code

Results 276 - 300 of 488Sort Results By: Published Date | Title | Company Name
Published By: Coverity, Inc.     Published Date: Feb 26, 2010
Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Coverity, Inc.     Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code, enterprise applications, business technology
    
Black Duck Software
Published By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : 
black duck, open source, security, security testing tools, software, enterprise applications, business technology
    
Black Duck Software
Published By: ScanLife     Published Date: Feb 25, 2012
Good use of QR codes can catapult a campaign into the realm of the innovative, however, true innovation requires the effective use of new technology. And since the technology is new, literature and knowledge regarding its effective usage is scarce, resulting in the failure of many QR Code campaigns. Read to find out more.
Tags : 
scanbuy, marketing, emerging marketing, qr codes, mobile marketing, mobile apps, mobile uploads
    
ScanLife
Published By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : 
scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
    
ScanLife
Published By: Tealium     Published Date: Dec 15, 2011
Tags slow down web sites. Tag management systems provide a solution using a number of methodologies ranging from asynchronous tagging, conditional loading and tag killing to improve site performance.
Tags : 
tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation, marketing attribution, integrated marketing, digital marketing, page tag, site tag, site speed, tagging, page code, tracking code, omniture, google analytics, webtrends
    
Tealium
Published By: Tealium     Published Date: Dec 15, 2011
In the market for tag management systems? The "Buyer's Guide to Tag Management Systems" reveals the challenges associated with tagging, benefits provided by tag management systems, and features to consider when looking for such solutions.
Tags : 
tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation, marketing attribution, integrated marketing, digital marketing, page tag, site tag, site speed, tagging, page code, tracking code, omniture, google analytics, webtrends
    
Tealium
Published By: FunMobility     Published Date: Aug 21, 2012
While many retailers today are anxious about how the mobile explosion will impact their business, the reality is that mobile holds the key to retail success on multiple levels
Tags : 
mobile engagement, crm, customer relationship management, mobile strategy, qr codes
    
FunMobility
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity, software development
    
DataDirect Technologies
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Midsized companies face the challenge of integrating key applications while keeping risks low, costs down, and schedules short.  Explore three approaches to application integration and discover a quick and cost-effective way to get your critical applications to work together without custom code or burdening specialist resources, ensuring rapid ROI for your application investment.
Tags : 
application integration, data integration, crm, erp, customer relationship, castiron, cast iron, eai
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron, enterprise applications
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had only two choices for integrating SAP solutions, complex and expensive platforms like EAI or write custom code. Integration Appliances offer companies a third option, one that dramatically simplifies and accelerates SAP integration by using a “configuration, not coding” approach to rapidly connect SAP applications with a wide variety of applications, without burdening specialist resources.
Tags : 
eai, sap, castiron, cast iron, enterprise resource planning, erp, crm systems
    
Cast Iron Systems
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In a free audio/video Webcast with MarketingSherpa’s Anne Holland, learn valuable, tested B-to-B marketing tips, including how to stop spending too much on SEM while making your remaining SEM budget work harder... how to make prospects pay attention to your content... the key difference between case studies and success stories... when—and why—you should consider removing the registration page... and more.  Don’t miss these proven tips—watch the free 30-minute Webcast now.
Tags : 
promo code: wp3, marketing sherpa, marketingsherpa, b-to-b, b2b, b-to-b marketing, b2b marketing, marketing budget, lead generation, demand generation, direct marketing, lead conversion, registration page, registration, landing page, white paper, content, sem, search engine marketing, search marketing
    
Marketo, INC.
Published By: Marketo, INC.     Published Date: Sep 25, 2008
Listen to this free podcast at your desk or on the road and learn the business challenges and problems causing B2B companies to look at marketing automation ... the near-term and longer-term ROI benefits to expect... what key features and capabilities you should look for in a B2B marketing automation system... and more.  Find out what marketing automation can do for your organization—and how to choose the system that’s right for you. Download this free 15-minute podcast now.
Tags : 
promo code: wp1, marketing automation, marketo, eloqua, salesforce, saas, crm, customer relationship management, crm integration, leads, lead nurturing, lead scoring, lead qualification, lead filtering, lead follow-up, lead management, lead conversion, inbound leads, raw leads, telesales
    
Marketo, INC.
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free 15-minute podcast, Laura Ramos of Forrester Research explains how B2B marketers can leverage Web 2.0.  Listen at your desk or on the road and discover: how to enhance marketing ROI by driving real engagement and dialog ... how to reach key decision-makers ... reasons behind the move from demand generation toward more organic demand management ... and more.  Understanding Web 2.0 tactics is a must for B2B marketers who want to compete.  Find out why; listen to this free podcast now.
Tags : 
using digital, promo code: wp2, marketing, b2b marketing, social marketing, social networks, social networking, interactive direct marketing, interactive demand generation, digital media, engagement, rich media, rich web, rich applications, blogging, rss, social networks, facebook, myspace, digital marketing
    
Marketo, INC.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM RedpaperT publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL.
Tags : 
ibm redpaper, websphere ilog rules, cobol, code, cics channels and containers, business rule management systems, brms
    
IBM ILOG.
Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn
Published By: Alert Logic     Published Date: Jun 12, 2014
New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. Download to learn more!
Tags : 
cloud security, vulnerability management, vulnerabilities, patching, patch management, security, it management
    
Alert Logic
Published By: MobileForce Software     Published Date: Nov 19, 2014
GigaOm is seeing a new breed of services that promise to accelerate the mobilization of existing enterprise applications and business processes. Early mobile-application development solutions (MADP) were resource-intensive, requiring custom client code for each supported platform, as well as an on-premise middleware layer to connect mobile clients to enterprise backend systems. In this new model, code-free, configuration solutions - aimed at business analysts and lines of business- are revolutionizing the landscape, consolidating tools and services to simplify cross-platform enablement, and reducing time to deploy and cost tremendously. This report describes mobile-application configuration (MAC) tools, articulates their business value and suggests conditions under which they may be a good choice for an organization.
Tags : 
mobilization, enterprise applications, business processes, development solution, resource-intensive, client code, platform, middleware, backend system, cross-platform, costs, development, wireless
    
MobileForce Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
    
Black Duck Software
Published By: Code42     Published Date: Jan 13, 2016
BACKUP ISN’T JUST A COPY IN THE CLOUD. IT’S THE ANTIDOTE TO EVERYTHING. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to ?nd out how backup makes the enterprise impervious.
Tags : 
code42, endpoint backup, cloud storage, data migration, data storage solutions, e-discovery, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security, security, it management, knowledge management, enterprise applications
    
Code42
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee