Source Code Control Software Reports

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

Top 10 ANZ IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.
Posted: 15 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Top 10 India IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this roundup, we recap the top 10 stories in India, including the digitisation work undertaken by global firms in the country, progress made by local enterprises in harnessing technology and how a female coder rose through the ranks in her software development career.
Posted: 15 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Top 10 software development stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There has never been a better time to be in software development. After years of being regarded as non-core, software development has quickly become a differentiator as businesses embark on digital transformations. Here are Computer Weekly's top 10 software development articles of 2019.
Posted: 08 Feb 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

Top trends shaping APAC's tech landscape in 2024
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
Posted: 07 Jan 2024 | Published: 08 Jan 2024

TechTarget ComputerWeekly.com

Using IT initiatives to save money and reinforce green credentials
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
Posted: 08 Feb 2021 | Published: 05 Jan 2017

TechTarget ComputerWeekly.com

Who should get the technology vote in the UK General Election?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Dec 2019

TechTarget ComputerWeekly.com

Your guide to the open source universe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
Posted: 08 Feb 2021 | Published: 29 Aug 2017

TechTarget ComputerWeekly.com

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

TMA Resources Increases Customer Satisfaction Rates by Four Times with Parature Customer Service™ Software
sponsored by Parature, Inc.
CASE STUDY: In this case study, TMA needed to streamline and automate its manual customer service process to reduce resolution times and improve satisfaction. Learn how Parature Customer Service software reduced time on manual administrative activities by 25%.
Posted: 28 Aug 2008 | Published: 28 Aug 2008

Parature, Inc.

Toad™ for Oracle Xpert Trial
sponsored by Dell Software
TRIAL SOFTWARE: Toad™ for Oracle Xpert from Quest Software is the solution trusted by professionals to enhance database development, increase productivity and manage database performance.
Posted: 01 Jun 2006 | Premiered: 01 Jun 2006

Dell Software

Toad™ for SQL Server Xpert Trial
sponsored by Dell Software
TRIAL SOFTWARE: Toad™ for SQL Server Xpert is a powerful tool that makes SQL development faster and database administration easier. Its capabilities ensure that SQL is optimized for maximum performance.
Posted: 01 Jun 2006 | Premiered: 01 Jun 2006

Dell Software

Top 10 Reasons You Need EMC MozyEnterprise
sponsored by EMC Corporation
PRODUCT LITERATURE: This document provides the top 10 reasons to choose EMC MozyEnterprise.
Posted: 07 Mar 2008 | Published: 01 Feb 2008

EMC Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER: This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008

Oracle Corporation

University of Georgia Gets Lesson: NetVault™ Makes the Grade in Power, Ease of Use
sponsored by BakBone
CASE STUDY: UGA evaluated several companies backup/restore software, before choosing BakBone Software NetVault. This case study examines why UGA opted for BakBone software.
Posted: 16 Apr 2008 | Published: 01 Nov 2001

BakBone

User Interface Development for Embedded Systems
sponsored by Mentor Graphics
TECHNICAL ARTICLE: An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls.
Posted: 10 Mar 2009 | Published: 13 Jan 2009

Mentor Graphics

Vestcom International: Personalization Drives Repeat Business
sponsored by Exstream Software
CASE STUDY: Vestcom International is a New Jersey-based firm that offers end-to-end personalized communication solutions. Vestcom used Exstream Software's Dialogue solution to design a sophisticated relationship management program that is fostering...
Posted: 24 Apr 2008 | Published: 01 Jan 2004

Exstream Software

Virtual Data Center eZine - Vol.5
sponsored by Dell Compellent
EZINE: According to the Data Center Decisions 2008 Purchasing Intentions Survey, server selection and disaster recovery (DR) are front-burner issues for data center decision makers.
Posted: 24 Sep 2012 | Published: 31 Oct 2008

Dell Compellent

Virtual Data Center eZine - Volume 4
sponsored by Virtual Data Center eZine - Volume 4
WHITE PAPER: This e-zine issue explains the direct benefits of implementing a SAP virtualization plan. It compares virtualization platforms, highlights common problems, and offers tips to leverage hardware-assisted memory virtualization.
Posted: 20 Aug 2008 | Published: 18 Aug 2008

All resources sponsored by Virtual Data Center eZine - Volume 4

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis