Software  >   Systems Software  >   Security Software  >  


RSS Feed   
ALSO CALLED: Resource Access Control Facility
DEFINITION: IBM security management product for its mainframe (large server) operating system, OS/390 (MVS) as well as for its VM operating system.
RACF Reports
151 - 175 of 1271 Matches Previous Page  |  Next Page
Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY: In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015


Best Practices for Improving Mobile Data Security
sponsored by
EGUIDE: This expert guide from takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Best Practices for Integrating Business Process Management
sponsored by MuleSoft
WHITE PAPER: This white paper explores how to implement integrated business process management (BPM) by using an API-led strategy. Uncover best practices for BPM design and learn how to overcome common BPM challenges, create API-led connectivity through a hybrid integration platform, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017


Best Practices: Strategies For Making The Crucial Shift To DevSecOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report examines the importance of incorporating security into DevOps methodologies. Discover 3 steps for shifting from DevOps to DevSecOps and find out how to deliver high-quality apps faster.
Posted: 11 Jan 2018 | Published: 01 May 2017

Veracode, Inc.

Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016


Beyond your company boundaries
sponsored by
PRESENTATION: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Bimodal IT Doesn't Mean App Modernization is Complete
sponsored by Skytap, Inc.
WHITE PAPER: Learn about the 3 pillars of app modernization and find out how to see the digital transformation initiated by bimodal IT to its completion by modernizing legacy apps, infrastructure, and processes.
Posted: 14 Feb 2018 | Published: 31 Dec 2017

Skytap, Inc.

Blockchain Enterprise Survey: deployments, benefits and attitudes
sponsored by
EGUIDE: Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

Boost Project Results with Nearshoring
sponsored by Gorilla Logic
RESOURCE: Find out how to gain access to talented developers in your time zone with nearshoring so that you can maintain velocity, quality, and efficiency for your development projects.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

Gorilla Logic

Breaking the Bottlenecks in Your SDLC
sponsored by Blueprint Software
WHITE PAPER: Discover how to apply the principles of Agile throughout the software development lifecycle (SDLC) and to the enterprise as a whole so that you can achieve Agile development at scale.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Blueprint Software

Bridging the Gap Between IT Operations & Security
sponsored by Splunk
WHITE PAPER: Click inside and explore the legitimate differences between security and IT operations, as well as where they share some common ground, and how you can make use of these shared values to build a safer, more available network.
Posted: 17 May 2017 | Published: 17 May 2017


Bridging Traditional & Continuous Testing
sponsored by Plutora
EBOOK: DevOps practices and test automation activities are forcing traditional testing teams to make considerable changes. Both roles and tools are being updated and you need to adapt in order to survive. Read this e-book to learn how your testing team can adapt to these changes and how to implement these changes in your testing strategy.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Bringing Together Cloud and DevOps
sponsored by Alibaba Cloud
WHITE PAPER: Find out how to overcome the challenges of traditional software development models by learning about DevOps best practices for automation, cloud adoption, continuous integration/continuous delivery, containers, and more.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

Alibaba Cloud

Beat Ransomware in 5 Easy Steps
sponsored by Unitrends
WHITE PAPER: With the FBI stating that: "The ransomware is that good. To be honest, we often advise people just to pay the ransom," the threat is obvious. Access this white paper now to learn how to beat ransomware in 5 easy steps.
Posted: 17 Apr 2017 | Published: 17 Apr 2017


Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010


Better Software Management and More Secure Computers
sponsored by Dell, Inc. and Intel®
CASE STUDY: This whitepaper details the systems management solution that Princeton University selected to solve their three major IT problems.
Posted: 18 Jun 2014 | Published: 05 Dec 2013

Dell, Inc. and Intel®

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Beyond the Scrum Team: Delivering "Done" at Scale
sponsored by Tasktop
WEBCAST: Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
Posted: 27 Jul 2016 | Premiered: Jul 26, 2016


Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)


Box: Securing Business Information In The Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 03 Feb 2017 | Published: 01 Feb 2017


BPM-Led Strategies for App Modernization and Robotic Process Automation
sponsored by HelpSystems
EGUIDE: In this e-guide, expert consultant Tom Nolle explores how organizations can leverage BPM to modernize legacy apps effectively. Discover how workflows, APIs, and microservices fit into this framework and your modernization implementation. Plus, learn how BPM will support robotic process automation for the evolving world of IoT and mobile.
Posted: 27 Feb 2017 | Published: 22 Feb 2017


Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

Build a Cohesive, Effective Security Strategy
sponsored by Splunk
EGUIDE: Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.
Posted: 08 Aug 2016 | Published: 31 Jul 2016


Build Modern Apps with Big Data at a Global Scale
sponsored by Microsoft
EBOOK: Find out how to deliver apps that don't have to make the trade-off between the speed of data availability, data access, and consistency. Plus, learn about the pros and cons of using a distributed database as the underlying foundation for app development and user experiences.
Posted: 01 Feb 2018 | Published: 31 Dec 2017

151 - 175 of 1271 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement