Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

dev

Results 5901 - 5925 of 6029Sort Results By: Published Date | Title | Company Name
Published By: Accelerance     Published Date: Feb 01, 2008
Despite the fact that Software Executives are pressured to do more with less and cut costs to the bone, many see offshoring as a "threat."  They know they need to go offshore - but where? And with who? What they want is an easier, better, more effective and safer way to use offshore programming resources.
Tags : 
it management, software development, development, developer, programmer, programming, developing, offshoring, offshore, outsource, outsourcing, india, accelerance
    
Accelerance
Published By: VMware Dell     Published Date: Jan 31, 2008
Aternity, Inc. is the leader in Frontline Performance Intelligence for Global 1000 enterprises. Two of the biggest challenges Aternity faces as a software developer are: 1) testing its software in different IT environments; and 2) deploying its software at customer sites.  Fortunately, VMware software was able to address both these challenges.
Tags : 
vmware, software testing, virtual, virtualization, virtualize, virtual server, server, servers, virtual machine, virtual machines, productivity, vmware, infrastructure
    
VMware Dell
Published By: Elementool Inc.     Published Date: Jan 28, 2008
Accurate communication is the key to the success of the bug tracking process. This communication takes the form of timely information flow between customers, QA and Development. Reducing the time spent on tasks that communicate bug information saves money.
Tags : 
bug tracking, project management, software development, effective management process, defect tracking, software testing, elementool
    
Elementool Inc.
Published By: Elementool Inc.     Published Date: Jan 28, 2008
Here’s a test: Can you list all the issues your software team is working on now? Can you sort them by severity, priority, features affected, and other criteria such as whether the issue is a bug, customer request, or product enhancement? Can you show the histories of all related comments and actions? Can you distribute this information easily to concerned individuals — showing only the information relevant to them?
Tags : 
bug tracking, project management, software development, effective management process, defect tracking, software testing, quality assurance, quality control, elementool
    
Elementool Inc.
Published By: Elementool Inc.     Published Date: Jan 28, 2008
Elementool, a leading provider of web-based project management tools for developers, including bug, defect, time-tracking and help desk tools, has announced the release of a bug tracking add-in tool for developers using the Visual Studio.NET 2005 platform. It is available free to Elementool’s community of project management solution subscribers.
Tags : 
bug tracking, project management, software development, effective management process, defect tracking, dot net, .net, software testing, quality assurance, quality control, elementool
    
Elementool Inc.
Published By: Elementool Inc.     Published Date: Jan 28, 2008
Being the new person on a bug tracking team can be very intimidating. The other team members are likely very set in the process and know exactly what they are doing. They are used to working as a team and they understand what is expected of them. Being new, though, does not mean that a person can not fit in on the bug tracking team. All a person needs to do is learn a few beginner tips to using bug tracking software.
Tags : 
bug tracking, project management, software development, effective management process, defect tracking, software testing, quality assurance, quality control, elementool
    
Elementool Inc.
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
General Cable operates 28 manufacturing locations in 8 countries and is a leader in the development, design, manufacture, marketing and distribution of copper, aluminum and fiber optic wire and cable products. Their products are widely used in communications, energy, industrial and speciality markets. General Cable has nearly 300 suppliers of raw material for their US operations.
Tags : 
supply chain, scm, supply chain connect, business management, erp, manufacturing, manufacture, edi, inventory, productivity, case study, general cable
    
Supply Chain Connect
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor, change management, configuration management, solidcore, fortrex, security
    
Solidcore
Published By: Vendor Guru     Published Date: Jan 04, 2008
Profound developments in business telephony have left some small businesses reeling under perceptions of a steep learning curve for expensive new products. But there’s no reason to be left behind. Affordability is the hallmark of the new generation in business telephony, thanks to hosted IP and other networked solutions. Is your business applying the new technology to best advantage?
Tags : 
ip pbx, pbx, acd, predictive dialing, automatic call distribution, voicemail, business communications, voice mail, conference call, telephony, ip telephony, voip, voice over ip, call routing, call routing, voip, vendorguru, vendor guru, vendorguru telephony, vendor guru telephony
    
Vendor Guru
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics, network security
    
netForensics
Published By: Epsilica Consulting     Published Date: Dec 21, 2007
Every change program has to have deliver something – a new service, a new process, increased market share, and so on. But how do you know what the benefits are? How do you identify them, develop them and measure them to ensure your program has achieved its 'end-state'?
Tags : 
epsilica, epsilica consulting, it management
    
Epsilica Consulting
Published By: WebEx Communications     Published Date: Dec 14, 2007
As support centers have deployed this new generation of remote support solutions, they have developed a series of best practices for maximizing their benefits. Based on market research performed from 2004 to 2007, this white paper summarizes these best practices, illustrates the benefits, and suggests considerations for selecting the remote access solution that will be most effective for your support organization.
Tags : 
remote access, remote support, customer service, help desk, productivity, customer satisfaction, webex
    
WebEx Communications
Published By: WebEx Communications     Published Date: Dec 14, 2007
Those businesses that have actively fostered deployment of e-learning into all points of the enterprise are now in the enviable position of experiencing geometrically increasing levels of operational and strategic efficiency. And those corporate learning officers and training managers that went through the arduous process of developing a business case in support of e-learning are now key strategic players in their organizations.
Tags : 
e-training, etraining, e-learning, elearning, employee education, education, training, collaboration, webex, it management
    
WebEx Communications
Published By: Microworld     Published Date: Dec 12, 2007
MicroWorld Winsock Layer (MWL) is a radical technology that fights viruses and other threats from a new perspective. Developed by MicroWorld Technologies Inc., MWL blocks threats at the Internet gateway itself and does not allow them to enter your system. This article discusses features of MWL and explains how it does its anti virus and content security tasks, efficiently and quietly.
Tags : 
winsock, ethreats, e-threats, malware, email security, internet security, spam, anti-spam, anti spam, anti virus, anti-virus, mwl, escan, microworld
    
Microworld
Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway, governance, infrastructure
    
Tideway Systems
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san, storage area networks
    
TeraCloud
Published By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : 
pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password, elcomsoft, portable document, document management
    
ElcomSoft
Published By: Epsilica Consulting     Published Date: Nov 29, 2007
Time is money, resources are scarce and only projects that add value and meet the organization's strategic aim and objectives should be flying. Why is it, therefore, that so many projects are running that have not been formally approved, burn limited and finite resource and, most importantly, do not improve or deliver new services or increase market share?
Tags : 
project management, project lifecycle, product lifecycle, development lifecycle, project manager, business management, bpm, epsilica, epsilica consulting
    
Epsilica Consulting
Published By: NetSuite     Published Date: Nov 27, 2007
Sales Benchmark Index presents information in this NetSuite White Paper that helps sales management succeed in implementing a data-driven decision making process for sales success. Five steps for developing a sales benchmark are defined, with a list of key metrics you can use.
Tags : 
sales, improving sales, increasing sales, salesforce, sales benchmark, benchmark, benchmarking, funnel, pipeline, analytics, sales management, netsuite
    
NetSuite
Published By: NetSuite     Published Date: Nov 27, 2007
Where should mid-market companies invest valuable resource? Two out of three businesses are either buying or considering buying software via the subscription model.  This white paper will explain how Software-as-a-Service is revolutionizing the economics of growing businesses.
Tags : 
saas, software as a service, on demand, on-demand, software development, development, programming, web services, netsuite
    
NetSuite
Published By: PTC     Published Date: Nov 27, 2007
The right domain name can mean the difference between success and failure. Find out how to get it right the first time by following five simple steps.
Tags : 
domain name, dns, web development, web site, online presence, website, site development, buy domains, buydomains, domains, domain, url, web address
    
PTC
Published By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo, domain name, hosting, web site design, website design
    
PTC
Published By: BuyDomains     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains
    
BuyDomains
Published By: BuyDomains     Published Date: Nov 27, 2007
The right domain name can mean the difference between success and failure. Find out how to get it right the first time by following five simple steps.
Tags : 
domain name, dns, web development, web site, online presence, website, site development, buy domains, buydomains, domains, domain, url, web address
    
BuyDomains
Start   Previous    228 229 230 231 232 233 234 235 236 237 238 239 240 241 242    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.