Examples TechnicalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Examples Technical returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Virtualization
 •   Network Management
 •   Enterprise Systems Management
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Application Security

Related Searches
 •   Configure Examples Technical
 •   Examples Technical Assessment
 •   Examples Technical Email
 •   Examples Technical Firm
 •   Examples Technical Frameworks
 •   Examples Technical View
 •   Fast Examples Technical
 •   Multi Examples
 •   Requirement Examples
 •   Uk Examples Technical
Advertisement

ALL RESULTS
1 - 25 of 490 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges by Panaya, Inc.

April 07, 2010 - (Free Research)
This presentation transcript of the webcast “Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges” explores the top challenges of an SAP ERP 6.0 upgrade and provides must-know advice, real-world examples, technical tips and other tricks to help you solve them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Course: Insecure Temporary Files (CWE-377) by Klocwork

November 13, 2013 - (Free Research)
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377. 
(WEBCAST) READ ABSTRACT |

Course: Improper Validation of Array Index (CWE-129) by Klocwork

November 13, 2013 - (Free Research)
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129. 
(WEBCAST) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Inspiring disruption: Tech Trends 2014 by ComputerWeekly.com

February 26, 2014 - (Free Research)
This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Presentation Transcript: Enabling The Business Governance Of Data by ASG Software Solutions

February 05, 2010 - (Free Research)
In this presentation transcript, Scott McCurdy, SVP of Business Solutions at ASG and featured guest Rob Karel, Principal Analyst at Forrester Research, discuss how enterprises are linking technical metadata to the formal management of business terms to achieve true enterprise data governance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Move Toward IT Service Management (ITSM) Mobilization by BlackBerry

February 17, 2010 - (Free Research)
IDG Research Services recently surveyed more than 200 CIOs and senior IT and business executives at companies of all sizes to examine the benefits of giving employees mobile access to strategic business applications, including ITSM applications. This analyst report discusses the benefits of ITSM mobilization and key findings from the IDG survey. 
(ANALYST REPORT) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing for Developers by IBM

September 2010 - (Free Research)
Join us for the Cloud computing for developers virtual events in October and learn how to solve business and technical challenges in the cloud. Through real-world examples of specific challenges and solutions, as well as live demos of techniques and products, you can learn more about leveraging the cloud. Read on for details. 
(EVENT)

E-Book: Red Flag Rules Compliance by Gemalto

September 2010 - (Free Research)
SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims. 
(EBOOK) READ ABSTRACT |

Adaptive Packet Filtering by Gigamon

December 2013 - (Free Research)
This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more. 
(WHITE PAPER) READ ABSTRACT |

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497) by Klocwork

November 2013 - (Free Research)
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security. 
(WEBCAST) READ ABSTRACT |

Address performance and capacity issues by deploying a virtual infrastructure for SAP by VMware, Inc.

March 2009 - (Free Research)
This white paper describes technical and business considerations for deploying a virtual infrastructure for SAP landscapes with EMC and VMware technologies. The white paper addresses a variety of key considerations for deploying such an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Getting Your Wireless Together to Save Time, Improve Reception by Cisco Systems, Inc.

January 2011 - (Free Research)
When you “cluster” standalone wireless access points, you can improve reception and roaming, strengthen security, and save many hours of technical labor—all without the expense of a wireless controller. Continue reading to learn more about clustering improvement. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Has Your QSA Thrown You Under a Bus? by Dell SecureWorks UK

August 2011 - (Free Research)
After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

XML Threat Model for REST, SOA and Web 2.0 by Intel

September 2011 - (Free Research)
This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL]. 
(WHITE PAPER) READ ABSTRACT |

Maximizing IT Value by Using High-End Server Processors by Dell, Inc. and Intel®

October 2008 - (Free Research)
Intel IT has standardized on Intel® Xeon® processors with a core frequency of 3 GHz for two-socket servers for design computing and enterprise server virtualization. 
(WHITE PAPER) READ ABSTRACT |

The Need for Unified Content Security by Websense, Inc.

April 2011 - (Free Research)
Part 1 of a three-part series, this paper elaborates on the business and technology conditions that have given rise to the need for a unified content security solution.It also includes a high-level functional description and summary of benefits for such a solution. 
(WHITE PAPER) READ ABSTRACT |

Consider the User Experience and Operational Efficiency by Cisco Systems, Inc.

November 2010 - (Free Research)
Cisco Services presents a series of four white papers to provide a framework for discovering compelling business cases and identifying the necessary services needed to deliver the desired experience. The second white paper in the series covers critical knowledge areas in the successful planning and design of a medianet or media-optimized network. 
(WHITE PAPER)

Virtualized Storage from HP by Hewlett-Packard Company

February 2008 - (Free Research)
This paper is designed to help users who would like to understand virtualization better in order to evaluate the operational benefits it could provide. 
(WHITE PAPER) READ ABSTRACT |

World-Class EA: The Agile Enterprise by ComputerWeekly.com

February 2013 - (Free Research)
Agile is about more than software development, it's a mindset. This report from the Open Group explains how to apply agile techniques and best practices to the enterprise. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

The Real-World Benefits of SAP Safeguarding Services by SAP America, Inc.

July 2011 - (Free Research)
This white paper introduces professional safeguarding services which can provide technical support and advice for ensuring IT projects go as planned. Inside, gain access to the thoughts and opinions of real-world users of the service. 
(WHITE PAPER) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

1 - 25 of 490 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts