Products related to Software:
-
Software Test Automation : Software Test Automation
This book describes how to build and implement an automated testing regime for software development.It presents a detailed account of the principles of automated testing, practical techniques for designing a good automated testing regime, and advice on choosing and applying off-the-shelf testing tools to specific needs.This sound and practical introduction to automated testing comes from two authors well known for their seminars, consultancy and training in the field.
Price: 77.99 £ | Shipping*: 0.00 £ -
The Architecture of Computer Hardware, Systems Software, and Networking : An Information Technology Approach
The Architecture of Computer Hardware, Systems Software and Networking is designed help students majoring in information technology (IT) and information systems (IS) understand the structure and operation of computers and computer-based devices.Requiring only basic computer skills, this accessible textbook introduces the basic principles of system architecture and explores current technological practices and trends using clear, easy-to-understand language.Throughout the text, numerous relatable examples, subject-specific illustrations, and in-depth case studies reinforce key learning points and show students how important concepts are applied in the real world. This fully-updated sixth edition features a wealth of new and revised content that reflects today’s technological landscape. Organized into five parts, the book first explains the role of the computer in information systems and provides an overview of its components.Subsequent sections discuss the representation of data in the computer, hardware architecture and operational concepts, the basics of computer networking, system software and operating systems, and various interconnected systems and components.Students are introduced to the material using ideas already familiar to them, allowing them to gradually build upon what they have learned without being overwhelmed and develop a deeper knowledge of computer architecture.
Price: 125.95 £ | Shipping*: 0.00 £ -
Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology
The wide range of topics that the book covers are organised into sections reflecting a cradle to grave view of how entrepreneurial, innovative, and tech-savvy approaches can advance environmental sustainability in the fashion sector.These sections include: sustainable materials; innovation in design, range planning and product development; sustainable innovations in fashion supply chains; sustainable innovations in fashion retail and marketing; sustainable alternatives for end-of-life and circular economy initiatives; and more sustainable alternative fashion business models.
Price: 90.50 £ | Shipping*: 0.00 £ -
AVAST Software ESSENTIAL BUSINESS SECURITY
AVAST Software ESSENTIAL BUSINESS SECURITY
Price: 22.86 £ | Shipping*: 0.00 £
-
In automation, which software is it?
In automation, the software used is typically referred to as automation software or automation tools. These tools are designed to automate repetitive tasks, streamline processes, and increase efficiency in various industries. Some popular examples of automation software include UiPath, Blue Prism, Automation Anywhere, and Selenium. These tools often use technologies such as robotic process automation (RPA) and artificial intelligence to mimic human actions and perform tasks with minimal human intervention.
-
In automation, which software is being used?
In automation, various software is being used depending on the specific application and industry. Some common examples of automation software include robotic process automation (RPA) tools such as UiPath, Blue Prism, and Automation Anywhere for automating repetitive tasks, industrial automation software like Siemens PLC and Rockwell Automation for controlling manufacturing processes, and software for test automation such as Selenium and Appium for automating software testing. Additionally, there are also software platforms for business process automation, such as Microsoft Power Automate and Zapier, which enable the automation of workflows and business processes.
-
Which security software do you use?
I use a combination of security software to ensure comprehensive protection for my devices. This includes antivirus software to protect against malware and viruses, a firewall to monitor and control incoming and outgoing network traffic, and a virtual private network (VPN) to encrypt my internet connection and protect my online privacy. I also regularly update my operating system and software to patch any security vulnerabilities.
-
Which internet security software do you find the best?
As an AI, I do not have personal preferences. However, some popular internet security software options that are highly recommended by experts include Norton 360, Bitdefender Total Security, and Kaspersky Internet Security. These programs offer comprehensive protection against various online threats such as malware, phishing attacks, and identity theft. It is important to choose a security software that suits your specific needs and provides regular updates to stay protected in the ever-evolving digital landscape.
Similar search terms for Software:
-
VMware vRealize Automation 8 Advanced Global (Software License)
This product is a brand new and unused VMware vRealize Automation 8 Advanced Global (Software License)
Price: 11.62 € | Shipping*: 0.00 € -
VMware vRealize Automation 8 Advanced Enterprise Global (Software License)
This product is a brand new and unused VMware vRealize Automation 8 Advanced Enterprise Global (Software License)
Price: 11.69 € | Shipping*: 0.00 € -
Software Transparency : Supply Chain Security in an Era of a Software-Driven Society
Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security.In the book, you’ll explore real-world examples and guidance on how to defend your own organization against internal and external attacks.It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations.The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems.You’ll also discover: Use cases and practical guidance for both software consumers and suppliersDiscussions of firmware and embedded software, as well as cloud and connected APIsStrategies for understanding federal and defense software supply chain initiatives related to securityAn essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals.
Price: 26.99 £ | Shipping*: 3.99 £ -
Innovation in Energy Security and Long-Term Energy Efficiency
The sustainable development of our planet depends on the use of energy. The growing population of the world inevitably causes an increase in the demand for energy, which, on the one hand, threatens the potential for shortages of energy supply, and, on the other hand, causes the deterioration of the environment.Therefore, our task is to reduce this demand through different innovative solutions (i.e., both technological and social). Social marketing and economic policies can also play a role in affecting the behavior of households and companies, by causing behavioral change oriented to energy stewardship, and an overall switch to renewable energy resources. This book provides a platform for the exchange of a wide range of ideas, which, ultimately, would facilitate the driving of societies to long-term energy efficiency.
Price: 36.30 £ | Shipping*: 0.00 £
-
Search for a photo software or image viewer with facial recognition and network connectivity.
One option for a photo software with facial recognition and network connectivity is Adobe Lightroom. It has facial recognition capabilities that allow you to easily organize and search for photos based on the people in them. Additionally, Lightroom has network connectivity features that allow you to easily share and access your photos across different devices. Another option is Google Photos, which also has facial recognition technology and allows for easy sharing and access to photos through its network connectivity features. Both of these options provide a user-friendly interface and robust features for managing and sharing photos.
-
What type of software is used, standard software or custom software?
The type of software used can vary depending on the specific needs of the organization or individual. Standard software refers to off-the-shelf software that is widely available and used by many different users. This type of software is often more cost-effective and can be easily implemented. On the other hand, custom software is specifically designed and developed to meet the unique requirements of a particular organization or individual. While custom software can be more expensive and time-consuming to develop, it offers the advantage of being tailored to specific needs and can provide a competitive edge. Ultimately, the choice between standard and custom software depends on the specific needs, budget, and long-term goals of the user.
-
What are end-to-end software and cloud technology solutions?
End-to-end software and cloud technology solutions refer to comprehensive and integrated systems that cover the entire process or lifecycle of a particular software or technology need. This means that these solutions encompass everything from initial design and development to deployment, maintenance, and ongoing support. End-to-end solutions are designed to streamline and simplify the entire process, providing a seamless and cohesive experience for users. This can include cloud-based services that offer a complete package of tools and resources to meet a specific business or technological need.
-
Which education is suitable for IT security or software development?
For a career in IT security or software development, a formal education in computer science, information technology, or a related field is typically recommended. A bachelor's degree in computer science can provide a strong foundation in programming, algorithms, and computer systems, which are essential skills for both IT security and software development roles. Additionally, pursuing certifications in cybersecurity or software development can also help enhance your skills and credibility in the field. Ultimately, the most suitable education will depend on your specific career goals and interests within the IT industry.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.