Critical Software

Results: 1293



#Item
171In a world that faces security challenges every day, protecting people, property, and possessions is critical. TEC combines the quality and reliability of our products to create a powerful security solution that gives yo

In a world that faces security challenges every day, protecting people, property, and possessions is critical. TEC combines the quality and reliability of our products to create a powerful security solution that gives yo

Add to Reading List

Source URL: www.tec.com

Language: English - Date: 2013-06-25 15:26:37
172SOLUTIONS IN ACTION  Controlpoint Fortifies Department Of Defense SharePoint Collaboration Strategy EFFICIENT AND COST EFFECTIVE MANAGEMENT, ADMINISTRATION AND AUDITING OF DOD’S COMPLEX AND MISSION-CRITICAL COLLABORATI

SOLUTIONS IN ACTION Controlpoint Fortifies Department Of Defense SharePoint Collaboration Strategy EFFICIENT AND COST EFFECTIVE MANAGEMENT, ADMINISTRATION AND AUDITING OF DOD’S COMPLEX AND MISSION-CRITICAL COLLABORATI

Add to Reading List

Source URL: www.metalogix.com

Language: English - Date: 2015-01-22 17:50:31
173Field trials A critical element in “test once, use anywhere” certification for mobile devices A white paper from the Global Certification Forum www.globalcertificationforum.org

Field trials A critical element in “test once, use anywhere” certification for mobile devices A white paper from the Global Certification Forum www.globalcertificationforum.org

Add to Reading List

Source URL: www.globalcertificationforum.org

Language: English - Date: 2013-02-20 11:57:59
174WIND RIVER PLATFORM FOR INFOTAINMENT  In-vehicle infotainment (IVI) systems have taken center stage for differentiating in-vehicle experiences. Consumers expect intelligent connected cars that link critical telematics fu

WIND RIVER PLATFORM FOR INFOTAINMENT In-vehicle infotainment (IVI) systems have taken center stage for differentiating in-vehicle experiences. Consumers expect intelligent connected cars that link critical telematics fu

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:10
175For Immediate Release  Utility Granted U.S. Patent 8,781,475 for Automatic Cellular Communications Connectivity Methodology  ATLANTA, GA – July 28, 2014 – Utility Associates, Inc., the industry leader in Critical

For Immediate Release Utility Granted U.S. Patent 8,781,475 for Automatic Cellular Communications Connectivity Methodology ATLANTA, GA – July 28, 2014 – Utility Associates, Inc., the industry leader in Critical

Add to Reading List

Source URL: www.utility.com

Language: English - Date: 2015-05-20 16:08:44
176Atlassian Managed Services (AMS) from Adaptavist:  Your business-critical Atlassian platform If your organisation relies on Atlassian tools like JIRA, Confluence, Bamboo and Stash – or a combination of them – for pro

Atlassian Managed Services (AMS) from Adaptavist: Your business-critical Atlassian platform If your organisation relies on Atlassian tools like JIRA, Confluence, Bamboo and Stash – or a combination of them – for pro

Add to Reading List

Source URL: www.adaptavist.com

Language: English - Date: 2014-06-25 03:50:39
177The Center for Experiential Learning Faculty Center for Ignatian Pedagogy

The Center for Experiential Learning Faculty Center for Ignatian Pedagogy

Add to Reading List

Source URL: ncepr.org

Language: English - Date: 2015-03-11 14:05:27
178CyberForce™  CyberForce™ is a state-of-the-art data analytics software and service that detects the most critical cybervulnerabilities in real or near real time for timely risk mitigation so a cyberdisaster can be pr

CyberForce™ CyberForce™ is a state-of-the-art data analytics software and service that detects the most critical cybervulnerabilities in real or near real time for timely risk mitigation so a cyberdisaster can be pr

Add to Reading List

Source URL: www.fisglobal.com

Language: English - Date: 2015-05-18 11:05:17
179Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
180Eligible Hospital and Critical Access Hospital (CAH) Attestation Worksheet for Stage 2 of the Medicare Electronic Health Record (EHR) Incentive Program

Eligible Hospital and Critical Access Hospital (CAH) Attestation Worksheet for Stage 2 of the Medicare Electronic Health Record (EHR) Incentive Program

Add to Reading List

Source URL: hie.cdph.ca.gov

Language: English - Date: 2015-02-02 17:39:13