abs

Results 351 - 375 of 484Sort Results By: Published Date | Title | Company Name
Published By: Stratasys     Published Date: May 31, 2016
This white paper reports on why ASA (acrylonitrile styrene acrylate) is an excellent multi-purpose material for 3D printing and when to use another thermoplastic.
Tags : 
stratasys, 3d printing, thermoplastics, engineering, abs, asa
    
Stratasys
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: Markforged     Published Date: Sep 14, 2018
3D printed composite parts are said to be up to 23x stronger than ABS, giving you the reliability you need to keep production lines running smoothly. Request your sample part today, and test the strength yourself.
Tags : 
markforged, 3d printing, composite parts, 3d printers, manufacturing tools
    
Markforged
Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges
    
IBM
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
The majority of training and performance management processes don’t lead to more skilled and productive employees. So what’s different about the ones that do? Download our brief, “The Absolute Must-Do’s to Build an Agile Organization”, and learn: • How to increase employee productivity by 37% • What separates world-class learning and performance from ho-hum • Real business examples of this in action
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
Published By: Apple Corporation     Published Date: May 29, 2012
Please join us at this on-demand online seminar. It'll take about an hour and it's absolutely free.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes, ipod mp3 player, airport, displays, isight, magic mouse, magic trackpad, remote, superdrive, time capsule, wireless keyboard, keyboards, personal finance
    
Apple Corporation
Published By: Apple Corporation     Published Date: Aug 29, 2012
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, online seminar, ipad, training, sales, business analytics
    
Apple Corporation
Published By: Apple Corporation     Published Date: Aug 30, 2012
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, live online seminar, september 17th, ipad
    
Apple Corporation
Published By: Apple Corporation     Published Date: Jan 09, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
    
Apple Corporation
Published By: Apple Corporation     Published Date: Jan 09, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, ipad, live online seminar, free, ipad in business
    
Apple Corporation
Published By: Apple Corporation     Published Date: Feb 07, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
    
Apple Corporation
Published By: Apple Corporation     Published Date: Feb 08, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
    
Apple Corporation
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn, 320, gateway, protection, content filtering, kauffman, protection
    
Astaro
Published By: Apple Corporation     Published Date: Nov 14, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free.
Tags : 
ipad, apple, mobile, deployment, mission-critical apps
    
Apple Corporation
Published By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : 
mdm, mobile device management, deployment, ipad, business solutions, apple
    
Apple Corporation
Published By: Apple Corporation     Published Date: Nov 15, 2012
Please join us at this exclusive on-demand seminar. It'll take about half an hour and it's absolutely free
Tags : 
ipad, apple, business solutions, seminar, apps, ipad apps, it security, security, security solutions, it infrastructure, mobile workforce
    
Apple Corporation
Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.