IT Management  >   Systems Design and Development  >   Application Development  >   Software Quality Assurance  >  

Error Handling

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A kernel panic is a computer error from which the operating system (OS) cannot quickly or easily recover. The term applies primarily to Unix-based systems and to Mac OS X. In other systems, the equivalent of a kernel panic is known by slang terms such as blue screen of death, sad Mac or bomb. In Windows 3.x, this sort of malfunction was called a general protection fault.A kernel panic produces a message  … 
Definition continues below.
Error Handling Multimedia (View All Report Types)
126 - 150 of 538 Matches Previous Page  |  Next Page
Consistent, Efficient, Global Data Center Service
sponsored by Emerson
VIDEO: This 4 minute video introduces an international service partner that offers fast, local solutions that can be applied to operations worldwide. Watch now to see how this partner can ensure reliability and maintain business critical continuity.
Posted: 12 Sep 2016 | Premiered: 07 Apr 2015

Emerson

Critical Capabilities for Object Storage
sponsored by IBM
WEBCAST: In this Gartner study, understand how 12 object storage products compare against seven critical capabilities.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Customer Story: Why I Invest in Next-Gen Tech
sponsored by Rubrik
WEBCAST: Matt Day, IT Manager at Langs Building Supplies, discusses his approach to transforming the data center, covers the real world challenges he has faced and shares the lessons he has learned in deploying next-gen technologies.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rubrik

Data Center Thermal Management Services: A Brief Video
sponsored by Emerson
VIDEO: As energy prices continue to soar, data center managers explore each avenue for reducing energy consumption and cutting costs. Tune into this brief video to strategize your data center thermal management and discover if your IT admins should utilize indirect evaporative freecooling and adiabatic freecooling in your mission-critical facility.
Posted: 10 Jun 2016 | Premiered: 29 Jan 2015

Emerson

Deliver Secure Applications to Boost Business Productivity on Mobile Devices
sponsored by Citrix
VIDEO: Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.
Posted: 30 Aug 2016 | Premiered: 16 Aug 2016

Citrix

Code Once: Easy Development for Multiple Mobile Platforms
sponsored by IBM
VIDEO: Watch this brief video to find out how one solution gives teams the ability to code once and implement that code on multiple devices using multiple platforms.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

IBM

CodePro AnalytiX
sponsored by Instantiations
TRIAL SOFTWARE: This IT download offers products which ensure Java code quality, providing powerful software tools for code audit, metrics, automated test case generation, code coverage analysis, dependency analysis and team collaboration.
Posted: 04 Sep 2007 | Premiered: 27 Aug 2007

Instantiations

Compucom and Intel vPro Out of the Box Innovation
sponsored by Intel
VIDEO: Compucom, provider of IT solutions to Fortune 1000 companies, describes how Intel innovation has taken Compucoms business to another level.
Posted: 03 Dec 2009 | Premiered: 14 Sep 2009

Intel

Compuware Vantage Analyzer 3.0
sponsored by Compuware Corporation
TRIAL SOFTWARE: Vantage Analyzer is a Java and .NET performance monitoring and analysis solution that pinpoints the source of performance problems using visibility and detailed transaction analysis without draining production resources.
Posted: 04 Dec 2006 | Premiered: 01 Dec 2006

Compuware Corporation

Consider These Use Cases When Selecting Your MFT Technology
sponsored by IBM
WEBCAST: Gartner shares the key challenges and recommendations in selecting the right MFT solution for your organization.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Consolidate File Transfer Activity
sponsored by IBM
WEBCAST: Learn how IBM Sterling File Gateway provides a file transfer solution that's as powerful as it is easy to use.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Contact Us: SQL Server Offer
sponsored by Microsoft
WEBCAST: Ready to migrate to SQL Server? Discover support services that will help to smoothly and quickly begin your transition.
Posted: 10 May 2016 | Premiered: May 10, 2016

TOPICS:  IT Management
Microsoft

Continuous Testing applications deployed on IBM WebSphere software
sponsored by IBM
WEBCAST: This on-demand webcast reveals how the right test automation and service virtualization strategy can help teams test applications earlier and accelerate software delivery.
Posted: 06 Mar 2014 | Premiered: Dec 31, 2013

IBM

Converged Infrastructure Trend 2- New skill sets
sponsored by Hewlett-Packard Enterprise and Intel ®
VIDEO: This short video discusses emerging trends that are impacting IT pros jobs, and learn about skill sets you need in order to be successful in this new style of IT.
Posted: 29 Jul 2013 | Premiered: 29 Jul 2013

Hewlett-Packard Enterprise and Intel ®

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Craft the Right Strategy for Your Enterprise With HPE Mobility Solutions
sponsored by Hewlett Packard Enterprise
PRODUCT DEMO: HP Enterprise Mobility Services can help you build mobile applications that enable you to convert customer interactions into revenue opportunities. Click on the link below to learn more and one of our mobility experts will be in touch shortly to discuss a face to face demo. To reach out to HP directly, please email us at enterprisesolutions@hp.com
Posted: 21 May 2014 | Premiered: 21 May 2014

Hewlett Packard Enterprise

Credit Union of Colorado Achieves Recoverability and Compliance Through Information Management
sponsored by Commvault
WEBCAST: This webcast to examines the management solution that the Credit Union of Colorado decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

Commvault

Customer Testimonial: Levi's
sponsored by Commvault
VIRTUAL TRADESHOW: Watch this video to learn what Levi Strauss' VP and CTO Bart Hecht thinks about CommVault.
Posted: 30 Dec 2014 | Premiered: Feb 2, 2012

Commvault

Cybercrime: Don't Let End Users Be Your Weakest Link
sponsored by Dimension Data
WEBCAST: Cybercriminals are now attacking end users directly. Learn to use policy and education to keep your company safe.
Posted: 21 Jan 2016 | Premiered: Jan 22, 2016

TOPICS:  IT Management
Dimension Data

Data Loss Prevention: Protecting the Data that Matters
sponsored by Dimension Data
WEBCAST: The integrity of your business relies on data protection. Learn the key steps to keeping your data safe.
Posted: 21 Jan 2016 | Premiered: Jan 22, 2016

TOPICS:  IT Management
Dimension Data

Database Worst Practices: The Top 5 Mistakes Developers Make
sponsored by EnterpriseDB Corporation
WEBCAST: Download this webcast and learn how applications today are growing more and more complex with an increased risk of error and what you can do to prevent this.
Posted: 28 Aug 2009 | Premiered: Aug 28, 2009

EnterpriseDB Corporation

Delivering 3D Graphics from the Cloud
sponsored by NVIDIA/VMware
VIDEO: Many organizations depend on 3D graphics. Find out how highly mobile teams can still get optimized performance remotely.
Posted: 08 Apr 2015 | Premiered: 06 Apr 2015

TOPICS:  IT Management
NVIDIA/VMware

Delivering high performing mobile applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

Delivering Value through Best Practice for Systems Engineering
sponsored by IBM
WEBCAST: View this webcast to learn how to ensure that stakeholder requirements are met effectively and efficiently; how to achieve early verification through systems model execution; how to ensure effective hand-off to design and implementation activities and much more.
Posted: 17 Aug 2010 | Premiered: Feb 25, 2010

IBM
126 - 150 of 538 Matches Previous Page    4 5 6 7 8 9    Next Page
 
ERROR HANDLING DEFINITION (continued): … A kernel panic is a computer error from which the operating system (OS) cannot quickly or easily recover. The term applies primarily to Unix-based systems and to Mac OS X. In other systems, the equivalent of a kernel panic is known by slang terms such as blue screen of death, sad Mac or bomb. In Windows 3.x, this sort of malfunction was called a general protection fault.A kernel panic produces a message or set of messages on the computer display. This information can be useful to technicians in diagnosing and resolving problems but it means little to the inexperienced user. Kernel panic can be triggered by an inappropriate attempt by the operating system to access or write to memory. Sometimes kernel panic can be caused by software bugs or malware. Common hardware causes include failure or improper installation of random-access memory (RAM) chips, hard disk damage or data corruption, a defective microprocessor chip or incompatible device drivers.
Error Handling definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement