Event management software

Results: 326



#Item
61Computing / Service-oriented architecture / Software architecture / Cloud computing / Event-driven SOA / Governance Interoperability Framework / Enterprise application integration / Web services / Information technology management

Q&A Exploring Microservices:14 Questions Answered by Experts 1

Add to Reading List

Source URL: xebialabs.com

Language: English - Date: 2015-04-01 09:02:05
62Computing / Software / Computer security / McAfee VirusScan / Security information and event management / Intel / Network security / LinuxShield / Host Based Security System / McAfee / Antivirus software / System software

PDF Document

Add to Reading List

Source URL: community.mcafee.com

Language: English - Date: 2015-05-11 05:24:08
63Data security / Cyberwarfare / Crime prevention / National security / Security information and event management / Managed security service / Security information management / Computer network security / Security / Computer security

Huntsman Security Enters U.S. Market; Unveils First DefenseGrade Solution to Consolidate Legacy Security Data International IT security software company launching Silicon Valley operations with $10 million in funding San

Add to Reading List

Source URL: www.huntsmansecurity.com

Language: English - Date: 2015-04-16 07:13:12
64Blog software / PHP frameworks / Web application frameworks / Joomla / Mambo / UddeIM / JForce / Software / Content management systems / Cross-platform software

Scaling Applications for Global Communities 2. The Project (about Joomla) Thanks for having me as part of your event. It’s a pleasure and an honor to

Add to Reading List

Source URL: dbhurley.com

Language: English - Date: 2015-02-23 11:06:46
65System software / Security information and event management / Host Based Security System / McAfee / Software / Computing

Course Sheet McAfee Product Education McAfee Security Information & Event Management (SIEM) Administration Course

Add to Reading List

Source URL: www.mcafeeseminar.com.au

Language: English - Date: 2013-10-21 10:30:25
66Information technology management / Data analysis / Machine learning / Wireless networking / Wireless sensor network / Geographic information system / Anomaly detection / Knowledge discovery / Complex event processing / Computing / Data mining / Statistics

Deliverable D4.5: Semantic data streams and stream ontologies software Date:

Add to Reading List

Source URL: www.envision-project.eu

Language: English - Date: 2012-11-15 03:45:26
67Business software / Computer-aided design / Product information management / Product data management / Fashion design / Digital prototyping / Siemens PLM Software / Information technology management / Product lifecycle management / Product management

Fashion Event of the Century? February 14th, 2011 Already touted as the “most stylish event of the century” by the Telegraph UK, the upcoming wedding of Prince William and Kate Middleton promises to inundate the worl

Add to Reading List

Source URL: www.bmsystems.com

Language: English - Date: 2011-12-21 15:12:41
68Environmental economics / Social responsibility / Social philosophy / Corporate social responsibility / ISO 14000 / Sustainable Development Strategy in Canada / Sustainable event management / Ethics / Applied ethics / Business ethics

Corporate Social Responsibility Policy Putting responsibility and consideration at the centre of our business Parrimark Technology has specialised in the development of software for venues and events for over 10 years. O

Add to Reading List

Source URL: www.priava.com

Language: English - Date: 2015-03-18 09:50:12
69Computer security / Deep packet capture / FireEye /  Inc. / Packet capture / Netflow / Network forensics / Pcap / Security information and event management / Computing / Software / Computer network security

CUSTOMER STORY Government Agency Reconstructs Attack LifeCycle Using the FireEye Network Forensics Platform

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-05-01 03:38:45
70Antivirus software / Computing / Hacking / Data security / Security information and event management / Vulnerability / Threat / Host Based Security System / McAfee / Computer security / Cyberwarfare

Technology Blueprint APPLY SITUATIONAL AWARENESS

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 03:13:41
UPDATE