Security And Time ClockWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security And Time Clock returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Network Security
 •   Workforce Management
 •   Storage Management
 •   Time & Attendance
 •   Data Security
 •   Business Process Management (BPM)
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Data Center Management
 •   Storage Security

Related Searches
 •   Facts Security
 •   Free Security
 •   Introduction Security
 •   Operate Security And
 •   Security And Finding
 •   Security And Softwares
 •   Security And Time Case Study
 •   Security And Time Marketing
 •   Security Fast
 •   Security Us
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

A Hidden Security Danger: Network Timing by Symmetricom

December 27, 2010 - (Free Research)
Most anyone who uses a PC no doubt sees the little clock at the bottom of the screen,dutifully ticking off the minutes of the passing day. But chances are they don’t often think about the role that clock plays in the network to which the PC is attached. 
(WHITE PAPER) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

The Importance of Network Time Synchronization by Symmetricom

October 20, 2009 - (Free Research)
This paper explains why accurate network time -- and therefore precise network time synchronization -- is critically important for network management. Read on to learn more about the importance of network time synchronization. 
(WHITE PAPER) READ ABSTRACT |

First the Tick, Now the Tock: Next Generation Intel Microarchitecture - Nehalem by Intel Corporation

April 02, 2009 - (Free Research)
Read this paper and get a look at how the next generation microarchitecture's dynamically scalable and design-scalable features directly contribute to power efficiency and performance. 
(WHITE PAPER)

JobClock by Exaktime

JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine. Each worker carries keytabs on their own keyring that identifies them in the system. 
(HARDWARE PRODUCT)

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Six Tips for Reducing Downtime in Travel and Transport by Marathon Technologies

February 23, 2010 - (Free Research)
Whether it's a security system, baggage handling application, order or vessel tracking downtime to applications supporting travel and transportation can throw off precisely timed schedules for travelers and shipments alike. This paper outlines six key tips for keeping travel and transportation logistics applications running without interruption. 
(WHITE PAPER) READ ABSTRACT |

zCisco 1800 Series Integrated Services Routers: Cisco 1841 Router (Modular) by Cisco Systems, Inc.

The Cisco 1841 router offers embedded hardware-based encryption enabled by an optional Cisco IOS Software security image. 
(HARDWARE PRODUCT)

Select the Right Solution for Endpoint Management by IBM

May 31, 2013 - (Free Research)
This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Presentation Transcript: Maximizing Workforce Management with Best-of-Breed Solutions by Kronos Incorporated

April 06, 2010 - (Free Research)
Many organizations find it difficult to effectively handle their workforce management (WFM) processes. This presentation transcript covers a set of WFM best practices to help organizations with this challenge and discusses how best-of-breed solutions can help reduce error rates, improve productivity and deliver immediate bottom-line returns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Podcast: Maximizing Workforce Management with Best-of Breed Solutions by Kronos Incorporated

March 25, 2010 - (Free Research)
Many organizations find it difficult to effectively handle their workforce management (WFM) processes. This podcast covers a set of WFM best practices to help organizations with this challenge and discusses how best-of-breed solutions can help reduce error rates, improve productivity and deliver immediate bottom-line returns. 
(PODCAST) READ ABSTRACT |

Webcast: Maximizing Workforce Management with Best-of-Breed Solutions by Kronos Incorporated

March 25, 2010 - (Free Research)
Many organizations find it difficult to effectively handle their workforce management (WFM) processes. This webcast covers a set of WFM best practices to help organizations with this challenge and discusses how best-of-breed solutions can help reduce error rates, improve productivity and deliver immediate bottom-line returns. 
(WEBCAST) READ ABSTRACT |

Turnover Tactics by CIO Decisions

February 01, 2007 - (Free Research)
Chances are these execs will be gone in five years or less. The Peace Corps' limit on staff tenure makes managing turnover an art form. 
(JOURNAL ARTICLE)

How to Migrate Without Downtime - An Executive Overview by Vision Solutions

April 01, 2014 - (Free Research)
This white paper covers common migration triggers and various methods to successfully migrate systems without business downtime. 
(WHITE PAPER) READ ABSTRACT |

Evaluating colocation, cloud computing and changing data center infrastructures by SAVVIS

April 08, 2011 - (Free Research)
In this expert e-guide from SearchDataCenter.com, get insight into successfully implementing these strategies at your organization. Learn best practices for choosing a colocation data center. Plus find out why even the U.S. government is now exploring cloud computing. 
(EGUIDE) READ ABSTRACT |

Bowen & Groves Honored in Fifth Annual International Business Awards(SM) by Bowen & Groves

July 2008 - (Free Research)
Bowen & Groves the developer of M1 by B&G™ a leading Manufacturing ERP System has earned a Certificate of Finalist Recognition for Best Support Organization and Best Product Development Department in the 2008 International Business Awards. 
(WHITE PAPER) READ ABSTRACT |

Software-as-a-Service: The Alternative for Web Content Management by CrownPeak

December 2007 - (Free Research)
Explore how you can measure the success of your online marketing initiatives with software-as-a-service (SaaS). Leverage the flexibility and ease of SaaS to handle your Websites effortlessly and generate true ROI. 
(WHITE PAPER) READ ABSTRACT |

How Barclays Global Investors Centralized Development and Got Compliant--FAST! by CollabNet

January 2010 - (Free Research)
Discover an ALM platform that will help meet aggressive government deadlines, centralize development, and implement a long-term strategy that has continued to power global development environments for years. 
(WEBCAST) READ ABSTRACT |

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension

November 2008 - (Free Research)
Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting. 
(WHITE PAPER) READ ABSTRACT |

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition by AVG Technologies USA, Inc.

March 2010 - (Free Research)
The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs. 
(CASE STUDY) READ ABSTRACT |

The Essential Guide to Protecting Essential Information by Websense, Inc.

November 2008 - (Free Research)
Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential. 
(ARTICLE) READ ABSTRACT |

How Malware Can Sneak Into Your Company Networks and How to Deal With It by AVG Technologies USA, Inc.

March 2010 - (Free Research)
Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them. 
(WHITE PAPER) READ ABSTRACT |

Neverfail Heartbeat Failover Engine by Neverfail

June 2013 - (Free Research)
Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability. 
(WHITE PAPER) READ ABSTRACT |

Backup Acceleration with EMC NetWorker and Snapshot Management by EMC Corporation

November 2011 - (Free Research)
By combining management of heterogeneous replication and snapshot technologies with backup operations, EMC NetWorker provides a unified "command-and-control" platform to deliver unparalleled performance and reduced complexity for mission-critical application and data protection. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts