In-network management

Results: 4346



#Item
801Packet capture / Database / Troubleshooting / Business transaction management / Information technology management / Computing / Computer network security / Management / Deep packet capture

CUSTOMER CASE STUDY: MIDDLESEX HOSPITAL Top Hospital Cuts MTTR by 90% with Insight from Real-Time Wire Data “In healthcare, a lot of vendors over-promise and under-deliver. But ExtraHop works as advertised, right out

Add to Reading List

Source URL: www.extrahop.com

Language: English - Date: 2015-04-08 20:00:49
802Storage area network / Telecommunications engineering / Information technology management / Information / Data / Infrastructure optimization / Computer storage / Computing / Data management

For Immediate Release Edge Solutions Media Technologies Partners with SwiftStack to Deliver Massively Scalable Object Storage for the Media and Entertainment Industry Partners Unite in Bringing Resilient and Agile Softwa

Add to Reading List

Source URL: swiftstack.com

Language: English - Date: 2015-02-25 01:43:29
803Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-04-30 15:05:36
804Technology / Identity management / IBM / Enterprise software / Oracle Corporation / UML Partners / Computing / Business

NEWS RELEASE BIO-key® Expands Partner Sales Network Five additional resellers join emerging group Wall, NJ, April 10, 2014 – BIO-key International, Inc. (OTCBB: BKYI), a leader in fingerprint biometric identification

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-04-10 08:43:47
805Coral reefs / Fisheries / Marine ecoregions / Ecosystems / Fisheries management / Sustainable fishery / Tubbataha Reef / Illegal /  unreported and unregulated fishing / Wild fisheries / Environment / Fishing / Earth

Future Policy Award 2012 Factsheet of Winning Policies Palau’s Protected Areas Network Act, initiated in 2003 Palau’s Protected Areas Network Act establishes the framework for a network of marine and terrestrial prot

Add to Reading List

Source URL: www.worldfuturecouncil.org

Language: English - Date: 2012-09-24 10:46:16
806Computer network security / Crime prevention / National security / Electronic commerce / Pretty Good Privacy / Computer emergency response team / Internet security / Vulnerability / Incident management / Computer security / Security / Cyberwarfare

Incident Reporting Criteria and Rationale I. What type of activity should I report? What type of activity you should report, and the level of detail included in your report, depends on to whom you are reporting. Your loc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
807Earth / European Union / Environmental social science / Environmentalism / Conservation / Interreg / Emergency management / Green infrastructure / Infrastructure / Environment / Sustainable transport / Transport

PRIORITY AXIS 1: A well connected region Corresponds to Thematic objective 7- promoting sustainable transport and removing bottlenecks in key network infrastructures All data presented is published for information purpo

Add to Reading List

Source URL: cbcromaniabulgaria.eu

Language: English - Date: 2015-01-27 07:26:17
808Computer security / Software / OAuth / Identity management / Identity management systems / OpenID / Play Framework / Distributed social network / Computing / Cloud standards / Federated identity

Book Reviews most important question when studying STAs in virtual environments is whether a particular player is capable of transitioning from a virtual space to the real world. Although some of the essays in Vice

Add to Reading List

Source URL: www.journalofplay.org

Language: English - Date: 2014-06-25 10:30:26
809Internet privacy / Federal Trade Commission / Identity management / Personally identifiable information / In re Gateway Learning Corp. / Network Advertising Initiative / Ethics / Privacy / Computing

Jeunesse Global Privacy Policy Any communication or material you provide to us, whether received online, electronically, otherwise collected by or submitted to us, including any data, questions, comments, suggestions or

Add to Reading List

Source URL: www.karenmcconnell.jeunesseglobal.com

Language: English - Date: 2015-02-12 14:26:37
810Therm / Consumer Electronics Show

10 Reasons to Exhibit at SEMI-THERM https://www.regonline.com/st30 1) Network with key technical players in the thermal management field SEMI-THERM attendees represent more than 120 industrial and academic organizations

Add to Reading List

Source URL: www.semi-therm.org

Language: English - Date: 2014-03-25 23:00:14
UPDATE