Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blockers

RSS Feed    Add to Google    Add to My Yahoo!
Ad BlockersReports
 
Software-defined networking
sponsored by Hewlett-Packard Company
WHITE PAPER: Find out why SDN represents the network architecture of the future.
Posted: 10 Sep 2014 | Published: 31 May 2013

Hewlett-Packard Company

5 Power Gen ERP Lessons From the Manufacturing Industry
sponsored by IFS
WHITE PAPER: Uncover the 5 power generation ERP lessons from the manufacturing industry.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

IFS

5 Reasons Why Software Outages Occur
sponsored by Automic
WHITE PAPER: Downtime is a business nightmare – not only do companies lose business, their brand and public perception are compromised as well. This resource considers five possible reasons for software outages, and discusses how companies end up with these problems as well as how to fix them.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Automic

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Client management ensures efficient use of resources
sponsored by FrontRange Solutions Inc.
CASE STUDY: This case study explains how the company used a client management solution to help ease the complexity surrounding software.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

FrontRange Solutions Inc.

Is the Future of Payroll in the Cloud?
sponsored by Workday
VIDEO: Learn about the solution that takes advantage of SaaS software to improve the payroll process.
Posted: 08 Sep 2014 | Premiered: 16 Dec 2011

Workday

Five Steps for a Winning Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: The landscape of devices, operating systems, and touch points continuously grows in complexity – resulting in a security nightmare for application developers. View this informative white paper now to find out the 5 steps for a winning application security program.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Veracode, Inc.

Case Study: OSS vs. Commercial, Choosing between WebSphere and Jboss
sponsored by IBM
CASE STUDY: The allure of free software, specifically open-source software (OSS), has drawn the attention of many companies. View this case study now to read about the insurance company Topdanmark and their debate between commercial and OSS options – and the advice they offer to companies in the same position.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

IBM

Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY: A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
WEBCAST: In this helpful webcast, learn how your organization can leverage new integrated IT solutions like managed security and cloud services and to improve your business's efficiency and security, and create value for your customers.
Posted: 06 Aug 2014 | Premiered: Aug 1, 2014

NEC Corporation of America
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement