Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Common ISDN Application Programming Interface

RSS Feed   
Common ISDN Application Programming Interface Reports
 
Computer Weekly – 6 November 2018: After 10 years, Post Office IT system goes on trial
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 10 years after we revealed concerns over the Post Office accounting system, affected subpostmasters finally get their day in court. We look at how businesses are turning to wearable tech to help employees. And we analyse the key players in the market for object storage. Read the issue now.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

ComputerWeekly.com

Applying Software-Defined Security to the Branch Office
sponsored by Versa Networks
WHITE PAPER: The end goal of deploying software-defined security (SD-Security) for your branch offices is to have additional layers of security for better defense-in-depth, when and where you need them. Read this white paper to learn how you can apply SD-security to your branch office.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

Versa Networks

Webinar: Top 6 Security Needs for APIs and Serverless Apps
sponsored by Data Theorem
WEBCAST: In this webinar, discover the top 6 API security needs for APIs and apps across serverless platforms such as AWS Lambda, Google Cloud Functions and Azure Functions.
Posted: 12 Apr 2019 | Premiered: Apr 12, 2019

Data Theorem

Composable Infrastructure for Dummies
sponsored by NTT
EBOOK: The data center is starting to transform to meet evolving business needs. Composable infrastructure is going to act as your IT department's guide throughout this process. This e-book is your guide to composable infrastructure and the different aspects of your data center's future that it will impact.
Posted: 06 Oct 2017 | Published: 30 Dec 2016

NTT

Blue Prism Transforms Security from Reactive to Proactive with Veracode
sponsored by Veracode, Inc.
CASE STUDY: Establishing trust in your product's security is just as important as its overall quality in the eye of the user -- a fact almost all developers are familiar with. That's why many development teams are making a shift from reactive to proactive application security models. Keep reading to find out why, illustrated by a real world story.
Posted: 20 May 2019 | Published: 20 May 2019

Veracode, Inc.

How to Automate API Security
sponsored by Data Theorem
WHITE PAPER: As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Data Theorem

What's in Your Branch?
sponsored by Versa Networks
VIDEO: Digital transformation and hybrid multi-cloud need a truly software-defined architecture for the edge and the WAN. In this short video, learn about how Capital One's digital transformation journey has been driven by software-defining the branch with the Versa Cloud IP Platform.
Posted: 19 Aug 2019 | Premiered: 12 Oct 2017

Versa Networks

How to Design Best-in-Class Dashboards
sponsored by Qlik
WHITE PAPER: Dashboards are essential to modern business. While needs vary across industries and organizations, often dashboards can be unclear, poorly formatted, or trying to accomplish too many things. Read here how to design best in class dashboards.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

Qlik

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Composable Infrastructure Overview
sponsored by VeriStor
EGUIDE: Composable infrastructure, or disaggregation, undoes traditional resource grouping, enabling you to mix and match resources as needed to meet specific workload demands. Access this e-guide to learn how composable infrastructure, its limitations, and the type of impact it will have on your organization.
Posted: 08 Aug 2017 | Published: 02 Aug 2017

VeriStor
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement