IT Management  >   Systems Design and Development  >   Application Development  >   Integrated Development Environments  >   Visual Studio  >   Visual Basic  >  

VB .NET

RSS Feed    Add to Google    Add to My Yahoo!
VB .NET White Papers (View All Report Types)
 
VB Migration & Modernization Solutions: Convert Your Valuable Software Assets to VB.NET, C# or Even to Java Cost-Effectively and with Minimum Risk
sponsored by Transoft
WHITE PAPER: With Microsoft no longer providing support for the VB development environment, now is the time to migrate to VB.NET, C# or Java. Migration requires deep understanding of the legacy as well as extensive knowledge of the target environment. Read this paper to learn how Transoft can help your organization migrate your VB applications.
Posted: 24 Nov 2009 | Published: 24 Nov 2009

Transoft

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

15 Top-Paying IT Certifications for 2015
sponsored by Global Knowledge
WHITE PAPER: Take a look at some of the top-paying certifications as determined by the more than 11,000 responses to our 2015 IT Skills and Salary Survey of your peers across North America. Certifications in IT security, networking, and systems management are at the top of the certification pay scale.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Global Knowledge

3 Things in 3 Years: Innovating A Digital Strategy for the Financial Industry
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, learn the three factors to building a digital strategy for success in the next three years.
Posted: 10 Feb 2015 | Published: 07 Jan 2015

Hewlett-Packard Company

Avoiding the Cost of a Bad App and Delivering on the Promise of Mobility
sponsored by IBM
WHITE PAPER: This white paper discusses how enterprises can deliver on the promise of perfect mobility, and considers the wide-spread (and sometimes unexpected) costs that accompany a bad mobile app. Read on to see top tips for choosing the right mobile application development platform.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

IBM

Enterprise Mobile Testing: The Most Common Devices Being Used
sponsored by Perfecto Mobile
WHITE PAPER: This featured white paper analyzes the habits of over 1,200 companies and 90,000 hours of mobile application testing, delivering concise insights into the mobile testing world. Read on to see if your company is headed down the right path to mobile quality success.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Perfecto Mobile

A Five Step Manifesto for Successful IT Modernization
sponsored by Colt IT Services
WHITE PAPER: This white paper discusses five critical steps modern CIOs need to take in order to overcome the process- and culture-oriented challenges faced when attempting to modernize IT environments.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Colt IT Services

The DevOps Mindset: Real-World Insights from Tech Leaders
sponsored by Rackspace
WHITE PAPER: This white paper contains insights from technology leaders on the trials and successes of collaboration between Development and Operations teams, and provides suggestions for companies looking to adopt the DevOps mindset.
Posted: 20 Feb 2015 | Published: 29 Aug 2014

Rackspace

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement