Software  >   Systems Software  >   Utility Software  >  

Installation Programs

RSS Feed   
Installation Programs Reports
 
Sharepoint E-zine Vol.3: Using SharePoint's InfoPath feature to generate forms
sponsored by SearchWinIT
EZINE: This guide explains planning global enterprise SharePoint deployments, creating custom global search scopes in SharePoint and top tips for harnessing Microsoft SharePoint governance.
Posted: 24 Oct 2008 | Published: 23 Oct 2008

SearchWinIT

Multiple Job Scheduling Environments
sponsored by RevSoft
WHITE PAPER: Most companies have separate Environments for their Enterprise Resource Planning. In this paper learn how Rev Scheduler comes shipped with multiple Environments so even at initial installation you have a multiple Environment Scheduler in place.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Demo - Installing Hyper-V Server on Dell PowerEdge R805
sponsored by Dell EMC and Microsoft
SOFTWARE DEMO: This video shows the installation of Hyper-V Server on a Dell PowerEdge R805 server through a Dell Remote Access Card (DRAC) using the Virtual CD-ROM and remote console features to facilitate installation remotely.
Posted: 11 Dec 2008 | Premiered: 11 Dec 2008

Dell EMC and Microsoft

Computer Weekly – 21 May 2019: Managing software updates in Windows 10
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.
Posted: 19 May 2019 | Published: 21 May 2019

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

Computer Weekly – 18 August 2020: How Covid-19 elevated the datacentre
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how datacentres and their workers became part of our critical national infrastructure due to the pandemic. Firms considering upgrading to SAP S/4 Hana face hefty bills – we look at how to keep costs down. And we analyse the increasing rate of applications being migrated to the cloud. Read the issue now.
Posted: 17 Aug 2020 | Published: 18 Aug 2020

ComputerWeekly.com

Your guide to avoiding the software licensing traps for the unwary
sponsored by ComputerWeekly.com
EGUIDE: Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
Posted: 17 Aug 2017 | Published: 17 Aug 2017

ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 17 Jun 2019 | Published: 18 Jun 2019

ComputerWeekly.com

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Secure DevOps Brings Better, Faster, Safer Software
sponsored by SearchSecurity.com
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences