Scripts OutlineWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Scripts Outline returned the following results.
RSS What is RSS?
Related Categories

 •   Scripting
 •   Application Security
 •   Business Process Management (BPM)
 •   Application Management and Maintenance
 •   Testing and Analysis
 •   Vulnerability Assessment
 •   Automated Software Quality (ASQ)
 •   Business Process Automation
 •   Data Security
 •   Virtualization

Related Searches
 •   Contacts Scripts
 •   India Scripts Outline
 •   Introduction Of Scripts Outline
 •   Provider Scripts Outline
 •   Scripts Disk
 •   Scripts Industry
 •   Scripts Maintain
 •   Scripts Outline Commercial
 •   Scripts Outline Sql
 •   Scripts Outline Tools Software
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Solving Scripting Problems with Technology by Network Automation, Inc

December 21, 2010 - (Free Research)
This presentation transcript brought to you by Network Automation, Inc. outlines a conversation between Aleksey Lazaryev and Martin Gadzinowski which discusses scripting issues in the business world and what types of solutions can be implemented to solve these issues. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Combining virtual server backup methods for a complete strategy by SearchStorage.com

May 21, 2012 - (Free Research)
This expert e-guide outlines strategies for combining virtual server backup methods with traditional approaches for a more comprehensive VM backup system. Discover tips that will protect your virtual environment at no extra cost. 
(EGUIDE) READ ABSTRACT |

Intel® Cloud Builder Guide: Cloud Design and Deployment on Intel® Platforms: Red Hat* Cloud Foundations by Intel

November 19, 2010 - (Free Research)
This paper is for cloud service providers, hosts, and enterprise IT organizations who are looking to build their own cloud infrastructure, the decision to use a cloud for the delivery of IT services is best done by starting with the knowledge and experience gained from previous work. Read on to learn more about cloud design and deployment. 
(WHITE PAPER) READ ABSTRACT |

Virtualization and backup: Automating the most-repeated and important manual tasks by EqualLogic, Inc.

February 2008 - (Free Research)
In this webcast, IT consultant Andrew Kutz discusses the elements of virtualization backup that are most frequently overlooked and how to automate the most common virtualization backup tasks. 
(WEBCAST) READ ABSTRACT |

Web-Facing Applications: Mitigating Likely Web Application Threats by SearchSecurity.com

February 2013 - (Free Research)
In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started. 
(EGUIDE) READ ABSTRACT |

Maximizing IT Investments: Recession-proofing Your Network by F5 Networks

July 2008 - (Free Research)
This whitepaper outlines a plan that enables network teams to implement a plan that optimizes application performance. It also identifies recession-proof networking technologies and their challenges. 
(WHITE PAPER) READ ABSTRACT |

Improving Agile Development with Continuous Build Scripts & Build Avoidance by OpenMake Software

April 2008 - (Free Research)
This white paper discusses how realize the full benefits of continuous integration in agile development. 
(WHITE PAPER) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

November 2010 - (Free Research)
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time. 
(WEBCAST) READ ABSTRACT |

Solving Scripting Problems with Technology: The Limitations of Scripting in a Complex Business Environment by Network Automation, Inc

October 2010 - (Free Research)
This paper explains that as automation tools continue to evolve in a quest to deliver the most comprehensive set of automated capabilities, the notion of writing scripts will be rendered anachronistic. Continue reading to learn more about the shift from scriping to dynamic, intelligent process automation. 
(WHITE PAPER) READ ABSTRACT |

Eradicate Cross-Site Scripting by Veracode, Inc.

February 2011 - (Free Research)
The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation. 
(WHITE PAPER) READ ABSTRACT |

Put an end to mainframe scripting with policy-driven IBM automation by IBM

April 2013 - (Free Research)
Automating single-mainframe environments often requires time-consuming and cumbersome script-writing. This resource describes a strategy designed to quickly and easily replace manual methods of mainframe automation. 
(WHITE PAPER) READ ABSTRACT |

Ten Errors to Avoid When Commissioning a Data Center by APC by Schneider Electric

February 2009 - (Free Research)
This paper outlines the ten most common errors that prevent successful execution of the commissioning process. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: How to Minimize the Risk of Attacks by Qualys

July 2012 - (Free Research)
This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Expert Insight into Powershell's Scripting by Dell Compellent

September 2011 - (Free Research)
To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management. 
(EGUIDE) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by SearchSecurity.com

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

HP LoadRunner Software Tips and Tricks for Configuration Scripting and Execution by Hewlett-Packard Company

August 2008 - (Free Research)
This guide is intended to help new users and seasoned professionals learn new ways to design and implement successful load testing initiatives using HP LoadRunner. 
(ARTICLE) READ ABSTRACT |

Web Application Security - How to Minimise Prevalent Risk of Attacks by Qualys

March 2009 - (Free Research)
Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options. 
(WHITE PAPER) READ ABSTRACT |

Driving DevOps Through Shared Knowledge and Control by OpenMake Software

February 2013 - (Free Research)
The main reason for the disconnect between development and operations in software delivery is a lack of shared information. It's hidden in one-off scripts that are only known to the development team and usually can't be known to production control. How can you avoid this? With a shared knowledge approach to DevOps. 
(WHITE PAPER) READ ABSTRACT |

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges by Lumension

February 2014 - (Free Research)
In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS. 
(VIDEO) READ ABSTRACT |

Automating the Application Release Process: Build vs. Buy by CA Technologies.

July 2013 - (Free Research)
Developers are faced with two choices when it comes to application release automation: build in-house scripts or purchase a pre-packaged product. Access this helpful resource to explore the limitations of writing automation scripts for application release, and discover how an app release automation technology can help you overcome those challenges. 
(WHITE PAPER) READ ABSTRACT |

The Anatomy of a Cross-Site Scripting Campaign by Imperva

August 2010 - (Free Research)
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks. 
(WHITE PAPER) READ ABSTRACT |

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by Sophos, Inc.

April 2011 - (Free Research)
Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore. 
(WHITE PAPER) READ ABSTRACT |

Windows PowerShell 2.0 by Microsoft

January 2009 - (Free Research)
Explore how Windows PowerShell 2.0 can help increase the productivity of IT professionals by providing a powerful, complete scripting language to automate repetitive tasks and conduct remote troubleshooting. It delivers a growing set of cmdlets that can be used to manage Windows-based PCs and servers, and it can be easily extended. 
(WEBCAST)

It's Just Ops -- DevOps for Windows and Linux by OpenMake Software

May 2014 - (Free Research)
This informative white paper provides an overview of DevOps history and delves in to how operational procedures need to change for Windows and Linux developers to achieve DevOps success. Learn how to get started by assessing your current production process according to five core factors. 
(WHITE PAPER) READ ABSTRACT |

Under Armour Improves Performance of SAP Data Loading with Winshuttle by Winshuttle, LLC

December 2008 - (Free Research)
Winshuttle streamlined Under Armour's seasonal product creation process, reducing manual data entry by 80% while empowering end-users to run data transfers without excessive IT intervention. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts