Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Open DataBase Connectivity

RSS Feed   
Open DataBase Connectivity Reports
 
Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Computer Weekly – 10 July 2018: Tackling the digital identity problem
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as UK government attempts to create a digital identity standard flounder, we examine progress on establishing the online ID system the digital economy needs. Barclays bank talks about its move to DevOps and public cloud. And we find out how AI could help improve IT service management. Read the issue now.
Posted: 09 Jul 2018 | Published: 09 Jul 2018

ComputerWeekly.com

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

ComputerWeekly.com

CW Nordics February 2019
sponsored by ComputerWeekly.com
EZINE: In this ezine, we look at how digital transformation is shaking up the Nordic region and placing CIOs at the forefront of the social and economic changes that come with it. Norway, Denmark, Sweden and Finland are all heading in the same direction at pace and it appears this move is being fuelled by more traditional businesses.
Posted: 15 Feb 2019 | Published: 21 Feb 2019

ComputerWeekly.com

A Tale of Two Teams
sponsored by Veracode, Inc.
WHITE PAPER: As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams. Explore these new processes and priorities for each team throughout the software lifecycle.
Posted: 03 May 2018 | Published: 03 May 2018

Veracode, Inc.

Computer Weekly – 12 June 2018: How National Geographic uses tech to captivate its audience
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the world-famous National Geographic magazine is adapting to the digital age and using technology to better engage its audience. We ask what Microsoft's $7.6bn acquisition of GitHub means for the open source community. And our latest buyer's guide looks at developer tools. Read the issue now.
Posted: 08 Jun 2018 | Published: 08 Jun 2018

ComputerWeekly.com

Network Virtualization: The Next Step in Data Center Transformation
sponsored by AdvizeX Technologies
EBOOK: Server virtualization has reduced costs, but it hasn't cut down complexities. The end-goal is actually a software-defined data center (SDDC) and the path is through network virtualization. Read on to learn why SDDC is the future of data center technology and why network virtualization is becoming increasingly vital.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

How To Make Application Security A Competitive Advantage
sponsored by Veracode, Inc.
WHITE PAPER: Download this white paper to learn about the critical importance of application security in the enterprise and how you can make app security a competitive advantage.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

Veracode, Inc.

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Veracode, Inc.

DCIM Tool Evaluation Guide
sponsored by RunSmart
EGUIDE: Since the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
Posted: 11 Dec 2017 | Published: 04 Dec 2017

RunSmart
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement