Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Open DataBase Connectivity

RSS Feed    Add to Google    Add to My Yahoo!
Open DataBase Connectivity Reports
 
6 Pillars of Big Data: How to Harness Data with Tableau
sponsored by Tableau Software
WHITE PAPER: Big data is changing the way we approach analysis and modern industry. Is your organization equipped to take on new big data changes? In this white paper, learn about the 6 pillars of a big data strategy you should focus on, how you can create a visual representation of your data right away, and gain access to insights in real-time.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Tableau Software

The State of System i Security 2008
sponsored by PowerTech
WHITE PAPER: This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Toad® Data Analysis
sponsored by Dell Software
SOFTWARE LISTING: Toad® for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Dell Software

The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

Transform Your Supply Chain With Cloud-Native Integration
sponsored by Dell Boomi
RESOURCE: How do you transform supply chains for omnichannel initiatives? Learn how to enable cloud-native app integration for SCM with support for low-code methodologies, Agile workflows, and more.
Posted: 17 Oct 2017 | Published: 07 Sep 2017

Dell Boomi

Barclays Stays Ahead of the Competition with Open Source and DevOps
sponsored by Red Hat
VIDEO: Watch this brief video case study to learn how Barclays Bank turned their middleware into a competitive advantage and a key enabler of DevOps development with flexible, open source software.
Posted: 06 Nov 2017 | Premiered: 01 May 2017

Red Hat

Modernize Legacy Apps for the Cloud
sponsored by Red Hat
EGUIDE: In this expert e-guide, we explore how organizations are modernizing legacy apps for cloud, mobile, and other digital transformation initiatives with 3 different approaches to modernization, containers, and PaaS.
Posted: 15 Nov 2017 | Published: 08 Nov 2017

Red Hat

The Agile Security Manifesto
sponsored by Synopsys
WHITE PAPER: Find out how to achieve continuous integration/continuous deployment (CI/CD) safely and securely with the 4 principles of building app security into Agile development.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Synopsys

How to Build a Rock-Solid Software Security Initiative in 5 Steps
sponsored by Synopsys
EBOOK: Find out how security pros and app development teams can work together better to ensure app security, and discover your roadmap to building a sound software security initiative.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

Synopsys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement