Discussions

  • cascading style sheet (CSS)

    A cascading style sheet (CSS) is a Web page derived from multiple sources with a defined order of precedence where the definitions of any style element conflict.

    ITKE355,655 pointsBadges:
  • Chat, Twitter, text messaging and instant messaging abbreviations

    Chat abbreviations are commonly used in e-mail, online chatting, online discussion forum postings, instant messaging, and in text messaging (SMS). This comprehensive list will help you navigate the jargon, slang and unfamiliar acronyms.

    ITKE355,655 pointsBadges:
  • Sharing Excel files safely

    Sharing files is a very common practice, but you may be doing it in a non-secure way. This tip will explain how to safely share an Excel 2007 workbook and how to keep it safe, too.

    Brien Posey10,395 pointsBadges:
  • What is the hardest part of defining a project’s scope?

    Margaret Rouse5,315 pointsBadges:
  • Best practices for solutions architecture

    Solutions architecture has gained a reputation for being difficult to define. Even so, best practices unique to solutions architecture have emerged.

    smann290 pointsBadges:
  • Failing to integrate security with DevOps? Do so at your own peril

    Security is often considered as an afterthought in the software development lifecycle. But organizations need to keep up with vulnerabilities as they move to more agile DevOps practices. Read on for some best practices in building a security conscious culture.

    ITKE355,655 pointsBadges:
  • protocol

    In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate.

    ITKE355,655 pointsBadges:
  • Improve software quality by paying early attention to application security

    There are a number of strategies enterprises are taking to keep security on pace with faster development cycles. These include earlier code reviews, leveraging PaaS with built in security, and using cloud services for static and dynamic security analysis.

    ITKE355,655 pointsBadges:
  • How to elicit performance requirements

    Eliciting performance requirements from business end users necessitates a clearly defined scope and the right set of questions. Expert Mary Gorman explains how to effectively gather information.

    ITKE355,655 pointsBadges:
  • Cloud based IDEs shine, despite developer reservations

    Organizations are starting to consider cloud IDEs as a practical alternative to traditional desktop IDEs and associated tool chains. Read on for some of the best practices for getting the most from this transition.

    ITKE355,655 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following