code

Results 251 - 275 of 496Sort Results By: Published Date | Title | Company Name

For Safety’s Sake: the NEC 2020 code review

Published By: Eaton     Published Date: Jul 12, 2019
Every three years, members of the National Fire Protection Association (NFPA) meet to review, modify and add new National Electrical Code (NEC), or NFPA 70, requirements to enhance electrical safety in the workplace and the home. This year’s code review is well underway: the second draft of NEC 2020 is complete and the annual NFPA Conference and Expo is scheduled for late June. What follows is a preview of what are, in my opinion, the most significant code changes on track to pass. In this blog, I’ll explore the reasoning for each change and the future steps the NEC may take beyond 2020 regarding: Ground fault circuit interrupter (GFCI) protection Service entrance equipment Reconditioned equipment Performance testing Load calculations Available fault current and temporary power This is a high-level overview. In the coming months, my Eaton colleagues and I will dig deeper into each topic as part of a continuing series on the 2020 code review cycle.
Tags : 
    
Eaton

Where is Your Risk?

Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
    
Trillium Software

Five Reasons Why You Need Endpoint Backup

Published By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42

Why EFSS Does Not Equal Endpoint Backup

Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn more about how EFSS creates these security issues when used as a backup solution.
Tags : 
    
Code42

Debunking the Myth of Policy Dependent Backup

Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn how automatic endpoint backup eliminates the issues created by antiquated network drive backup.
Tags : 
    
Code42

Get Your Data Back Faster Why Enterprises Should Choose Local Deduplication for Endpoint Data Backup

Published By: Code42     Published Date: Apr 04, 2017
Download the white paper today to learn why local dedupe is the superior choice to global dedupe.
Tags : 
    
Code42

Securing and Enabling the Mac-Empowered Enterprise

Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42

Transform IT with Codeless Configuration: ITSM Codeless Technology Survival Guide

Published By: Cherwell Software     Published Date: Sep 14, 2016
This whitepaper will consider how “codeless” software solutions are favorable to those that require customization with a focus on future-proofing, reduced administration overhead and increased flexibility.
Tags : 
    
Cherwell Software

Mission Critical SOA

Published By: IBM     Published Date: Mar 28, 2008
In the beginning, an SOA-based approach was used for projects in individual departments, usually for those with high returns, short-term rewards, and relatively low risk, with typically a high degree of new development. But as the value of the SOA concept has become more apparent and its tools have grown in both scope and robustness, organizations are applying them more broadly, to organizational-size problems and mission critical issues, leveraging more and more existing code and production systems.
Tags : 
service oriented architecture
    
IBM

WebSphere Application Server Express - complimentary trial

Published By: IBM     Published Date: Jun 15, 2009
Enjoy this complimentary trial version of WebSphere Application Server Express V7. You'll see how it can provide single-step installation and configuration, wizards and default configurations, and easy to navigate documentation that includes extensive use of sample code to ensure fast and smooth start-up.
Tags : 
websphere, ibm, application server express v7, sign-step, trial, was, sample code, soa
    
IBM

The benefits of IBM. The savings of open source.

Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss
    
IBM

Best Practices for Authenticating Mobile Workers and Securing Data Access

Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing

7 Key Criteria for Choosing a Managed File Transfer Solution

Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt

Beyond Email Attachments and FTP: A New Approach to Secure, Cost-Effective File Delivery

Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt

7 Key Criteria for Choosing a Managed File Transfer Solution

Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
    
YouSendIt, Inc.

Beyond Email Attachments and FTP: A New Approach to Secure, Cost-Effective File Delivery

Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment
    
YouSendIt, Inc.

The Path To Secure Applications

Published By: IBM Software     Published Date: Aug 04, 2010
The path to creating a secure application begins by rigorously testing source code for all vulnerabilities and ensuring that use of the application does not compromise or allow others to compromise data privacy and integrity.
Tags : 
ibm ouncelab, secure application, testing source code, data privacy, security, application configuration, encoding error, encryption
    
IBM Software

Trust But Verify: Managing Risk In Outsourced Applications

Published By: IBM Software     Published Date: Aug 04, 2010
How to manage risk in outsourced applications.
Tags : 
ibm ouncelab, risk, outsourced application, outsourcing application development, security, source code, software risk analysis, audit
    
IBM Software

Security Software At The Source is Good for Quality

Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing, security management, business process automation, product lifecycle management, software testing
    
IBM Software

Podcast: Removing insecurity from outsourced development

Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.
Tags : 
ibm ouncelab, network security, security management, security standards, service-oriented architecture, windows xp, business operations, security
    
IBM Software

Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All

Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks, access control, anti spam, anti spyware, anti virus, application security
    
Lumension

Barcode Labeling in the Lab—Closing the Loop of Patient Safety

Published By: Zebra     Published Date: Jul 10, 2014
Detecting and preventing errors that threaten patient safety is a closed-loop process that begins at the point of care, extends to independent laboratories, and then back to the caregiver. Download to learn more!
Tags : 
zebra, patient safety, closed loop process, malpractice, misdiagnosis, error costs, financial implications, caregiver
    
Zebra

Wristband Formatting Best Practices: Key Considerations for Improving Patient Care

Published By: Zebra     Published Date: Jul 10, 2014
Maximizing patient safety and improving the quality of care is the ultimate goal for healthcare providers. Doing so requires staying within regulatory compliance, while also advancing staff retention and meeting fiscal constraints. Barcode technologies provide a “virtual voice” to patients, applications and workflows. Barcoding accomplishes this by laying a solid foundation for enhancing patient identification, providing visibility into medical practices, and driving efficiencies throughout healthcare applications, and is an integral part of electronic medical record (EMR) adoption. Download to learn more!
Tags : 
zebra, patient safety, closed loop process, malpractice, misdiagnosis, error costs, financial implications, caregiver
    
Zebra

Learn How to Create Value through Location Based Intelligence

Published By: SAP     Published Date: May 11, 2012
The objective of this paper is to provide an introduction to "location-based intelligence" as it relates to the common view of an "address," as well as provide an overview of geocoding and geographic data services.
Tags : 
location-based intelligence, geocode, geographic data services, reverse geocoding, address cleansing, enterprise applications, business technology
    
SAP

The Definitive Guide to Policy Management

Published By: NAVEX Global     Published Date: Mar 04, 2014
If you are looking for a deeper understanding of how to effectively and efficiently manage your organization’s employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your all-inclusive resource.
Tags : 
navex global, ethics and compliance, code of conduct, policy management, perspectives, assessment tools, best-practice, automation
    
NAVEX Global
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.