IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

QA Staff

RSS Feed    Add to Google    Add to My Yahoo!
QA Staff Reports
 
Intigua Powers UP qa Environment on Kaminario K2 v5
sponsored by Kaminario
WHITE PAPER: To enure that the software was able to scale to meet the needs of even the most demanding customer, the group tests against thousands of running virtual machines (VMs). Intigua needed storage that could maintain a consistently high level of performance even under loads with rapidly varying random blends of I/O.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Kaminario

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa Data Corp
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa Data Corp

Video Whitepaper: Rapid Bottleneck Identification: A Better Way to do Load Testing
sponsored by Oracle Corporation
WEBCAST: Rapid bottleneck identification (RBI) is a new testing methodology that allows quality assurance (QA) professionals to very quickly uncover Web application performance limitations and determine the impact of those limitations on the end user experience.
Posted: 28 Oct 2009 | Premiered: Oct 28, 2009

Oracle Corporation

Video: Rapid Bottleneck Identification: A Better Way to do Load Testing
sponsored by Oracle Corporation
VIDEO: Rapid bottleneck identification (RBI) is a new testing methodology that allows quality assurance (QA) professionals to very quickly uncover Web application performance limitations and determine the impact of those limitations on the end user experience.
Posted: 02 Dec 2009 | Premiered: 28 Oct 2009

Oracle Corporation

Tap the Potential of Shadow IT
sponsored by Google
WHITE PAPER: This white paper examines the role of IT in the new landscape, offering insights from IT and businesses that have leveraged Google Apps for Work to empower employees with collaboration tools they know and love while providing robust security and controls that protect data, and ultimately, allowing you to capitalize on the Shadow IT movement.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Google

IT Without Boundaries: Choosing Between Conventional or Agile IT?
sponsored by Red Hat
WHITE PAPER: Why should you have to choose between conventional and agile IT? News just in: you don't have to anymore. This white paper explains how organizations can operate more efficiently and become more agile at the same time. Access this research to see how you can balance conventional and agile IT.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Red Hat

Women in Technology Survey 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The Mortimer Spinks and Computer Weekly Women in Technology Survey 2015 collected data between 10 April 2015 and 28 May 2015 and represents the views of more than 4,000 technology professionals. Read the results of the fourth annual Women in Technology Survey.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

ComputerWeekly.com

IT Priorities 2015 – UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the UK.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

A SANS Survey: How Does Your Security Stack Up?
sponsored by LogRhythm, Inc.
WHITE PAPER: Information security continues to be a work in progress for many financial services companies. In this white paper, you will key into an annual SANS survey on the security of the financial services sector, and learn how to apply your enterprise's resources to the specific categories of threats that you face, both internal and external.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

Insider Edition: Antimalware Technologies and Techniques to the Rescue
sponsored by SearchSecurity.com
EZINE: In this special edition of Information Security, our experts examine the recent advances in anti-malware detection and prevention, and which ones can tip the scale in your favor in the fight against malware.
Posted: 03 Mar 2014 | Published: 05 Mar 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement