Software  >   Systems Software  >   Operating Systems  >   PDA Operating Systems  >  

PalmOS

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The operating system for PalmPilot PDAs.
PalmOS Reports
76 - 100 of 1137 Matches Previous Page  |  Next Page
An Essential Guide to IoT App Development
sponsored by Mendix
WHITE PAPER: With varying levels of complexity for endpoints, software, security, and integration, the defining elements of IoT can seem overwhelming. To help guide you through IoT adoption, this paper digs down into the anatomy of IoT and explores how to overcome the challenges of IoT app development.
Posted: 04 May 2017 | Published: 04 May 2017

Mendix

Analysis of the Linux Audit System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 31 Aug 2016 | Published: 01 Sep 2016

ComputerWeekly.com

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

ANSIBLE를 이용한 CI/CD (CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY)
sponsored by Red Hat
WHITE PAPER: 당면한 IT 과제 중 하나는 다운타임 없이 CI/CD (Continuous Integration and Continuous Deployment)를 수행할 수 있도록 하는 것입니다. Ansible은 구축부터 오케스트레이션까지 고려되어 작성된다면 하나의 작업명세서로 이 모든 요구사항들을 충족시킬 수 있습니다. 이 백서에서는 Ansible 및 Ansible Tower by Red Hat가 이와 같은 유형의 프로세스를 지원하기 위해 귀사의 컴퓨터 시스템들을 연결하는 최적의 툴인 이유를 집중 조명할 것 입니다.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Red Hat

API-Led App Modernization
sponsored by Red Hat
VIDEO: Explore how to move from monolithic, legacy architectures to modern microservices, containers, and hybrid cloud deployments with API-led development and 3 approaches to app modernization.
Posted: 07 Nov 2017 | Premiered: 06 Nov 2017

Red Hat

APIs: The New Language of Business Collaboration
sponsored by Red Hat
WHITE PAPER: Find out how to capitalize on cloud, mobile, big data, and social computing trends with APIs and learn how to develop, deploy, and maintain APIs throughout their lifecycle.
Posted: 01 Nov 2017 | Published: 31 Oct 2017

Red Hat

Application data security risks on Android devices
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

ComputerWeekly.com

Application Modernisation: The Essential Guide
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

Ardent Partner Research: The CPO and CIO's New Approach to Evaluating Enterprise Technology
sponsored by Coupa
RESEARCH CONTENT: This Ardent Partners research report is a reminder of the TCO model to estimate the cost and value of these enterprise technology investments in the era of digital transformation and innovation.
Posted: 12 Jan 2017 | Published: 30 Dec 2016

Coupa

Assessing the Impact of Full Lifecycle API Management
sponsored by CA Technologies
RESEARCH CONTENT: This Forrester Research report examines the potential economic impact of the CA API management platform. Uncover the report's key findings and find out how to improve API management and security for fast, efficient app development.
Posted: 06 Dec 2017 | Published: 31 May 2017

CA Technologies

An Introductory Breakdown of Trusted Computing
sponsored by Intel
TECHNICAL ARTICLE: This technical article provides an introduction to Trusted computing and its components, and is an comprehensive primer to IT departments evaluating security at the platform level.
Posted: 03 Dec 2009 | Published: 01 Dec 2008

Intel

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analytics Deliver Good User Experience for DevOps and End-Users
sponsored by CA Technologies
EGUIDE: Analytics can measure user satisfaction with enterprise mobile apps, but what about day-to-day maintenance? Learn from experts which metrics help with heavy lifting, and are more than just a pretty interface.
Posted: 18 Feb 2016 | Published: 14 Feb 2016

CA Technologies

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Architecting Oracle VM Solution with Sun ZFS Storage Appliances and Sun Servers
sponsored by Oracle Corporation
WHITE PAPER: With virtualization and its ability to install multiple operating systems (OSs) and run them independently on a single server, IT can effectively consolidate hundreds of servers while optimizing resources and simplifying the infrastructure. Read this paper to find out so much more.
Posted: 01 Oct 2010 | Published: 01 Sep 2010

Oracle Corporation

Are Software-Defined Data Centers the Next Frontier of Virtualization?
sponsored by Hewlett Packard Enterprise
EGUIDE: The word is out about software-defined data centers, but awareness isn't the same as understanding or acceptance. In this e-guide, Dan Kusnetzky, founder and principal analyst of market research firm Kusnetzky Group LLC, explores the new frontier that is SDDC and prepares you for your potential future.
Posted: 27 Dec 2016 | Published: 23 Dec 2016

Hewlett Packard Enterprise

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines
sponsored by DellEMC and Intel®
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

DellEMC and Intel®
76 - 100 of 1137 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement