Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

lack testing

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing
    
Harry lei
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Businesses of all sizes struggle with aging gear and lack of storage. In fact, in a 2018 Enterprise Storage Forum survey, IT and business leaders cited these concerns as their two biggest storage infrastructure challenges. But in mid- to enterprise-sized businesses, where every dollar counts, fixing these problems can feel like a tall order. If you’re going to upgrade your storage, you need to make sure you’re getting an efficient array that will help you maximize the value of your storage and your data. We tested two storage arrays to see which could best help organizations meet these goals: the Dell EMC™ Unity™ XT 880F, and an all-flash offering in the entry-level market from a competitor (“Vendor A”). In our hands-on testing, the Dell EMC Unity XT array processed up to 93 percent more input/output operations per second (IOPS) in an 8KB 100% random read test and reduced 129 percent more data. It also carried out common management tasks faster, cutting the number of deployment steps i
Tags : 
    
Dell EMC Storage
Published By: Tricentis     Published Date: Mar 13, 2018
In a case of “if you can’t measure it, you can’t manage it,” some software project failures occur because of a lack of traceability — that is, an incomplete record of documentation around software quality assurance efforts. The lack of traceability has a significant impact on QA testing effectiveness and meeting strategic goals. However, with optimal traceability, testing becomes more efficient and enables collaboration throughout the software development lifecycle, as well as between product owners and organization leaders.
Tags : 
    
Tricentis
Published By: Bronto     Published Date: May 31, 2018
More than 80% of customers abandon their carts resulting in a whopping $18 billion in lost revenue every year. Retailers that lack a strong, comprehensive cart recovery program are just leaving that revenue behind. This paper will examine what you need to look for in a cart recovery program. What you’ll learn: How flexibility in choosing the number and time to send emails can increase engagement. What to look for in the segmentation and personalization of cart recovery emails. How A/B testing can take your cart recovery program to the next level.
Tags : 
sales, customer, consumer, revenue, recovery
    
Bronto
Published By: Epicor     Published Date: Aug 03, 2012
Risk-averse distributors may feel that the safest and simplest IT strategy is to stay with their existing "homegrown" enterprise resource planning (ERP) solution. But just as sticking your money under the mattress offers no protection against inflation, maintaining an outdated system can rob you of a distinct competitive advantage.
Tags : 
immediacy, erp software, data duplication, data discrepancies, lack of testing, lack of vision, new advances, systems architecture, learning management system, easy integration, epicor, software development, batch system, real-time
    
Epicor
Published By: Black Duck Software     Published Date: May 18, 2016
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, security, security testing tools, software, enterprise applications
    
Black Duck Software
Published By: Black Duck Software     Published Date: May 18, 2016
Read this case study to learn how ScienceLogic employs Black Duck to: - Identify open source throughout their code base - Determine possible license violations and conflicts - Know when new threats are reported
Tags : 
black duck, open source, security, security testing tools, software, enterprise applications
    
Black Duck Software
Published By: BlackBerry     Published Date: Mar 12, 2013
In this case study, Ricoh Canada’s Director of Infrastructure and Operations speaks about his enthusiasm for BlackBerry® 10 devices, his findings after testing BlackBerry® Enterprise Service 10 and plans to port service to the Blackberry platform.
Tags : 
ricoh canada, blackberry 10, choosing enterprise, enterprise feedback, blackberry 10 platform, enterprise applications
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
Ricoh Canada’s Director of Infrastructure and Operations speaks about his enthusiasm for BlackBerry® 10 devices, his findings after testing BlackBerry® Enterprise Service 10, and plans to port a field service application to the new platform.
Tags : 
enterprise feedback, choosing blackberry 10, ricoh canada, case study, enterprise case study, enterprise applications
    
Blackberry
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
When Daniel Shuler joined Phoenix Children’s Hospital (PCH) as CISO in 2016, he knew the hospital would be a tempting target for cyber criminals due to the massive troves of sensitive data it collects to diagnose and treat patients. Over the next three years, Shuler spearheaded a complete overhaul of PCH’s security fabric. First, he decommissioned the legacy AV and engaged BlackBerry Cylance’s ThreatZERO™ consultants to deploy CylancePROTECT® on over 4,000 endpoints. Soon after, CylancePROTECT stopped a ransomware attack that could have disrupted patient care by preventing access to electronic medical record data. Next, he engaged a BlackBerry Cylance Red Team to perform annual penetration testing assignments. Says Shuler, “Our relationship is unique in my experience. BlackBerry Cylance has proven repeatedly that they have our best interests at heart and that they share our commitment to provide the best care possible for children and their families.” Read the case study for the full s
Tags : 
    
BlackBerry Cylance
Published By: Bronto     Published Date: Feb 01, 2018
More than 80% of customers abandon their carts resulting in a whopping $18 billion in lost revenue every year. Retailers that lack a strong, comprehensive cart recovery program are just leaving that revenue behind. This paper will examine what you need to look for in a cart recovery program. What you’ll learn: • How flexibility in choosing the number and time to send emails can increase engagement. • What to look for in the segmentation and personalization of cart recovery emails. • How A/B testing can take your cart recovery program to the next level.
Tags : 
sales, cart recovery, online shopping, retail
    
Bronto
Published By: Cenzic     Published Date: Nov 11, 2008
This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient to secure your applications: simply put organizations that rely solely on white box technologies will be exposed to vulnerabilities in their applications, thus making it an ineffectual method of testing real-world risks. This paper will demonstrate black box or dynamic testing is ultimately the appropriate solution for “truly” securing Web applications.
Tags : 
cenzic, web application security, white box texting, black box testing, secure web applications, cenzic, security
    
Cenzic
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking, security, migration
    
Prodiance Corp.
Published By: Tricentis     Published Date: Jan 08, 2018
Data. It seems to be everywhere today and yet we can never get enough of it. But as it turns out, a lack of data isn’t our problem -- our problem is the difficulty piecing together, understanding and finding the story in all the data that’s in front of us. In software testing in particular, the need for consolidated, meaningful test metrics has never been higher. As both the pace of development and the cost of delivering poor quality software increase, we need these metrics to help us test smarter, better and faster. Fortunately, business intelligence now exists to make this goal a reality. The analytics these tools provide can help drive efficient and effective testing by providing teams with insight on everything from testing quality and coverage to velocity and more. And this knowledge can position the QA team as trusted experts to advise the entire software development team on steps that can ensure a better quality end result.
Tags : 
    
Tricentis
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.