X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 bar code wedges


Active Escrow: The Technical Verification of Software Source Code
The source code for mission-critical software products is almost never provided to users by the supplier. All the end-user has is a copy of the compiled source

bar code wedges  Escrow: The Technical Verification of Software Source Code The source code for mission-critical software products is almost never provided to users by the supplier. All the end-user has is a copy of the compiled source code—in other words, the object code that can only be read and executed by the computers concerned. That’s why professional escrow is becoming an essential component of operational risk management.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » bar code wedges

Web Application Security: The Truth about White Box Testing versus Black Box Testing


Information security managers, quality assurance staff, and developers are faced with the enormous responsibility of keeping Web applications secure from the ever-growing menace of hackers and internal threats alike. So how can they protect sensitive data without exhausting internal resources, overspending the budget, or being forced to use costly manual penetration testing using external consulting firms?

bar code wedges   Read More

Certify Your Software Integrity with Code Signing Certificates


As a software developer, you know that the product you make available on the Internet can be tampered with—without detection—if it’s not secured. Customers need to know that the software really comes from the publisher who signed it and that it’s not been altered or corrupted. For secure online distribution and confident customers, learn how to sign your code and active content with a code signing certificate solution.

bar code wedges   Read More

Legacy Migration and Modernization: The Broad Strokes


It’s estimated that almost one trillion lines of legacy code are in active use around the world today. If this code is going to be migrated, it’s vital that a methodology be put in place for substantial automation; otherwise the highly tedious process will serve as a major impediment to this important initiative. So what are your options today?

bar code wedges   Read More

Lynx to Donate Advanced Messaging to Linux Open-Source Community


Through the release of Lynx’s Messenger Technology code to the ‘Open-Source’ community they hope to gain a strong foothold in Linux messaging as the operating system gains in popularity.

bar code wedges   Read More

UNSPSC for Better Spend Analysis


The UN Standard Products and Services Code (UNSPSC), the global product and services classification standard, has been revolutionizing purchasing and supply management across the world. Whether you’re deliberating on the need for a common product and classification standard for your company, or an advanced UNSPSC adopter, revisiting the basics can help you improve your purchasing and supply management processes.

bar code wedges   Read More

Compaq to Open Tru64 Unix?


In what may be an attempt to cash in on the open source OS game, Compaq is hinting it may open some parts of the source code for its Tru64 Unix operating system.

bar code wedges   Read More

How to Conduct a Code Review


A properly conducted code review can do more for the security of your application than nearly any other step. A large numbers of bugs can be found and fixed before the code makes it into an official build or into the hands of the test team. Additionally, the code review process lends itself very well to sharing security best practices amongst a development team and it produces "lessons learned" toward preventing future bugs. This guide focuses on identifying the types of issues that you should look for in the code being reviewed, and then on finding these bugs as quickly and effectively as possible. It also describes how you can use threat models, architecture diagrams, and other inputs to help guide your review.

bar code wedges   Read More

Microsoft says: Pay No Attention to the Man Behind the Glasses


In one of the quicker reversals on record, Bill Gates and Microsoft issued conflicting statements within a day regarding the software giant's willingness to open its Windows source code.

bar code wedges   Read More

INFIMACS Boasts MRP Relevant To MROs


Through incrementally adding functionality tidbits that are crucial to its target market and that are not easily emulated by its competitors, Relevant continues to have a fair shot at delivering a viable solution to project-based discrete mid-market manufacturers such as aerospace contractors, contract manufacturers of electronic components, and MRO organizations.

bar code wedges   Read More

At Last-A Complete (and Successful) RFID Implementation


A radio frequency identification implementation is a major undertaking for any organization—a project with ample risk of failure. This entire series is a step-by-step guide to the process, with this final part including a comprehensive glossary of key terms for better understanding.

bar code wedges   Read More