IT Management  >   Systems Design and Development  >  

Tests

RSS Feed    Add to Google    Add to My Yahoo!
TestsWhite Papers (View All Report Types)
 
Symantec NetBackup 7.6 Benchmark Comparison
sponsored by Symantec Corporation
WHITE PAPER: In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.
Posted: 22 Oct 2014 | Published: 31 Jul 2014

Symantec Corporation

Containers Tech Brief
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how packaging applications with Linux containers addresses these problems related to application testing and provides an easier and faster application deployment model.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Red Hat

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

Software Agitation:Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Agitar Software

Software Agitation: Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Agitator helps you debug your code while you write it - a benefit that no other existing Java Testing tool can claim. Agitator can also be extremely beneficial when run on legacy code - even code that has been reviewed by other developers and deemed to be “sufficient” and “properly written.” Learn how Agitar can be your own personal code reviewer.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Agitar Software

Testing and Quality Management - Best Practices
sponsored by SAP America, Inc.
WHITE PAPER: Read this white paper to learn the best practices for testing and configuration that Aberdeen's best-in-class designated organizations used to reduce operating costs by 26% and improve process efficiencies by 41% so you can adopt them to create a streamlined, stable IT environment for your business.
Posted: 07 May 2012 | Published: 28 Feb 2010

SAP America, Inc.

Email Archiving: To SaaS or Not to Saas?
sponsored by Proofpoint, Inc.
WHITE PAPER: This paper discusses the overall benefits and drawbacks of SaaS solutions, outlining the type of situations that are best suited for this kind of implementation.
Posted: 13 Jan 2009 | Published: 12 Jan 2009

Proofpoint, Inc.

Solution Brief: IBM InfoSphere Optim Test Data Management Solution for SAP Applications
sponsored by IBM
WHITE PAPER: InfoSphere Optim Test Data Management Solution for SAP Applications creates targeted, right-sized development, testing and training environments, reducing the time, expense and manual effort. This solution brief provides an overview of the product.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

IBM

Plantronics UC Toolkit Deployment FAQ
sponsored by Plantronics
WHITE PAPER: The Plantronics UC Toolkit, Deployment FAQ provides insight to typical questions IT organizations must consider regarding the physical deployment of UC audio devices. “What are key things I should consider during deployment? What and how should I communicate to users? How do I best prepare my IT organization?” are key topics covered in this FAQ.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Plantronics

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement