Software inspection

Results: 601



#Item
101Capability Maturity Model / Information technology management / Carnegie Mellon University / Software Engineering Institute / Process area / Software inspection / Quality assurance / Requirements management / Software quality management / Software development / Software / Software development process

Misconceptions of the Capability Maturity Model1 Karl Wiegers Process Impact www.processimpact.com Many organizations are striving to improve their software development processes with the help of the Capability Maturity

Add to Reading List

Source URL: www.processimpact.com

Language: English - Date: 2010-06-21 13:40:04
102Routers / Cisco Systems / Deep packet inspection / Videotelephony / International Data Corporation / Vyatta / Computing / Software / System software

Software Defined Networking: Fertile Ground for a Network Apps Store Dustin Kehoe Assoc. Research Director IDC Australia

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2013-02-21 03:15:55
103Security / Deep packet inspection / Mass surveillance / Surveillance / Call-recording software / Verint Systems / Imperva / Check Point / Vormetric / Computing / Computer security / Computer network security

RSAC15_South_Hall_3-30-15

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-03-31 08:55:29
104Science / Knowledge / Multimodal interaction / Academia / Collaborative software / Software inspection / Videoconferencing / Software peer review / Groupware / Software review / Peer review

When Reviewers Can’t Meet1 Karl Wiegers Process Impact http://www.processimpact.com The many benefits of software peer reviews include improved quality and productivity, sharing of technical knowledge, and gaining insi

Add to Reading List

Source URL: www.processimpact.com

Language: English - Date: 2010-06-21 13:40:33
105Computer security / Unified threat management / Deep packet inspection / Security appliance / Content filtering / Content-control software / Malware / Proxy server / Microsoft Forefront Threat Management Gateway / Computer network security / Computing / System software

ContentProtect Security Appliance Reveal. Optimize. Protect.

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2010-04-12 14:12:06
106Computer security / Computing / Network performance / System software / Companies listed on the New York Stock Exchange / Deep packet inspection / Throughput / McAfee VirusScan / Computer network security / McAfee / Antivirus software

Throughput and Scalability Report McAfee NGFW 5206, v5.8 DR140912 9 October 2014

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-20 08:09:30
107Anti-spam / Spam filtering / Computer network security / Deep packet inspection / Computer networking / Barracuda Networks / Microsoft Forefront Threat Management Gateway / Computer appliance / Cloud computing / Computing / System software / Computer security

Protection for Web users inside and beyond the corporate perimeter with unified policy management and reporting Web security is today’s must-address issue. It is difficult to safeguard all Web users from phishing, mali

Add to Reading List

Source URL: www.cpatechnology.net

Language: English - Date: 2015-04-03 10:08:37
108Videotelephony / VMware / System software / Blade server / Technology / Cisco Unified Computing System / Computing / Cisco Systems / Deep packet inspection

At-a-Glance Cisco UCS Mini: Powering Applications To overcome these entry-point barriers, Cisco has developed self-contained desktop virtualization solutions, including: • “Cisco UCS Mini, Nimble Storage, and Citri

Add to Reading List

Source URL: www.cisco.com

Language: English
109Evaluation / Human–computer interaction / Software testing / Usability testing / Cognitive walkthrough / Heuristic evaluation / Science / Technology / Usability inspection / Evaluation methods / Usability

INTERNATIONAL JOURNAL OF HUMAN–COMPUTER INTERACTION, 13(4), 421–443 Copyright © 2001, Lawrence Erlbaum Associates, Inc. The Evaluator Effect: A Chilling Fact About Usability Evaluation Methods Morten Hertzum

Add to Reading List

Source URL: www-ist.massey.ac.nz

Language: English - Date: 2008-09-08 02:14:10
110Videotelephony / OpenStack / Electronic engineering / Computing / Cisco Systems / Deep packet inspection

Partner Program Guide “We’re turning storage into a world that, instead is a thing that’s going to graduate more towards software running on commodity hardware.” – Henry Baltazar, Forrester Research Inc.

Add to Reading List

Source URL: swiftstack.com

Language: English - Date: 2015-02-25 01:43:23
UPDATE