Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

IBM OS/2

RSS Feed    Add to Google    Add to My Yahoo!
IBM OS/2Reports
 
Truth revealed : The real DevOps story
sponsored by CA Technologies.
VIDEO: Tune into the following video to uncover the 7 secrets to DevOps success and learn how leading organizations are leveraging their DevOps strategies to improve overall software quality, decrease time to market, and more.
Posted: 11 Nov 2014 | Premiered: 11 Nov 2014

CA Technologies.

Providing Security for Software Systems in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper details risks to software deployed in the cloud and explores the steps that your organization can take to mitigate those risks.
Posted: 18 Nov 2014 | Published: 30 May 2014

Hewlett-Packard Company

Build more robust native mobile applications with IBM the MobileFirst Platform
sponsored by IBM
WHITE PAPER: Learn how IBM MobileFirst Platform Foundation can securely enable mobile application development, delivery and management.
Posted: 15 Sep 2014 | Published: 30 Jun 2014

IBM

Three Steps Toward Zero Downtime
sponsored by SUSE
WHITE PAPER: Access this resource to learn three steps you can take to move your organization toward zero downtime. You'll get insight into how you can leverage tools built to prevent hardware downtime, maxmimize service availability, and minimize human mistakes.
Posted: 02 Oct 2014 | Published: 31 Jul 2014

SUSE

Quality in the Cloud: Best Practices for ISVs
sponsored by Equinix
WHITE PAPER: Access this white paper to learn how ISVs can partner with hosting companies, establish criteria for selecting a hosting service, and get metrics for measuring hosting performance as it relates to cloud services. You'll get insight into how you can prepare to enter into the cloud market quickly and confidently.
Posted: 05 Nov 2014 | Published: 31 Dec 2011

Equinix

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 18 Aug 2014 | Published: 01 Sep 2013

Hewlett-Packard Company

How to Stop Online and Mobile Banking Fraud
sponsored by iovation, Inc.
WHITE PAPER: This white paper reveals how to utilize a multilayered fraud prevention solution that doesn't sacrifice the overall customer experience.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

iovation, Inc.

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

HP Fortify on Demand
sponsored by Hewlett-Packard Company
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement