Software  >   Systems Software  >   Utility Software  >  

File Conversion Software

RSS Feed   
File Conversion Software Reports
 
Check Amount Recognition Based on the Cross Validation of Courtesy and Legal Amount Fields
sponsored by Parascript LLC
WHITE PAPER: This paper is devoted to the description of the check reading system developed to recognize amounts on American personal checks.
Posted: 25 Aug 2002 | Published: 01 Jan 1999

Parascript LLC

Your guide to the open source universe
sponsored by ComputerWeekly.com
EGUIDE: Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

ComputerWeekly.com

Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.
Posted: 17 Aug 2020 | Published: 18 Aug 2020

ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 17 Jun 2019 | Published: 18 Jun 2019

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

Software Engineering: Why Has it Eluded Data-Driven Management?
sponsored by Pluralsight
WHITE PAPER: Download this white paper to discover how departments can use code churn, output, request behavior, and other data points as key performance metrics—allowing software engineering to embrace the data-driven management that’s driving the next wave of business.
Posted: 21 Jul 2021 | Published: 21 Jul 2021

Pluralsight

HPE Ezmeral Software Portfolio Is a Bold Move Into the Container Platform
sponsored by HPE and Intel®
WHITE PAPER: In this report, IDC analysts dive into HPE Ezmeral – a new brand and software portfolio which covers capabilities like container orchestration and management, AI/ML and data analytics, AI-driven operations, and more.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

TOPICS:  Software
HPE and Intel®

Modernize Legacy Apps for the Cloud
sponsored by Red Hat
EGUIDE: In this expert e-guide, we explore how organizations are modernizing legacy apps for cloud, mobile, and other digital transformation initiatives with 3 different approaches to modernization, containers, and PaaS.
Posted: 15 Nov 2017 | Published: 08 Nov 2017

Red Hat

Design Your App Modernization Strategy
sponsored by Red Hat
EGUIDE: Once you determine that you need to modernize certain apps, the next step is figure out which method best fits your development, whether it's restructuring with PaaS or redesigning with APIs. In this e-guide, explore how to design an app modernization strategy that suits your business's architecture and cloud use.
Posted: 15 Nov 2017 | Published: 08 Nov 2017

Red Hat

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences