Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Vendor Independent Messaging Standard

RSS Feed   
Vendor Independent Messaging Standard Reports
 
Intelligent Traffic Replication & Filtering for Virtual Machines
sponsored by Gigamon
PRODUCT OVERVIEW: Access this informative white paper to find out how this vendor's node allows specific traffic flows to be selected, forwarded and delivered to the right analysis, monitoring or security devices – with additional info on its features and benefits.
Posted: 09 Apr 2014 | Published: 30 Jun 2013

Gigamon

Email Recovery: Doing More with Less- How to save Time and Money When Recovering Email
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This paper shows how the costs associated with recovering email messages from Microsoft® Exchange Server backups can be significant and also provides us with the practical information on how to minimize those costs.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Kroll Ontrack, Inc.

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 24 May 2019 | Published: 24 May 2019

ComputerWeekly.com

Agile Integration: the Blueprint for Enterprise Architecture
sponsored by Red Hat
WHITE PAPER: In this whitepaper, learn how some organizations are bringing together three important architectural capabilities: containers, distributed integration, and application programming interfaces in a new architectural framework called agile integration.
Posted: 25 Sep 2018 | Published: 25 Sep 2018

Red Hat

Top 6 API Security Needs for Serverless Apps
sponsored by Data Theorem
WHITE PAPER: The growth in serverless apps is going to accelerate because the cost and time benefits for developers are overwhelmingly positive. However, the 6 areas in this white paper highlight the need for a new approach to security with an architecture that is substantially different than previous techniques. Read on to learn more.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Data Theorem

4 Considerations before Purchasing a Software Project Management Software
sponsored by Cmolds
WHITE PAPER: Falling behind competitors can become a scary reality to work past, so high-level software project management acts as an essential process to ensure your business takes a competitive advantage. Download this whitepaper to learn 4 elements you should consider when deciding on a project management platform.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Cmolds

AI and Its Role in Software Development
sponsored by Crowd Machine
RESOURCE: Read the following blog post to examine AI's capabilities, how AI could benefit your enterprise, and AI's future role in software development.
Posted: 13 Aug 2019 | Published: 25 Mar 2019

Crowd Machine

Data Theorem Interview Digital Anarchist RSA Conference 2019
sponsored by Data Theorem
VIDEO: In this interview from the 2019 RSA Conference, listen to Data Theorem's senior leaders, Himanshu Dwivedi and Doug Dooley, talk about the benefits of Data Theorem's newest API security product offerings.
Posted: 25 Jun 2019 | Premiered: 25 Jun 2019

Data Theorem

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

ComputerWeekly.com

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement