application MethodWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: application Method returned the following results.
RSS What is RSS?
Related Categories

 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Embedded Application Development
 •   Rapid Application Development (RAD)
 •   Data Center Management
 •   Data Security
 •   Application Security
 •   Application Integration
 •   Storage Management
 •   Disaster Recovery

Related Searches
 •   Display application Method
 •   Java application
 •   Problems application Method
 •   Roi application Method
 •   application Consultants
 •   application Method Alabama
 •   application Method Consults
 •   application Risk
 •   application Virginia
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

5 Levels of Agile Planning: From Enterprise Product Vision to Team Stand-up by Rally Software

August 2008 - (Free Research)
Existing agile methods often focus on small, single-team projects, overlooking the broader impact of large programs. This paper outlines a distinct planning framework that has been successful in large-scale agile software development projects and relies.. 
(WHITE PAPER) READ ABSTRACT |

Assuring Enterprise-Quality Agile Development by HP Software

August 2011 - (Free Research)
This white paper provides an overview of the advantages of hybridizing agile development methods with the QA lessons learned from previous methods. Learn how this strategy provides the best of both worlds for developing flexible, secure software products. 
(WHITE PAPER) READ ABSTRACT |

Application Modernization: Best practices and methods by TechTarget

March 2014 - (Free Research)
As the business landscape continues to grow unabated, you may want to consider a new approach to modernizing your legacy apps. Take this brief survey and gain access to an essential guide that uncovers what you need to know before upgrading your major applications as well as how a service approach can support application modernization. 
(RESOURCE)

Expert methods and strategies for application virtualization by SearchDataCenter.com

November 2012 - (Free Research)
This expert e-guide explores best practices for virtualizing your applications to ensure optimal performance and availability. 
(EGUIDE) READ ABSTRACT |

Object Persistence and Agile Software Development by Versant Corp.

December 2009 - (Free Research)
Agile Software Development is one of the most effective methodologies to develop application software. This paper examines and compares RDBMS with several object persistence methods within the context of Agile Software Development by quantifying the impact of these methods on the velocity and success of an agile application development project. 
(WHITE PAPER) READ ABSTRACT |

Agile in the Embedded World by IBM

June 2013 - (Free Research)
Embedded systems development demands a method that can conform to the constraints and requirements, and that method is Agile development. Access this in-depth resource to learn more about Agile methodology and embedded systems development, as well as why the two work so well together. 
(WHITE PAPER) READ ABSTRACT |

Web application security: automated scanning versus manual penetration testing by IBM

January 2008 - (Free Research)
There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Principles of Agile Architecture by Rally Software

August 2008 - (Free Research)
The benefits of Agile methods are becoming more obvious and compelling. While the most popular practices were developed and proven in small team environments, the interest and need for using Agile in the enterprise is growing rapidly... 
(WHITE PAPER) READ ABSTRACT |

5 Levels of Agile Planning: From Enterprise Product Vision to Team Stand-up by Rally Software

June 2012 - (Free Research)
This paper assesses agile methods used in multi-team projects. Read more inside to explore evaluations of the requirements associated with scaling projects and applying basic agile principles to those requirements. Additionally, learn about the impact that an agile framework has on core lean principles muri, mura, and muda. 
(WHITE PAPER) READ ABSTRACT |

Combining virtual server backup methods for a complete strategy by SearchStorage.com

May 2012 - (Free Research)
This expert e-guide outlines strategies for combining virtual server backup methods with traditional approaches for a more comprehensive VM backup system. Discover tips that will protect your virtual environment at no extra cost. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Rally Software Agile Webinar Series: Scaling Agile with SAFe by Rally Software

July 2013 - (Free Research)
Just because agile development was originally intended for small teams, doesn't mean you can't apply those same strategies to larger projects. In this comprehensive resource, discover how agile teams can work together to achieve common delivery objectives using the Scaled Agile Framework (SAFe). 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Locating Rogue 802.11n and Legacy Wireless Access Points by Fluke Networks

July 1967 - (Free Research)
Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security. 
(WHITE PAPER)

Splunk for Application Management by Splunk

April 2012 - (Free Research)
This paper examines features and benefits of a unified application management structure that can give you real-time data access, custom dashboards, performance metrics and more. 
(WHITE PAPER) READ ABSTRACT |

SOA Best Practices: The BPEL Cookbook by Oracle Corporation

August 2007 - (Free Research)
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA. 
(WHITE PAPER) READ ABSTRACT |

How Salesforce.com Transformed its Business to Agile by CA Technologies.

September 2010 - (Free Research)
Join this webcast to discover how cloud computing leader Salesforce.com transformed their software development process to Agile. Come and hear from expert Steve Greene, who led Salesforce.com’s transformation to Agile. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

CW+: Mobile payments market opportunities for business by ComputerWeekly.com

December 2010 - (Free Research)
The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.” 
(WHITE PAPER) READ ABSTRACT |

Guidelines for Specification of Data Center Power Density by APC by Schneider Electric

January 2005 - (Free Research)
Specifying data center density has yet to conform to an established standard within the industry. This paper describes the science and practical application of an improved method for the specification of power and cooling infrastructure for data centers. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization: Partnering for a Successful Long-term Strategy by VMware, Inc.

August 2013 - (Free Research)
This whitepaper explains how IT departments can move from a traditional desktop infrastructure to a unified desktop with multiple deployment options by identifying the best option for transition to a new desktop delivery method, such as managed deployment, a cloud offering, or a hybrid approach. 
(WHITE PAPER) READ ABSTRACT |

Software Testing eZine Vol.2 - Testing Strategies for Complex Environments: Agile, SOA by SearchSoftwareQuality.com

May 2009 - (Free Research)
In this issue of SearchSoftwareQuality.com's Software Testing eZine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology. 
(EZINE)

E-Zine: Software Testing Vol.2 - Testing Strategies for Complex Environments: Agile, SOA by IBM

December 2010 - (Free Research)
In this issue of SearchSoftwareQuality.com's Software Testing e-zine, we'll discuss a Service Oriented Architecture (SOA) as a new testing environment as well as an Agile software development (ASD) methodology. 
(EZINE)

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World by Black Duck Software

July 2008 - (Free Research)
Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts