Standards Information Voice/data CodingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Standards Information Voice/data Coding returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis
 •   Data Security
 •   Network Security
 •   Vulnerability Assessment
 •   Application Security
 •   Security Policies
 •   Enterprise Information Integration/ Metadata Management
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Implementations Of Standards
 •   Improve Standards Information
 •   Standards Information B2B
 •   Standards Information Voice/data Control
 •   Standards Information Voice/data Diagram
 •   Standards Information Voice/data Sample
 •   Technical Standards Information
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Achieving ISO 27001 Compliance using Titus Solutions by TITUS

November 11, 2010 - (Free Research)
This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents. 
(WHITE PAPER) READ ABSTRACT |

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success by Breach Security

June 2009 - (Free Research)
This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Information Security Essential Guide to Compliance by Information Security Magazine

July 2010 - (Free Research)
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

SAP® Support of the Healthecare Supply Chain's Ongoing Effort to Ensure Patient Safety and Drive Business Value by SAP AG

June 2009 - (Free Research)
The Center for Healthcare Supply Chain Research (formerly the HDMA Research & Education Foundation) recently published an important study concerning data management and data sharing in the healthcare supply chain. This whitepaper discusses the key conclusions of their study. 
(WHITE PAPER) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

Worst Practices in SOA Implementation: Why Service-Oriented Architectures Fail by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
Service-oriented architecture (SOA) enables different programs, applications, and tools to interact via self-contained services that do not depend on the context or state of the other service. This white paper provides insight into the top-four worst practices for SOA integration, and how to avoid and/or overcome these worst practices. 
(WHITE PAPER) READ ABSTRACT |

CodePro AnalytiX, A Powerful Approach to Developing High Quality Code Using Eclipse by Instantiations

February 2008 - (Free Research)
This white paper highlights how to attain high quality Java code using Eclipse by eliminating code quality, code review and code dependency issues typically faced in software development. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide to Antimalware by Panda Security

October 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

Beyond the Tag: Finding Radio-frequency Identification (RFID) Value in Manufacturing and Distribution Applications by Intermec

March 2009 - (Free Research)
This white paper will describe how companies have used internal RFID systems to reduce costs and improve efficiency, and explain how the lessons learned can be applied to a variety of industrial operations. 
(WHITE PAPER) READ ABSTRACT |

Understanding EPO and Its Downtime Risks by APC by Schneider Electric

January 2005 - (Free Research)
This white paper describes the advantages and disadvantages of EPO for protecting data centers and small IT equipment rooms containing UPS systems. 
(WHITE PAPER) READ ABSTRACT |

Buyer’s Guide to Antimalware by AVG Technologies USA, Inc.

November 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.

April 2010 - (Free Research)
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Controlling Software Complexity: The Business Case for Static Source Code Analysis by Coverity

March 2008 - (Free Research)
This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code. 
(WHITE PAPER) READ ABSTRACT |

Open Source at Intel: Building with the Ecosystem by Intel

March 2010 - (Free Research)
To enable a broad spectrum of software environments and programs to run best on Intel processors and platforms, Intel offers deep technical expertise, makes significant contributions, and actively participates in standards bodies. Read on to learn more. 
(WHITE PAPER)

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Mission Critical Java by Oracle Corporation

November 2008 - (Free Research)
Read this white paper to learn how you can achieve extreme and predictable performance with Java and real-time, real-world memory leak detection and application performance analysis. 
(WHITE PAPER) READ ABSTRACT |

Finding Gold with Analytics: 5 Key Metrics for Successful Software Development by CollabNet

July 2009 - (Free Research)
Join us for a live demonstration of 5 key metrics you can use to answer many of the biggest, meatiest issues that confront development teams, and learn practical approaches for increasing efficiency and software quality in your development projects. 
(WEBCAST)

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Lowering the Cost of Test with Integrated Switch Management by National Instruments

February 2002 - (Free Research)
National Instruments Switch Executive is a significant innovation in the design and implementation of automated test systems. 
(WHITE PAPER)

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts