Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Open DataBase Connectivity

RSS Feed    Add to Google    Add to My Yahoo!
Open DataBase Connectivity Reports
 
The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

Toad® Data Analysis
sponsored by Dell Software
SOFTWARE LISTING: Toad® for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Dell Software

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

The State of System i Security 2008
sponsored by PowerTech
WHITE PAPER: This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Transforming an Industry Leader with APIs
sponsored by MuleSoft
CASE STUDY: Access this brief case study to see how this top financial company was able to address their API challenges, doubling their customer base in 5 years and reducing the time to develop new APIs from a month to just a few hours.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

MuleSoft

How to Develop Secure Mobile Apps With a Stellar User Experience
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights the importance of providing a better application experience, as well as how to secure the mobile application development and delivery process.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

CA Technologies.

7 Steps to Building Your API Blueprint
sponsored by MuleSoft
WHITE PAPER: Access this in-depth white paper to find out the 7 steps to API success, including defining your business objective and engaging developers. Read on to see if your company is headed down the right API path.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

MuleSoft

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Your Chance to Test Drive a Comprehensive Security System
sponsored by AlienVault
SOFTWARE DEMO: This product demo gives you an opportunity to test drive a unified security management system.
Posted: 24 Feb 2015 | Premiered: 24 Feb 2015

AlienVault

How to transform your mainframe software delivery into a lean, modern, and agile process
sponsored by IBM
WHITE PAPER: This white paper looks at how IBM Rational Developer for System z addresses key enterprise software development challenges, accelerating delivery, reducing cost, raising quality, minimizing risk and cutting time to customer feedback.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement