IT Management  >   Systems Design and Development  >   Testing  >   Software Testing  >  

Structural Testing

RSS Feed    Add to Google    Add to My Yahoo!
Structural Testing Reports
 
Modern Infrastructure E-Zine – November/December 2015
sponsored by SearchDataCenter.com
EZINE: This exclusive e-zine explores what makes an infrastructure modern, and breaks down the benefits and challenges of modern, integrated data center infrastructures. Read on for articles on white box switching, open source strategies, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

SearchDataCenter.com

Optimizing Application Monitoring
sponsored by GroundWork, Inc.
WHITE PAPER: After studying dozens of designs for application monitoring, it has been found that the optimal solution is often achieved through simple synthetic transaction monitors.
Posted: 07 Mar 2008 | Published: 01 Jan 2006

GroundWork, Inc.

The Evolution of Converged Infrastructure
sponsored by HP & Intel®
EGUIDE: This E-Guide from SearchServerVirtualization.com describes the evolution of converged infrastructure and explores how it solves the growing compatibility, scalability, and performance issues inherent to white box servers. View now to learn more!
Posted: 21 Feb 2013 | Published: 21 Feb 2013

HP & Intel®

Smart Techniques for Application Security: Whitebox + Blackbox Security Testing
sponsored by IBM
WEBCAST: Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle.
Posted: 10 Mar 2010 | Premiered: Mar 10, 2010

IBM

On the Path to Agility: Embracing Bimodal IT
sponsored by Red Hat
WHITE PAPER: In the following exclusive white paper, learn about the positive ramifications that can be achieved through successful implementation of a bimodal IT infrastructure.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Red Hat

Solve Performance Issues Impacting Citrix-based Services with Real-Time Analytics
sponsored by Citrix and Netscout
TRANSCRIPT: In this transcript, you will explore service assurance challenges impacting IT professionals that manage critical business applications and unified communications (UC) by leveraging the network.. Get access now to discover how to gain a holistic view of the infrastructure to enable collaboration.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Citrix and Netscout

Integrating Big Data Systems with Enterprise Data Warehouses
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, you will learn how to both maximize the business benefits of big data and minimize the risk of adopting new technologies with a unified query system. Read on to allow a single query to access data in multiple stores—be they Hadoop, NoSQL or relational databases.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

Oracle Corporation

A Guide to Enterprise Linux For IBM Z Systems
sponsored by Red Hat
DATA SHEET: In this datasheet, you will discover how to extend your IBM z Systems to accommodate more applications and emerging workloads by implementing Red Hat Enterprise Linux. Read on to better utilize your available computing resources.
Posted: 19 Jan 2016 | Published: 31 Dec 2015

Red Hat

How Mark Wissler Made a Neural Network Web Application in an Hour
sponsored by Exaptive
RESOURCE: In this article, software developer and data scientist Mark Wissler details his strategy for writing code and wiring up components in just under an hour. Uncover the neural network technologies he leveraged to achieve agile development.
Posted: 25 Jan 2016 | Published: 16 Sep 2015

Exaptive

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement