IT Management  >   Systems Design and Development  >   Application Development  >   Software Quality Assurance  >  

Error Handling

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A kernel panic is a computer error from which the operating system (OS) cannot quickly or easily recover. The term applies primarily to Unix-based systems and to Mac OS X. In other systems, the equivalent of a kernel panic is known by slang terms such as blue screen of death, sad Mac or bomb. In Windows 3.x, this sort of malfunction was called a general protection fault.A kernel panic produces a message  … 
Definition continues below.
Error Handling Multimedia (View All Report Types)
101 - 125 of 483 Matches Previous Page  |  Next Page
Classroom 3: Software Project Management
sponsored by SearchSoftwareQuality.com
VIRTUAL ENVIRONMENT: You really can't have project management in a distributed team without virtual collaboration. Get a better understanding of virtual collaboration tools and how they enhance project management processes.
Posted: 09 Nov 2015 | Premiered: 21 Oct 2015

SearchSoftwareQuality.com

Creating a Ready-for-Digital infrastructure with Axway API Gateway
sponsored by Axway
WEBCAST: Discover how Scania found a simple, secure way to move applications between zones. Explore the capabilities of the API gateway they adopted and how it streamlined their day-to-day operations.
Posted: 09 Jun 2016 | Premiered: Feb 11, 2016

Axway

CentraStage Endpoint Management
sponsored by CentraStage
WEBCAST: This brief video explores one company's solution to endpoint management and how it can help managed service providers offer round-the-clock visibility of their endpoints
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Centrica Redefines Customer Relationship with HP Converged Cloud
sponsored by Hewlett-Packard Enterprise
VIDEO: This video case study covers a cloud-based solution that one organization used in order to eliminate data center downtime and applications that don't work.
Posted: 24 Feb 2014 | Premiered: 24 Feb 2014

Hewlett-Packard Enterprise

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Chalk Talk Video: How Zero Branch IT Keeps Your Safe
sponsored by Riverbed Technology, Inc.
VIDEO: Branch locations hold 50% of all valuable data. Learn to protect them without on-premises servers, storage or backup.
Posted: 02 Dec 2015 | Premiered: 02 Dec 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

Change the Way IT Delivers Value to the Business
sponsored by CA Technologies.
WEBCAST: In this comprehensive webcast, learn how you can measure, manage, and consistently deliver reliable services to your customers. Hear from a panel of six IT experts as they discuss how the increased focus on improving customer experience is impacting IT, as well as best practices and challenges to overcome in the transformation.
Posted: 14 Jan 2014 | Premiered: Jan 14, 2014

CA Technologies.

Changing the Perception of IT – What Your Customers Won't Tell You
sponsored by ServiceNow
WEBCAST: This webcast covers the negative perception of IT and how you can shake that image.
Posted: 28 Oct 2013 | Premiered: Oct 24, 2013

ServiceNow

Chas Dye the Database Guy on Performance
sponsored by Pure Storage
VIDEO: Free yourself from the shackles of physical I/O. Find out how flash enables better performance and simple management.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

Chas Dye the Database Guy on Resiliency
sponsored by Pure Storage
VIDEO: Databases on traditional SAN often face performance degradation and outages. Learn how new databases enable 100% uptime.
Posted: 24 Mar 2016 | Premiered: 24 Mar 2016

TOPICS:  IT Management
Pure Storage

Cisco Connected World Technology Report
sponsored by Cisco Systems, Inc.
VIDEOCAST: Access this videocast for a panel discussion investigating the findings of the 2011 Cisco Connected World Technology Report, which provides insight into the mindset, expectations, and behavior of the world’s next generation of workers.
Posted: 07 Feb 2012 | Premiered: Feb 6, 2012

Cisco Systems, Inc.

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast
sponsored by Nuance
PODCAST: Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation.
Posted: 28 Jan 2014 | Premiered: Jan 24, 2014

Nuance

Cloud Infrastructure for The Real World
sponsored by Red Hat
VIDEO: This video details the changed cloud computing is causing in IT management and service delivery and offers a solution to help your organization keep up.
Posted: 16 Dec 2013 | Premiered: 27 Sep 2013

Red Hat

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

CloudTest Lite
sponsored by SOASTA, Inc
SOFTWARE DOWNLOAD: CloudTest Lite provides rapid test creation and real-time analytics for frequent, lower-scale performance testing for Web and mobile applications. Download CloudTest Lite Beta Version today to start experiencing these benefits in your own organization.
Posted: 22 Jul 2011 | Premiered: 21 Jul 2011

SOASTA, Inc

Code Once: Easy Development for Multiple Mobile Platforms
sponsored by IBM
VIDEO: Watch this brief video to find out how one solution gives teams the ability to code once and implement that code on multiple devices using multiple platforms.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

IBM

CodePro AnalytiX
sponsored by Instantiations
TRIAL SOFTWARE: This IT download offers products which ensure Java code quality, providing powerful software tools for code audit, metrics, automated test case generation, code coverage analysis, dependency analysis and team collaboration.
Posted: 04 Sep 2007 | Premiered: 27 Aug 2007

Instantiations

Compucom and Intel vPro Out of the Box Innovation
sponsored by Intel
VIDEO: Compucom, provider of IT solutions to Fortune 1000 companies, describes how Intel innovation has taken Compucoms business to another level.
Posted: 03 Dec 2009 | Premiered: 14 Sep 2009

Intel

Compuware Vantage Analyzer 3.0
sponsored by Compuware Corporation
TRIAL SOFTWARE: Vantage Analyzer is a Java and .NET performance monitoring and analysis solution that pinpoints the source of performance problems using visibility and detailed transaction analysis without draining production resources.
Posted: 04 Dec 2006 | Premiered: 01 Dec 2006

Compuware Corporation

Contact Us: SQL Server Offer
sponsored by Microsoft
WEBCAST: Ready to migrate to SQL Server? Discover support services that will help to smoothly and quickly begin your transition.
Posted: 10 May 2016 | Premiered: May 10, 2016

TOPICS:  IT Management
Microsoft

Continuous Testing applications deployed on IBM WebSphere software
sponsored by IBM
WEBCAST: This on-demand webcast reveals how the right test automation and service virtualization strategy can help teams test applications earlier and accelerate software delivery.
Posted: 06 Mar 2014 | Premiered: Dec 31, 2013

IBM

Converged Infrastructure Trend 2- New skill sets
sponsored by Hewlett-Packard Enterprise and Intel ®
VIDEO: This short video discusses emerging trends that are impacting IT pros jobs, and learn about skill sets you need in order to be successful in this new style of IT.
Posted: 29 Jul 2013 | Premiered: 29 Jul 2013

Hewlett-Packard Enterprise and Intel ®

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Craft the Right Strategy for Your Enterprise With HPE Mobility Solutions
sponsored by Hewlett Packard Enterprise
PRODUCT DEMO: HP Enterprise Mobility Services can help you build mobile applications that enable you to convert customer interactions into revenue opportunities. Click on the link below to learn more and one of our mobility experts will be in touch shortly to discuss a face to face demo. To reach out to HP directly, please email us at enterprisesolutions@hp.com
Posted: 21 May 2014 | Premiered: 21 May 2014

Hewlett Packard Enterprise
101 - 125 of 483 Matches Previous Page    3 4 5 6 7 8    Next Page
 
ERROR HANDLING DEFINITION (continued): … A kernel panic is a computer error from which the operating system (OS) cannot quickly or easily recover. The term applies primarily to Unix-based systems and to Mac OS X. In other systems, the equivalent of a kernel panic is known by slang terms such as blue screen of death, sad Mac or bomb. In Windows 3.x, this sort of malfunction was called a general protection fault.A kernel panic produces a message or set of messages on the computer display. This information can be useful to technicians in diagnosing and resolving problems but it means little to the inexperienced user. Kernel panic can be triggered by an inappropriate attempt by the operating system to access or write to memory. Sometimes kernel panic can be caused by software bugs or malware. Common hardware causes include failure or improper installation of random-access memory (RAM) chips, hard disk damage or data corruption, a defective microprocessor chip or incompatible device drivers.
Error Handling definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement