Software  >   Applications Software  >   Enterprise Applications Software  >   Manufacturing Software  >   Process Control Software  >  

Supervisory Control and Data Acquisition Systems

RSS Feed    Add to Google    Add to My Yahoo!
Supervisory Control and Data Acquisition Systems Reports
 
Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

IBM Service Management for the Intelligent Utility Network
sponsored by IBM
WHITE PAPER: The current utilities environment requires companies to decrease costs while increasing the ability to control utility assets. One key challenge is how to take advantage of new technologies to better manage the delivery of service to customers today and into the future. IBM Service Management for the IUN provides a blueprint for getting started.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

IBM

Exploring Multi-Cloud Deployment Model Adoption and IoT Migration
sponsored by Intel
EGUIDE: In this two-part expert e-guide, learn from various IT leaders about the recent rise in multi-cloud deployment acceptance—and why this makes sense given the ways organizations are leveraging cloud resources today. In part two, uncover 10 factors to consider when migrating forward from "old-school" SCADA systems to SCADA plus IoT deployments.
Posted: 10 Jun 2016 | Published: 02 Jun 2016

Intel

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by GlobalScape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Information Security Ezine- Europe
sponsored by SearchSecurity.co.UK
EZINE: This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.
Posted: 02 Jun 2011 | Published: 02 Jun 2011

SearchSecurity.co.UK

Stuxnet Under the Microscope
sponsored by ESET
WHITE PAPER: This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet.
Posted: 04 Oct 2010 | Published: 04 Oct 2010

ESET

First Transit Transforms the Backbone of Their Fleet with SCM
sponsored by Infor
VIDEO: Tune into this video to discover how to optimize resource and labor utilization, improve inventory and shipping accuracy, respond faster to changing market conditions with an open architecture SCM platform. Learn how to gain the visibility you need to deliver the perfect order every time.
Posted: 20 Jul 2016 | Premiered: 20 Jul 2016

Infor

Which SAP HANA Cloud Migration Strategy is Right for You?
sponsored by SAP
EGUIDE: Many CIOs are considering migrating some or all of their business applications to cloud platforms powered by SAP HANA. Discover expert tips on how to thoughtfully move business applications to cloud platforms such as SAP public cloud, SAP private cloud, and more.
Posted: 11 Jul 2016 | Published: 04 Jul 2016

SAP

Oracle Audit Defense Management
sponsored by Miro Consulting, Inc.
WHITE PAPER: No one likes audits, but considering that 75% of software vendors believe that their customers don't manage their software license effectively, they're bound to happen. This white paper answers your questions about Oracle software audits, and provides 7 steps to successfully navigating through Oracle audit defense management.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Miro Consulting, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement