Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

shell

Results 26 - 45 of 45Sort Results By: Published Date | Title | Company Name
Published By: Shell     Published Date: May 28, 2019
You may see recommendations for universal tractor transmission oil, anti-wear hydraulic oil, zinc free hydraulic oil, TO-4 transmission drive train oil, and more. These varying recommendations can leave one confused and asking, “Is there one hydraulic oil I could use in all of my mobile equipment?” This is a question our technical team is asked frequently; after all, hydraulic systems perform similar duties, and some components, like pumps and valves, can be common across different OEM brands.
Tags : 
    
Shell
Published By: Shell     Published Date: May 28, 2019
When energy use is reviewed at a national or international level we realize that about 35% of the western world’s total energy and carbon dioxide (CO2) footprint is linked to transport and a large fraction of that with freight movement. Collectively, cars and trucks account for nearly one-fifth of all U.S. emissions, emitting around 24 pounds of CO2 and other global-warming gases for every gallon of gas1. So, if we are to reduce energy usage and abate CO2 emissions and deliver cost savings, it is essential that a lot of attention is paid to commercial transport. Priorities for Increasing Fuel Economy explores these challenges and provides the essential information you need to help you achieve competitive advantage across your commercial fleet operations.
Tags : 
    
Shell
Published By: Shell     Published Date: Jun 10, 2019
How lubrication can play a role in your TCO program.
Tags : 
    
Shell
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: Dell Software     Published Date: May 10, 2013
Active Directory is critical to your IT infrastructure, but, if you’re relying on native tools and PowerShell scripts, it may be costing you much more than you think. Learn about how the right tools can put you back in control, making AD management easy and cost effective.
Tags : 
native tools, powershell scripts
    
Dell Software
Published By: IBM MaaS360     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
google, google mobile os, android, hackers, security, emm, enterprise mobility management, networking, software development, it management, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
ibm, fiberlink, maas360, android, google, enterprise, data, security, networking, wireless, enterprise applications
    
IBM MaaS360
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
security, it management
    
CarbonBlack
Published By: Oracle     Published Date: Jan 13, 2014
Oracle, Leader Networks, and Social Media Today recently conducted an online survey of over 900 marketing and technology leaders at more than 500 organizations from around the world to explore what it means to be a socially enabled enterprise. Technology and Marketing executives from Chubb & Son, Shell and Whole Foods Market participated in in-depth interviews as part of the study and share lessons learned and provide practical insights from their perspective. Paul Gillin, veteran technology journalist and co-author of the bookAttack of the Customers, adds perspective based on his experience with applying social media to marketing, customer service and internal communications Download this exclusive White Paper, The Socially Enabled Enterprise to learn more about the opportunities and challenges global organizations are facing in the transition to becoming socially enabled enterprises.
Tags : 
socially enabled enterprise, social business, social media monitoring, social marketing, social media management, social relationship management, social marketing platform, social marketing tools, social media tools, customer experience, customer insight
    
Oracle
Published By: IBM     Published Date: Oct 26, 2015
This is Big Data in a nutshell: It is the ability to retain, process, and understand data like never before. In this book you will learn how cognitive computing systems, like IBM Watson, fit into the Big Data world.
Tags : 
ibm, ibm watson, big data, data center, data analysis, data center design and management
    
IBM
Published By: OrderDynamics     Published Date: Dec 01, 2008
OrderDynamics provides an example of it helped a high growth brand deliver a superior online shopping experience for its consumers while maintaining flexibility and control over their web design.
Tags : 
orderdynamics, balmshell, customer service, ecommerce
    
OrderDynamics
Published By: OrderDynamics     Published Date: Dec 08, 2008
OrderDynamics provides an example of it helped a high growth brand deliver a superior online shopping experience for its consumers while maintaining flexibility and control over their web design.
Tags : 
orderdynamics, balmshell, customer service, ecommerce, enterprise applications
    
OrderDynamics
Published By: Dell Storage     Published Date: Apr 21, 2011
How to Rapidly Provision Storage in a Hyper-V Environment Using the Storage Center Command Set for Windows PowerShell.
Tags : 
dell compellent, provision storage, hyper-v environment, storage center command, windows powershell
    
Dell Storage
Published By: Dell     Published Date: Jul 30, 2012
Although you may be aware of the many new features Windows Server 2008 R2 offers, you may not know which ones are the most valuable for the data center.
Tags : 
hyper-v, server core, bitlocker, microsoft, data encryption, data center, data management, active directory, single sign-on, ad fs, sso, powershell, it environment, it management, wds, dell, windows deployment services, remote desktop services, rds, vdi
    
Dell
Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide features all of our dependable connectivity solutions for data & power. You’ll get 1. Data Communications Product Guide 2. Standard Flexible Printed Circuit (FPC) Connectors Quick Reference Guide 3. Memory Sockets Quick Reference Guide 4. Stacking Height Guide for Parallel Board-to-Board Applications 5. RF Connectors Quick Reference Guide 6. High Speed Input/Output Solutions Quick Reference Guide 7. AMPLIMITE Subminiature D Connectors Catalog 8. Soft Shell Pin & Socket Connectors Catalog
Tags : 
    
TE Connectivity
Published By: Shell     Published Date: May 28, 2019
How lubrication can play a role in your TCO program.
Tags : 
    
Shell
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Previous    1 2     Next   
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.