Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >   UNIX  >   UNIX Shells  >  

tcsh

RSS Feed   
tcsh Reports
 
Moving to Modern C++: Ensuring Safety and Security with AUTOSAR Coding Guidelines
sponsored by Perforce
WHITE PAPER: This paper delves into the AUTOSAR C++14 coding guidelines and examines how AUTOSAR differs from established coding standards. Access it here to learn if your team should adopt the AUTOSAR guidelines and how to transition from your existing coding standard.
Posted: 26 Apr 2019 | Published: 26 Apr 2019

Perforce

Computer Weekly – 26 February 2019: Delving into viewer data at the BBC
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the BBC about how the UK broadcaster is using data analytics to better understand its viewers and grow its audience. We look at how CERN is using IT automation in its quest to unravel the mysteries of the universe. And we examine the impact of GDPR on cloud storage. Read the issue now.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

ComputerWeekly.com

5 Reasons to Upgrade Your Reporting Software
sponsored by TIBCO
WHITE PAPER: Download this whitepaper to learn the top 5 reasons to consider reporting software upgrades, and hear how it delivered benefits like seamlessly embedded reports, dashboards into applications, and several others.
Posted: 15 Oct 2019 | Published: 15 Oct 2019

TIBCO

CW ASEAN: Unlock flash opportunities
sponsored by ComputerWeekly.com
EZINE: Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ComputerWeekly.com

DevOps, Low-Code, and the Democratization of App Development
sponsored by Applause
EGUIDE: In this expert e-guide, learn about the debate about which parts – if any – of app development should be handled by LOB employees and IT professionals other than developers themselves. Enter the discussion and find out how DevOps and no-code/low-code tools are reshaping the way cloud and mobile apps are being built.
Posted: 15 Dec 2017 | Published: 12 Dec 2017

Applause

Container Starter Guide
sponsored by Tata Communications and Intel
EGUIDE: With more vendors entering the container market, it should be no surprise that their adoption rates are on the rise. Our experts have compiled the best advice for anyone considering a container adoption to give the best understanding of the first steps in laying out your strategy. Download this essential guide today!
Posted: 08 Jan 2018 | Published: 08 Jan 2018

Tata Communications and Intel

The Challenge of Unified Workspaces
sponsored by Dell and Intel
EGUIDE: In this expert-guide, learn the 4 top challenges facing end-user computing today, from application updates to security. Then, explore how your IT department can address the issue of unified workspaces head-on.
Posted: 13 Feb 2018 | Published: 07 Feb 2018

Dell and Intel

Evaluate Hybrid Cloud Management Tools for Your Enterprise Needs
sponsored by Splunk
EGUIDE: Use this e-guide as your hybrid cloud management tool evaluation kit. Inside, you will find 3 primary decisions to make with every tool you see, as well as a list of criteria for those tools that catch your eye.
Posted: 18 May 2017 | Published: 15 May 2017

Splunk

Five Keys to Keep Windows 10 Strong
sponsored by VMware
EGUIDE: It takes continuous work to ensure that your Windows 10 deployment is as effective as it can be. By instilling a few key habits in your IT team, you can improve your user's experience. With this exclusive guide, complete with a quiz on Windows 10 features, you can improve security power, operational efficiency, and take full advantage of W10.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement