperformers by Global Knowledge Network, Inc.

May 2004 - (Free Research)
People do not perform at their job for one of two reasons: either they can't or they won't. The second type of employee is the one we will address in this paper- the employee who chooses not to do his or her job for whatever reason. 
(WHITE PAPER) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

The Definitive Guide to Windows Application Server and Backup 2.0 - Chapter 3: Whole Server Backups by AppAssure Software, Inc.

September 2009 - (Free Research)
Ready to start ensuring solid backups in your environment, the Backup 2.0 way? That's what this chapter is all about, and what I call "whole server backups" is definitely the right place to begin. In this chapter, we'll discuss all the most common types of servers, what their native solutions look like, and assemble a Backup 2.0 wishlist. 
(WHITE PAPER) READ ABSTRACT |

Smart Techniques for Application Security: Whitebox + Blackbox Security Testing by IBM

March 2010 - (Free Research)
Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

Network Evolution University: Cloud Networking- Designing the Hybrid Cloud by SearchNetworking.com

May 2013 - (Free Research)
This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it. 
(VIRTUAL SEMINAR) READ ABSTRACT |

E-Book: Understanding SaaS/Cloud Application Integration: Tips, Techniques and Getting Started by Dell Boomi

May 2010 - (Free Research)
Integrating cloud applications with in-house legacy applications can be a difficult undertaking. The good news is that there are more options than ever that allow organizations to do all the integration themselves. This e-book examines what you need to know to develop the right cloud application integration strategy for your organization. 
(EBOOK) READ ABSTRACT |

Erick Steffens on 1st, middle, last mile and symmetric/asymmetric acceleration by Limelight Networks, Inc.

May 2014 - (Free Research)
In the following FAQ, expert Erick Steffens reveals how innovative businesses are optimizing their systems, strategies and processes, leveraging content delivery networks, and implementing techniques such as symmetric/asymmetric acceleration to vastly improve content delivery to the end user. 
(VIDEO) READ ABSTRACT |

Presentation Transcript: Big Data Analytics: Emerging Techniques and Technology for Growth and Profitability by Endeca Technologies, Inc.

December 2011 - (Free Research)
This transcript of a webcast with Forrester Research principal analyst, Boris Evelson, will answer all your pressing questions about the value of your unstructured data and how you can successfully manage it. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Best Bets for Backup: How to Choose a Dedupe Method by EMC Corporation

September 2011 - (Free Research)
This expert e-guide discusses what you need to know to choose the right deduplication technology for your backup and recovery needs by outlining 5 different types of dedupe. 
(EGUIDE) READ ABSTRACT |

Next Generation Network Management Techniques by SearchSecurity.com

February 2012 - (Free Research)
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles! 
(EZINE) READ ABSTRACT |

Business Analytics: Helping You Put an Informed Foot Forward by SAS

July 2010 - (Free Research)
What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more. 
(WHITE PAPER) READ ABSTRACT |

Get Analytics Right from the Start by Sybase, an SAP company

August 2010 - (Free Research)
Whether or not analytics should become an integral part of an organization’s planning and decision-making seems to be beyond question However, at what level, for what purpose and how to go about deploying analytics are questions that each organization needs to answer for itself. These questions are the focus of this paper. 
(WHITE PAPER) READ ABSTRACT |

Expert Insight: Backup, DR and Archiving—What's the Real Difference? by EMC Corporation

October 2013 - (Free Research)
This e-guide highlights the connection points and key differences between each of these data protection activities. It also examines your peers' top backup and recovery pain points and highlights the latest tools and techniques that can help to address them. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

The secrets of highly effective data governance programs by Pitney Bowes Group 1 Software

September 2011 - (Free Research)
The first key to a successful data governance program is ensuring user and organization expectations. To find out more secret advice for highly effective data governance programs read this expert e-Book. Our editorial team has gathered tips, techniques and best practices to plan a successful data governance plan. 
(EBOOK)

How to develop cloud applications based on Web app security lessons by Hewlett-Packard Company

April 2013 - (Free Research)
Read this expert guide to get a walk-through on developing secure applications for the cloud, and what controls need to put in place once cloud-based applications are deployed. Find out more about secure development platforms, input filtering, authentication and more. 
(EGUIDE) READ ABSTRACT |

CW+ Open Group: Supporting requirements management in TOGAF by ComputerWeekly.com

October 2010 - (Free Research)
This White Paper discusses methodology and language support for requirements management in TOGAF. 
(WHITE PAPER) READ ABSTRACT |

Packaging tips to safeguard your physical records by Iron Mountain

March 2012 - (Free Research)
Read this white paper to learn proper techniques and best practices for packaging and storing your physical documents and information in cartons to avoid risk and records exposure. Find tips on what to look for in a quality carton, how to know when your carton is too old and needs to be replaced, and how to properly pack your carton. 
(DATA SHEET) READ ABSTRACT |

Improving Tools and Techniques to Combat Malware Evolution by Webroot

October 2012 - (Free Research)
Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes. 
(WHITE PAPER) READ ABSTRACT |

Five Myths of Agile Development by VersionOne Inc.

September 2008 - (Free Research)
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization. 
(WHITE PAPER) READ ABSTRACT |

Longline Phishing: A New Class of Advanced Phishing Attacks by Proofpoint, Inc.

December 2012 - (Free Research)
In this white paper, gain valuable information about longlining, the newest method in phishing attacks, and key recommendations for how to enhance your email security defense. 
(WHITE PAPER) READ ABSTRACT |

Become a Social Business: Tap Into Social Data Insights by IBM

January 2014 - (Free Research)
Access the following webcast to uncover what you need to know to become a successful social business. Learn about the tools and techniques and how to properly use them to turn social data into the actionable insights you need to be competitive. 
(WEBCAST) READ ABSTRACT |

Plan and Act on Findings with IBM Cognos Enterprise by IBM

November 2013 - (Free Research)
The following webcast depicts how to create, update, and manage a successful business plan. Discover what techniques you can use to move your business forward. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts