Enterprise architecture

Results: 5153



#Item
21Software / Computing / Computer architecture / Control engineering / Industrial automation / SCADA / Telemetry / Server / Client / Windows Server / BlackBerry Enterprise Server

Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures Service and tool developed and operated by : Software Checker

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-01-24 19:29:24
22Computing / Computer hardware / SDRAM / Supercomputers / Computer buses / Computer architecture / DDR4 SDRAM / PCI Express / InfiniBand / Cache hierarchy / DIMM / LIO

Oracle’s Sonoma Processor: Advanced Low-cost SPARC Processor for Enterprise Workloads HotChips 27 – Aug 24, 2015 Basant Vinaik

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:24
23Computing / Java enterprise platform / Java platform / Java specification requests / Software architecture / Computing platforms / Java Platform /  Enterprise Edition / Enterprise JavaBeans / Java Community Process / GlassFish / WildFly / Java servlet

WeldFinal - CDI Reference Implementation CDI: Contexts and Dependency Injection for the Java EE platform by Gavin King, Pete Muir, Jozef Hartinger, Martin Kouba, Dan Allen, and David Allen

Add to Reading List

Source URL: docs.jboss.org

Language: English - Date: 2016-07-01 02:52:55
24Economy / Budgets / Environment / Environmental policy in the United States / United States Environmental Protection Agency / Performance-based budgeting / Operational planning / Enterprise Architecture Assessment Framework

INSTRUCTIONS FOR PREPARING 5–YEAR STRATEGIC PLANS FOR THE FISCAL YEARS 2018 – 2022 LEGISLATIVE BUDGET OFFICE May 2016

Add to Reading List

Source URL: www.lbo.ms.gov

Language: English - Date: 2016-06-01 16:53:17
25Videotelephony / Computing / Network architecture / Cisco Systems / VoIP phone / Session Initiation Protocol / Voice over IP / Virtual private network / Network address translation / Voicemail / Skinny Call Control Protocol / Comparison of VoIP software

Data Sheet Cisco SPA525G2 5-Line IP Phone Cisco Small Business 5-Line Business IP Phone with Enhanced Connectivity and Media for a New Level of User Experience

Add to Reading List

Source URL: enterprise.vonage.com

Language: English - Date: 2015-11-20 10:42:11
26Software / Computing / Cloud infrastructure / Free software / Docker / Microservices / DevOps / Go / Cloud computing / StackEngine / WaveMaker

Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)

Add to Reading List

Source URL: www.docker.com

Language: English - Date: 2016-08-12 08:07:09
27

Tools to Help Enterprise, Gov and Startups Expose Core Business Strengths API Serverless Architecture Market Scan

Add to Reading List

Source URL: au.apidays.io

- Date: 2016-03-07 20:33:39
    28Computing / Technology / Data transmission / Telecommunications / Wide area networks / Emerging technologies / Network architecture / Electronics / SD-WAN / Cisco Systems / AudioCodes / Talari Networks

    20/22 SEPTEMBERNOVOTEL PARIS ROISSY CDG/FR ANCE Simplifying Enterprise WAN. SD-WANs are a top of mind topic for many IT organizations since they offer a way to gain agility, reduce the complexity and change the

    Add to Reading List

    Source URL: www.giievent.jp

    Language: English - Date: 2016-06-10 02:46:21
    29Software / Computer architecture / System software / SUSE Linux / Red Hat software / Remote administration software / Linux distributions / Spacewalk / SUSE / Satellite / CentOS / Red Hat Enterprise Linux

    Managing RH / CentOS with SUSE Manager ® Don Vosburg

    Add to Reading List

    Source URL: www.suse.com

    Language: English - Date: 2016-07-27 11:31:24
    30Security / Prevention / Safety / Actuarial science / Computer network security / Computer security / Enterprise architecture / Department of Defense Architecture Framework / UPDM / Risk management / Threat / Vulnerability

    Blade Risk Manager Automated Risk Assessment The cyber threats facing cyber systems demands a solution capable of understanding their enormity and complexity, visualizing attack options, assessing vulnerabilities and fac

    Add to Reading List

    Source URL: www.kdmanalytics.com

    Language: English - Date: 2015-03-10 10:01:35
    UPDATE