Identity-Based Web PartsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Identity-Based Web Parts returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Embedded Application Development
 •   Data Security
 •   Virtualization
 •   Application Management and Maintenance
 •   Testing and Analysis
 •   Network Security
 •   Application Lifecycle Management(ALM)
 •   Application Security
 •   Business Intelligence Solutions

Related Searches
 •   Capacities Identity-Based
 •   Identity-Based Technologies
 •   Identity-Based Web Contracts
 •   Identity-Based Web History
 •   Identity-Based Web Parts Florida
 •   Identity-Based Web Parts Training
 •   Identity-Based Web South Dakota
 •   Internet-Based Identity-Based Web
 •   Manufacturer Identity-Based Web
 •   Usa Identity-Based Web Parts
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Secure By Design: Building Identity-based Security into Today’s Information Systems by IBM

March 11, 2013 - (Free Research)
Consult this white paper to learn how you can improve your IT strategy. As the number of IT security incidents increases, businesses must begin to invest in information security and IT risk management. Find out how you create a security technique that is built-in to your company's structure by reading this resource. 
(WHITE PAPER) READ ABSTRACT |

How to Protect Your Critical Resources with Identity-based Access Control by AEP Networks

April 2008 - (Free Research)
This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges. 
(WHITE PAPER) READ ABSTRACT |

Email Security- The IBE Architectural Advantage by Voltage Security, Inc.

April 2012 - (Free Research)
This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more. 
(WHITE PAPER) READ ABSTRACT |

The True Costs of E-mail Encryption by Trend Micro

August 2010 - (Free Research)
Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more. 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Tackling the Top Five Network Access Control Challenges by Juniper Networks, Inc.

March 2011 - (Free Research)
In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each 
(WHITE PAPER) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

Interpol, Entrust Develop Advanced Multipurpose SmartCard by Entrust, Inc.

November 2011 - (Free Research)
See how in this real world case study the power of advanced enterprise security was harnessed to create the most advanced multipurpose credentials in the world for INTERPOL. 
(WHITE PAPER) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

Automation, continuous integration and continuous improvement in Agile ALM -- Part 2 by IBM

November 2011 - (Free Research)
This second part of a two-part expert Q & A digs more deeply into automation skills, build automation, continuous integration, and continuous improvement to processes within application lifecycle management (ALM). 
(EGUIDE) READ ABSTRACT |

SOA and BPM: A Process Centric Approach - Part 1 Background and Basic by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes - discussed here as Service-Oriented Computing (SOC) as a way of gaining a better view on SOA in relation to BPM. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: The Practical Implementation of BPM & SOA, Part II by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes. Discussed here is methodology, best practices and experiences. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cloud computing for the enterprise: Part 2: WebSphere sMash and DB2 Express-C on the Amazon EC2 public cloud by IBM

May 2011 - (Free Research)
This article looks specifically at the public cloud and how you can use the IBM® WebSphere® sMash and IBM DB2® Express-C Amazon Machine Images (AMI) to deliver Web applications hosted on the EC2 public cloud infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (Part 1) by Intel Software Network

June 2009 - (Free Research)
This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors. 
(WHITE PAPER)

The Innovation Barrier: Has Testing Fallen Behind Development? by Fanfare

February 2007 - (Free Research)
Constant product innovation has contributed to a thriving equipment-manufacturing industry, however, fewer time-saving tools are available to QA than developer groups. As a result, testing is becoming an innovation barrier. This paper examines the innovation barrier: its causes, effects, & what’s needed to restore the vigorous pace of innovation. 
(WHITE PAPER) READ ABSTRACT |

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction by Enigma, Inc.

March 2008 - (Free Research)
This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs. 
(WHITE PAPER) READ ABSTRACT |

Cloud computing for the enterprise: Part 1: Capturing the cloud by IBM

May 2011 - (Free Research)
This article discusses cloud computing in general, then dissects the layers of the cloud, presents the different cloud types, along with their benefits and drawbacks, and explains why this movement is important for enterprise developers. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games - Part 3 by Intel

July 2009 - (Free Research)
In this 3rd part of the <i>Designing Artificial Intelligence for Games</i> series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture. 
(TECHNICAL ARTICLE)

Collaboration to innovation: Leveraging Web 2.0 to Accelerate New Service Ideas by IBM

July 2007 - (Free Research)
This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation. 
(WHITE PAPER) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Programmer’s Guide: Using LucidWorks Enterprise to add search to your Web Application by Lucid Works

December 2010 - (Free Research)
This step-by-step guide shows a programmatic approach to working with LucidWorks Enterprise, the search solution from LucidWorks Enterprise built on Apache Solr. We’ll show how to add content, index it, create a web page (with example PHP code) to send search requests and display results, and more.  
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript - Sun Solutions for Boosting Web hosting Efficiency and Optimization by Sun Microsystems, Inc. and Intel Corporation

June 2009 - (Free Research)
Read this transcript featuring industry veteran Greg Schulz for part III of "Business Benefits of Boosting Web hosting" to gain more insight into the benefits and options of boosting web hosting. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Gaining a Competitive Design Advantage in the New Telecom/Datacom Marketplace by Telelogic, An IBM Company

June 2008 - (Free Research)
Embedded Market Forecasters, in this paper, present the case for using Model Driven Development (MDD). MDD is a preferred model because it allows for the development of software applications that are delivered on-time and meet pre-design expectations while also providing for the reuse of said software when the current hardware is replaced. 
(ANALYST REPORT) READ ABSTRACT |

Defender 5 by Dell Software

Defender offers the essential security you need to conduct your e-business with confidence, safe in the knowledge that your critical digital assets, customers and employees are protected by reliable, future-proof software. 
(ASP & SOFTWARE PRODUCT)

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts