• Fourt tips to help tell if your continuous integration (CI) process is working

    Many organizations have adopted a continuous integration (CI) process. CI promises many benefits, but only if you're doing CI properly. Here are four tips to help you evaluate whether or not your continuous integration process is working.

    ITKE352,425 pointsBadges:
  • Do you find software requirements specifications to be too vague? If so, how do you resolve this issue?

    RobinGoldsmith1190 pointsBadges:
  • 10. Cloud bursting – Ten cloud computing definitions you need to know

    Do not panic. Your cloud isn’t exploding. And cloud bursting isn't as horrible as it sounds. Think of "burst" less in the negative "into flames" and "your balloon" context. Cloud bursting is a beneficial cloud technique for environments with varying IT workloads. In this hybrid cloud environment,...

    Caitlin White170 pointsBadges:
  • When private clouds reach compute capacity, consider cloud bursting

    Cloud bursting may have received some hype for its potential in the enterprise, but there are some factors you should consider before bursting to the public cloud.

    ATaneja170 pointsBadges:
  • CIO’s cloud solutions meet collaboration needs and speed up innovation

    The U. of Michigan CIO talks about embracing cloud solutions as part of a school-wide strategy of adopting cutting-edge tech to drive innovation.

    Karen Goulart2,010 pointsBadges:
  • USSD (Unstructured Supplementary Service Data)

    USSD (Unstructured Supplementary Service Data) is a Global System for Mobile (GSM) communication technology that is used to send text between a mobile phone and an application program in the network.

    ITKE352,425 pointsBadges:
  • signature analysis

    Signature analysis has two meanings. It can involve scrutinizing human signatures in order to detect forgeries and it can be a troubleshooting technique in which an AC signal with a specific waveform is applied across a component.

    Margaret Rouse3,040 pointsBadges:
  • soft token

    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.

    Margaret Rouse3,040 pointsBadges:
  • stakeholder

    A stakeholder is any person with a legitimate interest, or stake, in the actions of an organization.

    Margaret Rouse3,040 pointsBadges:
  • unique identifier (UID)

    A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.

    Margaret Rouse3,040 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.