Hazardous ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hazardous Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Availability, Performance and Problem Management
 •   Data Center Management
 •   Managed Security Services
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Wiring and Cabling Solutions
 •   Power Distribution
 •   UPS Systems
 •   IT Portfolio Management

Related Searches
 •   Export Hazardous
 •   Hazardous Accounting
 •   Hazardous Applications Buying
 •   Hazardous Applications Professional
 •   Hazardous Customer
 •   Hazardous Databases
 •   Hazardous Top
 •   Networks Hazardous Applications
 •   Supply Hazardous Applications
 •   Use Hazardous Applications
Advertisement

ALL RESULTS
1 - 25 of 493 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by Marathon Technologies

September 28, 2009 - (Free Research)
This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure. 
(WHITE PAPER) READ ABSTRACT |

Media Conversion in Video Security and Surveillance Systems by Transition Networks, Inc.

September 2008 - (Free Research)
This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice. 
(WHITE PAPER) READ ABSTRACT |

High Efficiency Indirect Air Economizer-based Cooling for Data Centers by APC by Schneider Electric

November 2013 - (Free Research)
This white paper details how indirect air economizer-based cooling will lower the cost of running your data center without the same risk as directly exposing your infrastructure to the outdoor air. 
(WHITE PAPER) READ ABSTRACT |

Sage ERP X3 Helps Aceto Corporation Manage Complicated Compliance Regulations by Sage North America

October 2010 - (Free Research)
This case study explains how with Sage ERP X3, Aceto Corporation’s business processes are streamlined and automated. The company is finding it easier to comply with the financial reporting responsibilities placed on publicly-traded companies. Read on to learn how Aceto benefited from Sage ERP X3. 
(CASE STUDY) READ ABSTRACT |

Battery Technologies for Data Centers and Network Rooms: Environmental Regulations by APC by Schneider Electric

February 2009 - (Free Research)
This paper offers a high level summary of the regulations and provides a list of environmental compliance information resources. 
(WHITE PAPER) READ ABSTRACT |

Roundtable: Green IT: Making sustainability a corporate game-changer by ComputerWeekly.com

June 2010 - (Free Research)
To discuss 'green' issues, C8 Consulting and document imaging manufacturer Kyocera Mita invited a number of specialists to give their views on the role of ‘green’ and making sustainability a corporate game-changer in the future. 
(WHITE PAPER) READ ABSTRACT |

The Role of Integrated Network Service in Next-Generation Application Delivery by F5 Networks

December 2013 - (Free Research)
This guide explores the importance of developing a more agile network, making it easier for businesses to implement cloud computing and mobility. 
(WHITE PAPER) READ ABSTRACT |

SAML 101 by Ping Identity Corporation

September 2013 - (Free Research)
In this white paper, learn about a secure, private mechanism for organizations to share user identities with single sign-on (SSO), and explore the many benefits. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for On-Premises Application Platforms by Red Hat

December 2013 - (Free Research)
This Gartner Magic Quadrant examines the leading application infrastructure vendors that provide IT developers and architects with complete end-to-end support for application projects for enterprise use. 
(WHITE PAPER) READ ABSTRACT |

Mobile Application Security Best Practices to Protect Corporate Data by Thawte Inc.

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks. 
(EGUIDE) READ ABSTRACT |

Case Study - Savola Group by Riverbed Technology, Inc.

December 2012 - (Free Research)
The Savola Group relies on its WAN to deliver business critical applications and data. After deploying the Steelhead appliances, Savola has saved around $100,000 a year in bandwidth upgrade costs, boosted application performance, increased employee productivity, and enhanced its IT infrastructure. 
(CASE STUDY) READ ABSTRACT |

Adobe Creative Cloud for teams. There’s always something new. by CDW Corporation

February 2014 - (Free Research)
Modern application and web developers are innovators -- and they should have the latest and greatest tools available to faciliate a high level of innovation. Adobe recognizes this need, and that's why when it comes to their new Creative Cloud offering for development and design applications, they're always rolling out new upgrades. 
(WHITE PAPER) READ ABSTRACT |

Federated Identity andSoftware as a Service (SaaS):Single Sign-on to the Cloud by Ping Identity Corporation

December 2010 - (Free Research)
This white paper serves as an overview of the market forces that have created the need for rapid deployment of Internet Single Sign-on for SaaS deployments. Inside, discover how you can address these IT needs with architecture, experience, and speed. 
(WHITE PAPER) READ ABSTRACT |

A Primer On the System for Cross Domain Identity Management (SCIM) by Ping Identity Corporation

January 2014 - (Free Research)
Single sign-on (SSO) requires user provisioning. But, since traditional provisioning systems have struggled to scalably manage identities due to the diversity of applications, the need for a solution is dire. In this white paper, learn about how SCIM overcomes this issue and has gained adoption among application vendors. 
(WHITE PAPER) READ ABSTRACT |

Five Reasons It’s Time For Secure Single Sign-On by Ping Identity Corporation

July 2013 - (Free Research)
This white paper outlines five reasons why single sign-on is a smart choice for cloud apps – from improved security to increased customer engagement. Inside, discover how to dramatically increase the overall ROI and user adoption rate of cloud applications. 
(WHITE PAPER) READ ABSTRACT |

Case Study - Stomo by Riverbed Technology, Inc.

December 2013 - (Free Research)
When STOMO underwent expansion, the additional data traffic generated put pressure on the company's wide area network. By deploying Steelhead appliances, STOMO has achieved annual savings of $13,000 by avoiding bandwidth upgrades, increased its optimized bandwidth capacity three-fold, and reduced network traffic by more than 70%. 
(CASE STUDY) READ ABSTRACT |

Case Study - Impresa Pizzarotti by Riverbed Technology, Inc.

December 2013 - (Free Research)
After deploying a Riverbed WAN optimization solution at selected locations, Pizzarotti – which operates dozens of construction sites in numerous countries – improved application performance from minutes to seconds and enhanced employee productivity. 
(CASE STUDY) READ ABSTRACT |

What's Next for Adobe Creative Cloud Apps by CDW Corporation

April 2014 - (Free Research)
If you're creating video content for web applications, websites, or mobile apps, you need software to streamline your workflow and foster innovation. In this resource, explore the offerings from Adobe Creative Cloud, the new subscription-based model for well-known Adobe software. 
(ARTICLE) READ ABSTRACT |

Ping Federate 7 Product Guide by Ping Identity Corporation

March 2014 - (Free Research)
This whitepaper provides a complete guide to PingFederate, a leading enterprise identity bridge for standards-based federated identity management. 
(WHITE PAPER) READ ABSTRACT |

The Primer: Nuts and Bolts of Federated IdentityManagement by Ping Identity Corporation

December 2010 - (Free Research)
IT departments need to understand how to securely manage and control users' identities. This white paper provides an introduction to leveraging user credentials securely through federated identity management. 
(WHITE PAPER) READ ABSTRACT |

Secure Internet Single Sign-On 101 by Ping Identity Corporation

December 2010 - (Free Research)
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise's security domain to outsourced services. This white paper explores the limitations of current SSO implementations outside of a single security domain and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Customer Video: Ceva Sante Animale by MicroStrategy Incorporated

January 2014 - (Free Research)
Ceva Santé Animale, a global veterinary pharmaceutical company, knew that an online tool wasn't enough to empower their sales reps with the most timely, accurate data out in the field. View this brief video to learn how CSA created a custom mobile app for their customer relationship management (CRM) systems that works online and offline. 
(VIDEO) READ ABSTRACT |

Customer Video: AutoTrader by MicroStrategy Incorporated

January 2014 - (Free Research)
In this brief video, learn how AutoTrader mobilized their sales force with a custom iPad app that gives them access to critical customer and sales data anywhere, at any time -- so they can maximize their time with clients. Discover the specific benefits they experienced by watching now. 
(VIDEO) READ ABSTRACT |

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

Hunter Fan Prepares For Business Growth with Vblock by VCE (E-mail this company)

December 2012 - (Free Research)
Hunter Fan Company, a global manufacturer of ceiling fans and air quality and control products, improved performance of decision support-applications and accelerated the rollout of virtualized desktops with one solution. Find out how. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 493 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts