IT Management  >   Systems Design and Development  >   Testing  >   Software Testing  >  

Structural Testing

RSS Feed    Add to Google    Add to My Yahoo!
Structural Testing Reports
 
Modern Infrastructure E-Zine – November/December 2015
sponsored by SearchDataCenter.com
EZINE: This exclusive e-zine explores what makes an infrastructure modern, and breaks down the benefits and challenges of modern, integrated data center infrastructures. Read on for articles on white box switching, open source strategies, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

SearchDataCenter.com

Optimizing Application Monitoring
sponsored by GroundWork, Inc.
WHITE PAPER: After studying dozens of designs for application monitoring, it has been found that the optimal solution is often achieved through simple synthetic transaction monitors.
Posted: 07 Mar 2008 | Published: 01 Jan 2006

GroundWork, Inc.

Smart Techniques for Application Security: Whitebox + Blackbox Security Testing
sponsored by IBM
WEBCAST: Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle.
Posted: 10 Mar 2010 | Premiered: Mar 10, 2010

IBM

The Evolution of Converged Infrastructure
sponsored by HP & Intel®
EGUIDE: This E-Guide from SearchServerVirtualization.com describes the evolution of converged infrastructure and explores how it solves the growing compatibility, scalability, and performance issues inherent to white box servers. View now to learn more!
Posted: 21 Feb 2013 | Published: 21 Feb 2013

HP & Intel®

Improving the Customer Experience through Workload Automation
sponsored by CA Technologies
WHITE PAPER: In the following white paper, learn how to evolve your current workload processing and job scheduling procedures into a fluid workload automation environment to meet stringent SLAs, compliance, massive user requests, and more.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

CA Technologies

On the Path to Agility: Embracing Bimodal IT
sponsored by Red Hat
WHITE PAPER: In the following exclusive white paper, learn about the positive ramifications that can be achieved through successful implementation of a bimodal IT infrastructure.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Red Hat

Key trends for IT leaders in 2016 - Part 3
sponsored by ComputerWeekly.com
EBOOK: Spencer Izard, head of executive advisory programme at IDC, considers the key CIO and IT leadership trends for 2016 in this PowerPoint presentation given at the January 2016 Computer Weekly CW500 Club meeting.
Posted: 09 Feb 2016 | Published: 10 Feb 2016

ComputerWeekly.com

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Case Study: Healthcare Organization Streamlines App Development to Accelerate Time-to-Market
sponsored by InfoStretch
CASE STUDY: This case study describes the application development strategy that allowed a healthcare organization to create an electronic health portal. Learn how you can incorporate continuous feedback into the development process, react quickly and avoid pitfalls without affecting time-to-market, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

InfoStretch

Mobile App Q&A: Mobile Expert Talks Security and Testing
sponsored by InfoStretch
EGUIDE: This e-guide provides an in-depth question & answer session with mobile application lifecycle management expert Manish Mathuria about the biggest problems around mobile app security. Access critical advice on how to design your mobile app security testing process to catch issues before they lead to a breach you can't afford.
Posted: 05 Feb 2016 | Published: 28 Jan 2016

InfoStretch
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement