IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Analysis Techniques

RSS Feed    Add to Google    Add to My Yahoo!
Analysis TechniquesReports
 
The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
sponsored by Coverity
WHITE PAPER: This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity

Vertica for Structured Finance
sponsored by Vertica Systems
WHITE PAPER: This paper examines the increased business challenges in structured finance, the impact on the underlying enabling technologies, and describes how the use of Vertica’s column store, massively parallel processing (MPP) approach to database management and analytic processing can address some of these challenges.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

Vertica Systems

Want to see JRebel in action? Download your free trial now!
sponsored by ZeroTurnaround
SOFTWARE DOWNLOAD: JRebel is a developer productivity tool that allows Java developers to view code changes instantly. It eliminates the rebuild, restart, redeploy cycle inherent in Java development, which enables developers to get more done in the same amount of time. See for yourself how developers increase team velocity up to 40%!
Posted: 15 Oct 2014 | Premiered: 15 Oct 2014

ZeroTurnaround

Solution brief: IBM MQ: the messaging solution for virtually all industries
sponsored by IBM
WHITE PAPER: This white paper examines a new messaging platform that delivers universal messaging backbone for virtually all industries to connect all systems and devices. Read on to learn how you can enable simpler, faster, more reliable and security-rich data exchange to fuel innovation and drive business growth.
Posted: 10 Oct 2014 | Published: 30 Apr 2014

IBM

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

2014 Egon Zehnder European Board Diversity Analysis
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For the first time Europe now leads the world in board diversity – though numbers of female executives on boards remain stubbornly low and this is a particular issue in technology, this study reveals.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Visibility Into Your Virtualized Data Center
sponsored by Gigamon
WHITE PAPER: Access this white paper to learn about how you can deliver increased visibility into your virtualized data center with a new solution. You'll learn how a traffic visibility layer for the standard reference data center architecture that delivers: Informed decisions based on real-time visibility, reduced expenses, and more.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Gigamon

CW Buyer's Guide to Enterprise Collaboration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Application Lifecycle Management: Cost Effective Project Archiving
sponsored by Avnet
WEBCAST: How can you manage your archived projects effectively to avoid lost investments? View this on-demand webcast now to discover one platform that makes application lifecycle management easy.
Posted: 21 Oct 2014 | Premiered: Oct 14, 2014

Avnet

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement