Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Open DataBase Connectivity

RSS Feed    Add to Google    Add to My Yahoo!
Open DataBase ConnectivityReports
 
The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

The State of System i Security 2008
sponsored by PowerTech
WHITE PAPER: This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Toad® Data Analysis
sponsored by Dell Software
SOFTWARE LISTING: Toad® for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Dell Software

Software Quality Assurance Testing: First Mobile Steps
sponsored by IBM
EGUIDE: The process for testing mobile applications isn't quite the same as testing more traditional Web and desktop ones. In this e-guide, uncover 4 valuable tips to help software quality assurance teams successfully approach mobile app testing.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

IBM

Enabling a Pragmatic Journey to the Cloud
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a provider that offers cloud solutions that are simple, highly adaptable, and are seamlessly scalable.
Posted: 23 Oct 2014 | Published: 01 Jul 2014

Juniper Networks, Inc.

Software License Optimization with 1E AppClarity
sponsored by 1e Inc
WHITE PAPER: This exclusive whitepaper reveals the results of a study on software licensing waste.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

1e Inc

Deploy DevOps in Your Traditional Environment with Configuration Management Processes
sponsored by Red Hat
WEBCAST: Many companies are implementing new tactics and methodologies to help reduce their time to market and improve overall software quality. View this webcast now to learn how to implement DevOps for Java EE applications in a traditional, non-PaaS environment.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

Red Hat

Networks That Know Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this white paper to learn how networks are using automation to their advantage, especially with the popularity of software-defined networking (SDN).
Posted: 23 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

Seven ways to reduce waste and accelerate software delivery
sponsored by IBM
WHITE PAPER: This paper explores how an IBM DevOps approach can help reduce seven key types of waste in software development - shortening development cycles and increasing customer value.
Posted: 15 Oct 2014 | Published: 30 Sep 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement