IT Management  >   Systems Design and Development  >   Testing  >   Software Testing  >  

Clear Box Testing

RSS Feed    Add to Google    Add to My Yahoo!
Clear Box TestingReports
 
Smart Techniques for Application Security: Whitebox + Blackbox Security Testing
sponsored by IBM
WEBCAST: Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle.
Posted: 10 Mar 2010 | Premiered: Mar 10, 2010

IBM

The Evolution of Converged Infrastructure
sponsored by HP & Intel®
EGUIDE: This E-Guide from SearchServerVirtualization.com describes the evolution of converged infrastructure and explores how it solves the growing compatibility, scalability, and performance issues inherent to white box servers. View now to learn more!
Posted: 21 Feb 2013 | Published: 21 Feb 2013

HP & Intel®

Optimizing Application Monitoring
sponsored by GroundWork, Inc.
WHITE PAPER: After studying dozens of designs for application monitoring, it has been found that the optimal solution is often achieved through simple synthetic transaction monitors.
Posted: 07 Mar 2008 | Published: 01 Jan 2006

GroundWork, Inc.

HP Workplace Management Services
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource introduces HP Workplace Management Services, a fully managed solution that provides a standardized, configurable, and cost-saving alternative to traditional desktop environments.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

IT Service Brokerage - The Intersection of User Experience and Business Technology
sponsored by Hewlett-Packard Company
VIDEO: This exclusive video covers the transformation IT must make as technology evolves and the role IT brokerage can play in these changes.
Posted: 28 Aug 2014 | Premiered: 28 Aug 2014

Hewlett-Packard Company

Embrace BYOD While Keeping Devices and Data Secure
sponsored by IBM
VIDEO: Find out how you can keep all devices and company data secure to make BYOD a success.
Posted: 08 Sep 2014 | Premiered: 08 Sep 2014

IBM

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

IT Designed for Today's Demands: 3 Crucial Components Help Combat Current Challenges
sponsored by Hewlett-Packard Company
WHITE PAPER: Check out this exclusive whitepaper to learn about an IT service brokering solution that will help by offering three critical components, including a single, unified portal.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Hewlett-Packard Company

Forging an ITSM Strategy That's About Business Impact, Not IT Metrics
sponsored by Pangea Systems
EGUIDE: This expert e-guide explores the story of one CIO who was able to deploy an ITSM strategy that went beyond IT metrics.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Pangea Systems

From MDM to Automation, CPI Charts Course for Managed Services Success with N-Able
sponsored by N-able Technologies
WHITE PAPER: This case study details how one organization was able to transition from a break-fix model to managed services by leveraging the IT channel's #1 RMM and MSP service automation platform.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

N-able Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement