Computer industry

Results: 4151



#Item
681Graphic design / Desktop publishing software / Adobe Systems / Adobe Creative Suite / K4 / Workflow / Electronic publishing / Tablet computer / Desktop publishing / Computing / Software / Application software

Press Release vjoonity 2013: Focus on Optimizing Processes and DAM Capabilities Are Your Processes Lean Enough? This slogan will set the agenda when decision-makers and users in the international publishing industry con

Add to Reading List

Source URL: www.vjoon.com

Language: English - Date: 2013-11-26 08:37:42
682Computer law / Electronic commerce / Money / Payment Card Industry Data Security Standard / Economics / Business / Payment card industry / PA-DSS / Keystroke dynamics / Payment systems / Credit cards / Data privacy

E N C R Y P T E D PAY M E N T S P2P Encrypted Payment Terminals Integrated with the Keystroke Payment Module The Keystroke Payment Module (KeyPay) provides fast, reliable and secure handling of senstive payment card dat

Add to Reading List

Source URL: www.keystrokepos.com

Language: English - Date: 2015-03-20 14:50:10
683Storage area network / Telecommunications engineering / Information technology management / Information / Data / Infrastructure optimization / Computer storage / Computing / Data management

For Immediate Release Edge Solutions Media Technologies Partners with SwiftStack to Deliver Massively Scalable Object Storage for the Media and Entertainment Industry Partners Unite in Bringing Resilient and Agile Softwa

Add to Reading List

Source URL: swiftstack.com

Language: English - Date: 2015-02-25 01:43:29
684Public safety / Credit cards / Payment systems / National security / Payment Card Industry Data Security Standard / Information security / Security awareness / Security guard / Payment card industry / Computer security / Security / Data privacy

Security Awareness Education Educate your staff on the latest security issues to ensure the proper handling of sensitive data and fulfill compliance requirements with Trustwave Security Awareness Education. For organizat

Add to Reading List

Source URL: ssl.trustwave.com

Language: English - Date: 2015-04-15 16:57:54
685Network Address Translation / Cryptographic protocols / Network protocols / Internet protocols / Computer network security / STUN / Interactive Connectivity Establishment / Traversal Using Relays around NAT / Real-time Transport Protocol / Computing / Network architecture / OSI protocols

WSQI™ Certification Become a WebRTC School Qualified Integrator (WSQI™) supported by the Telecommunications Industry Association (TIA) Exam Objectives The WebRTC School Qualified Integrator (WSQI™) is designed to t

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2015-03-14 20:08:25
686Computer crimes / Business / Emerging technologies / Cyberwarfare / SCADA / Telemetry / FireEye /  Inc. / Smart grid / Phishing / Cybercrime / Electric power transmission systems / Technology

Threat Landscape: Utilities Industry Learn more at the Utilities Security webpage. Cyber Spies Make a Power Play The markets for renewable energy and smart grid technologies are expected to top $2 trillion in the next de

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 22:16:40
687Cloud infrastructure / Web services / EMC Corporation / Computer storage / Data synchronization / Replication / Amazon Web Services / VMware / Hardware virtualization / Cloud computing / Computing / Centralized computing

Zerto Virtual Replication for Amazon Web Services 1.0 Enterprise Class Replication from VMware vSphere and Microsoft Hyper-V to Amazon Web Services Zerto Virtual Replication is the industry’s first enterprise class dis

Add to Reading List

Source URL: pages.zerto.com

Language: English - Date: 2015-04-26 03:30:53
688Computer crimes / Business / Emerging technologies / Cyberwarfare / SCADA / Telemetry / FireEye /  Inc. / Smart grid / Phishing / Cybercrime / Electric power transmission systems / Technology

Threat Landscape: Utilities Industry Learn more at the Utilities Security webpage. Cyber Spies Make a Power Play The markets for renewable energy and smart grid technologies are expected to top $2 trillion in the next de

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 17:59:57
689Linux / Open-source software / Sudan / Open Sound System / OSS Watch / Software / Computing / Cross-platform software

Open Source Software Impact and Support for IT Industry in Sudan Mustafa Babiker Hamad Computer Science Department, Faculty of Mathematical Sciences, University of Khartoum Abstract The use of open source software (OSS)

Add to Reading List

Source URL: www.nctr.sd

Language: English - Date: 2014-01-07 11:59:41
690Business software / Ethics / Regulatory compliance / Payment Card Industry Data Security Standard / Gramm–Leach–Bliley Act / Corporate governance / U.S. Securities and Exchange Commission / Telecommunications data retention / Email archiving / Business / Computer law / Law

Financial Services Policies Overview The Sentrion Financial Services Policies Application provides a very broad and complete set of policies that can be fine-tuned to meet regulatory compliance, corporate governance and

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:00
UPDATE