Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Disk Operating System

RSS Feed    Add to Google    Add to My Yahoo!
Disk Operating System Reports
 
Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Data Systems
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Data Systems

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Agile Integration for Today's Cloud-Enabled Enterprise
sponsored by Red Hat
RESEARCH CONTENT: Cloud adoption has accelerated across enterprises, but with no one dominant cloud, demands for app integration across a variety of cloud and on-premise systems are on the rise. Explore this IDC research to learn about the current state of Agile cloud app integration.
Posted: 10 Jan 2018 | Published: 31 Oct 2017

Red Hat

Driving Digital Transformation by Democratizing App Development
sponsored by PowWow
WEBCAST: Find out what it truly means to digitally transform for mobile, and learn about the democratization of mobile app development with low-code tools.
Posted: 18 Dec 2017 | Premiered: Dec 18, 2017

PowWow

An Introduction to Release Management and SAFe
sponsored by Plutora
WHITE PAPER: Agile and waterfall software development methods work at different speeds. Using both creates multi-speed IT and strips away all of the advantages Agile provides. Explore how an enterprise relying on older software can deliver continued innovation by coping with multi-speed IT using a scaled agile framework.
Posted: 12 Jan 2018 | Published: 12 Jan 2018


Bringing Together Cloud and DevOps
sponsored by Alibaba Cloud
WHITE PAPER: Find out how to overcome the challenges of traditional software development models by learning about DevOps best practices for automation, cloud adoption, continuous integration/continuous delivery, containers, and more.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

Alibaba Cloud

eBay Puts a New Spin on Mobile Beta Management to Enhance App Quality
sponsored by Applause
CASE STUDY: Find out how eBay improved mobile app quality by scaling a very small beta testing community to be large enough to represent a diverse base of buyers and sellers across the globe, incorporating in-app feedback, and enhancing bug reporting capabilities.
Posted: 04 Dec 2017 | Published: 04 Dec 2017

Applause

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement