Skip to main content
 

software download

Results 151 - 171 of 171Sort Results By: Published Date | Title | Company Name
Published By: HP and Intel ®     Published Date: May 27, 2014
Imagine a future where applications become the source of competitive advantage for businesses in most industries. Software can augment products and services and automate workflows, as enterprises innovate to deliver more engaging experiences to mobile users. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
Imagine a future where applications become the source of competitive advantage for businesses in most industries. Software can augment products and services and automate workflows, as enterprises innovate to deliver more engaging experiences to mobile users. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP
Published By: eGrabber     Published Date: Sep 21, 2009
The Internet has many free sources of leads that you can use to market your product or service. ListGrabber is a powerful sales lead capture tool that allows you to build your own lead or prospect lists from various publicly available sources of free leads on the Internet. You can capture contact lists from online directories (like yellowpages.com, superpages.com, whitepages.com), association websites, membership directories, etc. and enter them into an Excel spreadsheet or any database (ACT!, Outlook, Excel, GoldMine, etc.) This sales and marketing software enables you to: . Capture name, address, email, phone and fax number, etc of likely prospects . Automatically transfer the captured contacts into an Excel spreadsheet or any other database . Complete your online lead generation in seconds . Start your cold calling and email/telemarketing campaigns sooner . Capture contact information found in email signatures, spreadsheets and documents Cost: $249.95 Download your Trial Copy Today.
Tags : 
lead, listgrabber, act, outlook, excel, goldmine, yellowpages, whitepages, superpages, leads, lead generation, egrabber, public
    
eGrabber
Published By: Symantec Corporation     Published Date: Feb 25, 2014
"For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Extended Validation (EV) Code Signing Certificates help to halt malware infiltration by requiring a rigorous vetting process and helping ensure that private key security cannot be compromised. EV certificates require a hard token and associated PIN in order to sign code, introducing a more secure physical factor of authentication to the signing process. The EV Code Signing process provides browsers, operating systems, and security software an additional source of confidence in applications signed with an EV certificate. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application "
Tags : 
symantec, malware, applications, security, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
security, malware, code signing, software, downloads
    
Symantec Corporation
Published By: Silkroad     Published Date: Sep 28, 2017
The HR Daily Advisor, with the help of SilkRoad recently conducted its HR Tech Survey. The goal of the survey was to gain a better understanding of how HR technology is being used in the ever-evolving field of HR. We found answers to important questions like: What HR Tech do you use to create a positive candidate experience? Do you use social media or software/technology to develop a “pool of talent” that you can tap when job openings become available? Do you leverage HR technology to create a positive candidate experience? How do you use HR technology to engage employees? And so much more! This summary will go over detailed results from this survey. Complete the form to download now!
Tags : 
    
Silkroad
Published By: Dakota Software     Published Date: Jul 19, 2016
Data management is an increasingly important focus area for EH&S, and sustainability leaders today. The right metrics can help identify audit priorities, serve as an early indicator for safety issues and demonstrate tangible results from sustainability investments. Doing so, however, requires a robust set of software tools that reflect a company’s specific business needs. For the buyer approaching the market, the options might seem overwhelming. How do you even begin to sort and filter what you can have, let alone what it is that you actually need? This NAEM report is intended to help you answer that question. Download to learn: • How to frame the business case • Find out how long the selection process will take • Get tips to make your selection a success • Hear from your peers who have been through the process
Tags : 
    
Dakota Software
Published By: Dakota Software     Published Date: Aug 09, 2017
The first task of any EHS leader is to ensure the firm is in compliance with relevant regulations at all times. According to the Verdantix survey of 301 EHS decision-makers, 94% stated that the CEO considers the core function of EHS is to achieve compliance. This free report identifies the challenges with establishing and maintaining compliance at complex organizations and provides insights into the effective three pillar approach that Dakota Software has taken to resolve the problems faced by EHS managers at all levels. Download now!
Tags : 
    
Dakota Software
Published By: eCompliance     Published Date: Mar 16, 2016
The Impact of Technology on Health and Safety survey, sponsored by eCompliance, sought to learn how environment, health, and safety (EHS) professionals are leveraging software solutions to address their safety needs. A total of 638 safety professionals participated in the survey, and we asked them: • How they perceive the safety culture at their organization. • The specific challenges they face within their safety program. • How they define and measure aspects of safety performance. • Their thoughts on safety software, including whether they have evaluated any programs. • The driving factors behind purchasing software. • And more! Download this free survey summary to see what else we learned!
Tags : 
    
eCompliance
Published By: Spiceworks     Published Date: Dec 30, 2014
Spiceworks Software Download
Tags : 
    
Spiceworks
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: Epicor     Published Date: Sep 20, 2018
Selecting the right software is an investment of time and money that can pay off with increased customer loyalty, more productive employees, and simpler business management. The Epicor® Eagle N Series® business management solution enables retailers to grow and thrive with powerful analysis tools that tell you ow your business is doing and why. Here is a sneak peek into 8 powerful analysis tools to consider that will help your retail business grow and thrive: 1. Store vs. Store 2. Your Top 100 Items 3. The Market Basket 4. Big Investment, Big Opportunity 5. Excess Limits Success 6. Beware the Hidden Dangers 7. A lot Can Happen in a Year 8. When Costs Change But Pricing Doesn’t Download this tip sheet to get more insight into these 8 powerful analysis tools that will help grow your retail business.
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Published By: NetApp     Published Date: Dec 05, 2016
Realizing market penetration and a fast path to revenue comes with a unique set of challenges for SaaS vendors looking to provide cloud-based software applications. Download the white paper to see if your infrastructure is up to the task.
Tags : 
    
NetApp
Published By: Dell EMC     Published Date: Dec 01, 2017
A common misconception about hyperconverged infrastructure (HCI) is that because data services are software-defined, the hardware doesn’t matter. It’s easy to see why—the software driving HCI solutions such as the Dell EMC XC Series (in this case, Nutanix software) is exceptional. It efficiently manages data and communications across a cluster of nodes and storage tiers, keeping the cluster and virtual machines (VMs) up and running, delivering optimal performance and availability. Software-defined infrastructure is changing the way data services are delivered, making companies more efficient and agile, and reducing costs. Download the study to learn more about the latest trends. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC
Published By: Palo Alto Networks     Published Date: Dec 04, 2015
Simplify your maintenance management software evaluation process with this free download!
Tags : 
palo alto, maintenance management, pricing guide, software guide
    
Palo Alto Networks
Published By: BlackLine     Published Date: Apr 10, 2017
For many, the idea of Robotic Process Automation (RPA) might conjure images of large automated assembly line welders and pickers. But RPA actually refers to software robots, or applications that replicate human interaction with a user interface on a computer system. Download now to learn more!
Tags : 
    
BlackLine
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security
    
Veracode
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: SAP Concur     Published Date: Sep 25, 2019
"This IDC study reviews the competitive market for travel and expense management software in 2018. ""Industry leaders need to leverage advanced technologies to augment their capabilities for streamlining approvals, combating fraud, and maintaining compliance. Many of these technologies have taken large leaps forward in terms of usability and accuracy over the past 24 months,"" said Kevin M. Permenter, research manager for Enterprise Applications with IDC. There is no magic formula to rid the business of the burden of noncompliance. Download this report to find out how organisations can minimize risk for noncompliance and fraud amidst rapid international growth. "
Tags : 
    
SAP Concur
Start   Previous    1 2 3 4 5 6 7     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.