• Failing to integrate security with DevOps? Do so at your own peril

    Security is often considered as an afterthought in the software development lifecycle. But organizations need to keep up with vulnerabilities as they move to more agile DevOps practices. Read on for some best practices in building a security conscious culture.

    ITKE355,655 pointsBadges:
  • protocol

    In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate.

    ITKE355,655 pointsBadges:
  • Improve software quality by paying early attention to application security

    There are a number of strategies enterprises are taking to keep security on pace with faster development cycles. These include earlier code reviews, leveraging PaaS with built in security, and using cloud services for static and dynamic security analysis.

    ITKE355,655 pointsBadges:
  • How to elicit performance requirements

    Eliciting performance requirements from business end users necessitates a clearly defined scope and the right set of questions. Expert Mary Gorman explains how to effectively gather information.

    ITKE355,655 pointsBadges:
  • Cloud based IDEs shine, despite developer reservations

    Organizations are starting to consider cloud IDEs as a practical alternative to traditional desktop IDEs and associated tool chains. Read on for some of the best practices for getting the most from this transition.

    ITKE355,655 pointsBadges:
  • Who are the heroes of the tech world?

    TheServerSide has spoken with many up and coming stalwarts in the industry, and what we wanted to know was who they looked up to as thought leaders and heroes. The names they picked might surprise you.

    ITKE355,655 pointsBadges:
  • order to cash (OTC or O2C)

    Order to cash (OTC or O2C) is a set of business processes that involve receiving and fulfilling customer requests for goods or services.

    Margaret Rouse5,315 pointsBadges:
  • The Apple Watch: A boon for the business or business bauble?

    Behold, the Apple Watch. Will third-party apps make it the next big thing for the enterprise? Also in Searchlight: Tech blog GigaOm abruptly closes its doors; AP sues the U.S. Justice Department for Hillary Clinton's emails.

    Fran Sales1,745 pointsBadges:
  • Mobile development looks inwards as internal facing apps gain traction

    As enterprise moves forward to provide employees with the apps they need for maximum productivity, everything is on the table for reinvention. A mix of standardized and customized solutions will be required by big business to meet the needs of an internal workforce that is ready to truly mobilize.

    ITKE355,655 pointsBadges:
  • Docker and containerization: The uncontainable trend of 2015

    Containerization, especially using new and exciting platforms like Docker, is a massive trend in the industry. Find out how to leverage this trend to run applications, host operating systems and gain even more benefits from running in a fully virtualized environment.

    ITKE355,655 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.