Script How ToWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Script How To returned the following results.
RSS What is RSS?
Related Categories

 •   Scripting
 •   Application Security
 •   Business Process Management (BPM)
 •   Testing and Analysis
 •   Data Security
 •   Virtualization
 •   Business Process Automation
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Systems Management
 •   Defect Tracking

Related Searches
 •   Integration Script How To
 •   Methods Script How
 •   Script Desktops
 •   Script How Indian
 •   Script How Learning
 •   Script How Recovery
 •   Script How To Webcasts
 •   Script How Unix
 •   Script Survey
 •   Templates Script
Advertisement

ALL RESULTS
1 - 25 of 439 | Next Page

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 01, 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by SearchSecurity.com

December 21, 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges by Lumension

February 25, 2014 - (Free Research)
In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS. 
(VIDEO) READ ABSTRACT |

Driving DevOps Through Shared Knowledge and Control by OpenMake Software

February 28, 2013 - (Free Research)
The main reason for the disconnect between development and operations in software delivery is a lack of shared information. It's hidden in one-off scripts that are only known to the development team and usually can't be known to production control. How can you avoid this? With a shared knowledge approach to DevOps. 
(WHITE PAPER) READ ABSTRACT |

It's Just Ops -- DevOps for Windows and Linux by OpenMake Software

May 29, 2014 - (Free Research)
This informative white paper provides an overview of DevOps history and delves in to how operational procedures need to change for Windows and Linux developers to achieve DevOps success. Learn how to get started by assessing your current production process according to five core factors. 
(WHITE PAPER) READ ABSTRACT |

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange by SearchSecurity.com

July 19, 2012 - (Free Research)
This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more. 
(EZINE) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 17, 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

Under Armour Improves Performance of SAP Data Loading with Winshuttle by Winshuttle, LLC

December 2008 - (Free Research)
Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention. 
(CASE STUDY) READ ABSTRACT |

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys

March 2009 - (Free Research)
Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Cloud Foundations, Edition One: Implementation Cookbook by Red Hat and JBoss

February 2011 - (Free Research)
This paper provides an overview of a reference architecture prepared by Red Hat that fully documents how to build your own private cloud. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Cloud Foundations, Edition One: Implementation Cookbook by Red Hat and HP

March 2011 - (Free Research)
This paper provides an overview of a reference architecture prepared by Red Hat that fully documents how to build your own private cloud. 
(WHITE PAPER) READ ABSTRACT |

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms: Ubuntu Enterprise Cloud by Intel

May 2010 - (Free Research)
This paper provides a detailed summary of the reference architecture for Canonical Ubuntu Enterprise Cloud using Intel-based servers, demonstrating a complete implementation that includes scripts and screen shots. Read this paper for a starting point on how to build and operate a cloud infrastructure. 
(CASE STUDY) READ ABSTRACT |

4 Levels of DevOps by OpenMake Software

May 2014 - (Free Research)
While most software development organizations have fine-tuned their application lifecycle management (ALM) processes, many still struggle with bottlenecks during the handoff between development and operations. That's where DevOps comes in -- but how do you go from ALM to DevOps? 
(WHITE PAPER) READ ABSTRACT |

Extract Data from the Cube by Microsoft Corporation India Pvt Ltd

March 2010 - (Free Research)
In this webcast, you will learn how to extract multidimensional data from the cube, once the cube is ready. Amit Bansal will show you various tools and techniques to extract data from the cube using Excel 2007, SQL Server Reporting Services & MDX scripting. 
(WEBCAST) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

November 2010 - (Free Research)
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time. 
(WEBCAST) READ ABSTRACT |

Solving Scripting Problems with Technology: The Limitations of Scripting in a Complex Business Environment by Network Automation, Inc

October 2010 - (Free Research)
This paper explains that as automation tools continue to evolve in a quest to deliver the most comprehensive set of automated capabilities, the notion of writing scripts will be rendered anachronistic. Continue reading to learn more about the shift from scriping to dynamic, intelligent process automation. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and backup: Automating the most-repeated and important manual tasks by EqualLogic, Inc.

February 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz discusses the elements of virtualization backup that are most frequently overlooked and how to automate the most common virtualization backup tasks. 
(WEBCAST) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

The Agility Gap in Today's Private Clouds by Red Hat

August 2013 - (Free Research)
Check out this white paper to explore the current challenges businesses are facing in terms of agility that private clouds have and learn how to overcome these challenges to achieve true business agility. 
(WHITE PAPER) READ ABSTRACT |

Managing Integrated Communications, Consumerization and Security: Best Practices by SearchSecurity.com

June 2012 - (Free Research)
This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users. 
(EGUIDE) READ ABSTRACT |

Put an end to mainframe scripting with policy-driven IBM automation by IBM

April 2013 - (Free Research)
Automating single-mainframe environments often requires time-consuming and cumbersome script-writing. This resource describes a strategy designed to quickly and easily replace manual methods of mainframe automation. 
(WHITE PAPER) READ ABSTRACT |

How to better manage batch jobs in Oracle environments by UC4 Software, Inc

November 2011 - (Free Research)
In part one of this two-part e-guide series, readers will learn about the basics of batch technology and how it relates to business processes. In addition, learn how batch processing and business process automation are handled in Oracle-specific environments. 
(EGUIDE) READ ABSTRACT |

Web Application Security: How to Minimize the Risk of Attacks by Qualys

July 2012 - (Free Research)
This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 439 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts