Windows It CodeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Windows It Code returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Code Algorithms
 •   Operating Systems and Subsystems
 •   Application Security
 •   Desktop Management
 •   Application Management and Maintenance
 •   Desktops/ Workstations
 •   Text and Code Editing
 •   Source Code Control

Related Searches
 •   Article About Windows It
 •   Calls Windows It
 •   Fast Windows It
 •   Organization Windows It
 •   Procedure Windows It Code
 •   Windows Accounting
 •   Windows Flow
 •   Windows It Code Risks
 •   Windows Trends
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

Resources for iOS developers (Windows Store apps) by Microsoft

March 05, 2013 - (Free Research)
If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps. 
(RESOURCE CENTER) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Resources for Android developers (Windows Store apps) by Microsoft

March 05, 2013 - (Free Research)
If you're an Android developer looking to get started creating apps for Windows 8, look no further than this resource center made just for you. You'll get tools on how to build Windows Store apps using a variety of programming languages, including blog posts, coding road maps, and much more. 
(RESOURCE CENTER) READ ABSTRACT |

Getting Started: Learn to build Windows Store apps by Microsoft

April 15, 2013 - (Free Research)
In this guide, discover all the fundamentals you need to get your first Windows app off the ground. Read on to explore everything from planning, selling, and packaging apps, to coding in XAML to HTML5 to C++, to concepts and architectures. 
(RESOURCE CENTER) READ ABSTRACT |

Windows 8 Secrets by ComputerWeekly.com

June 28, 2013 - (Free Research)
Download a step by step guide to installing Windows 8 from the book Windows 8 Secrets and receive a 30% discount on the full book. 
(BOOK) READ ABSTRACT |

Guide: Migrating from Windows XP to Windows 7 by ComputerWeekly.com

November 05, 2011 - (Free Research)
This Computer Weekly Buyer's Guide gives you the facts and advice you need to migrate your organisation from Windows XP to Windows 7. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Windows 7 Commercial Adoption Outlook by Dell, Inc. and Microsoft

October 15, 2009 - (Free Research)
Windows XP won't be around forever, and the anticipation for commercial adoption of Windows 7 is reaching a boiling point. With Windows 7 available now for volume license customers and for everyone else on October 22, IT professionals should start preparing for it now. 
(ANALYST REPORT) READ ABSTRACT |

JobClock by Exaktime

JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine. Each worker carries keytabs on their own keyring that identifies them in the system. 
(HARDWARE PRODUCT)

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension

May 14, 2013 - (Free Research)
Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities. 
(WEBCAST) READ ABSTRACT |

A Closer Look at Windows Vista by National Instruments

February 2008 - (Free Research)
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative... 
(WHITE PAPER) READ ABSTRACT |

Increasing Performance, Security, and Manageability on Desktops and Notebooks with Intel® Core™2 Processor with vPro™ Technology and Windows® 7 by Dell, Inc. and Intel®

October 2009 - (Free Research)
Technical decision makers are faced with many challenges in today's economy: help users get more work done faster and with fewer difficulties, protect the network and individual systems from attacks or malicious code, and much more. Find out how the Intel Core 2 processor with vPro technology complements the new Windows 7 operating system. 
(WHITE PAPER) READ ABSTRACT |

Intel® Core™2 Processor with vPro™ Technology and Windows® 7: Better for Business by Intel Technology Provider

October 2009 - (Free Research)
Technical decision makers are faced with many challenges in today's economy: help users get more work done faster and with fewer difficulties, protect the network and individual systems from attacks or malicious code, and much more. Find out how the Intel Core 2 processor with vPro technology complements the new Windows 7 operating system. 
(WHITE PAPER) READ ABSTRACT |

Mobile Application Development Center by Microsoft

April 2013 - (Free Research)
Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android. 
(RESOURCE CENTER) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs by Intel

January 2010 - (Free Research)
The all new Intel® Core™ vPro™ processor family complements the new Windows® 7 operating system by building effective trusted computing and management mechanisms into the hardware. Read this paper to learn more. 
(WHITE PAPER)

Better Active Directory Auditing...Less Overhead, More Power by Netwrix Corporation

July 2010 - (Free Research)
Today’s stringent legislative and industry requirements Windows server auditing simpler, more reliable, and better able to meet their business requirements. organizations – faced with stricter internal security policies as well as– continue to struggle to make. 
(WHITE PAPER) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

The Return on Investment of Open Source Data Integration by Talend

July 2008 - (Free Research)
This white paper explains the different alternatives to open source data integration, and presents the visible and hidden costs of these alternatives, on several types of projects. 
(WHITE PAPER) READ ABSTRACT |

Shavlik Customer Update: What is the Conficker worm, referred to as "Downadup"? by Shavlik Technologies

February 2009 - (Free Research)
This paper describes the risks posed by the Downadup worm and how Shavlik is uniquely suited to help customers respond quickly. Read this brief paper to learn how Shavlik makes it easy for users to do targeted installation of solutions that automate and control patch and configuration management processes while minimizing operational impact. 
(WHITE PAPER) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Symantec Mail Security for SMTP by Symantec Corporation

May 2007 - (Free Research)
Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway. 
(TRIAL SOFTWARE)

Computer Weekly – 11 December 2012: Microsoft puts up prices again by ComputerWeekly.com

December 2012 - (Free Research)
In this week's Computer Weekly, we look at Microsoft's latest price increase for key business software products, and hear from experts on why the decision is flawed. We talk to an organisation that swapped 3,000 BlackBerrys for iPads and iPhones. And we examine the importance of service-level agreements when moving to the cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Buyer’s Guide to Antimalware by Panda Security

October 2009 - (Free Research)
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts