A NewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: A New returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Storage Management
 •   Data Center Management
 •   Data Security
 •   Endpoint Security
 •   Backup Systems and Services
 •   Statistical Data Analysis
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   A New Alaska
 •   A New Chart
 •   A New Quality
 •   A New Screen
 •   A Technical
 •   Data A
 •   Integrated A
 •   Reservation A
 •   Rfi A
 •   Schemas A New
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Addressing the Broken State of Backup with a New Category of Disk-Based Backup Solutions by ExaGrid Systems, Inc.

February 28, 2014 - (Free Research)
This guide provides best practices for modern backup architecture are well as information on a disk-based backup solution that is built to handle the challenges of backup. 
(NEWSLETTER) READ ABSTRACT |

Best Practices for Migrating to a New Service Desk Platform by Nimsoft, Inc.

July 05, 2012 - (Free Research)
This white paper offers guidelines and best practices for IT organizations that are in the midst of, or are planning a migration to a new service desk platform. Within, learn how you can effortlessly migrate your tickets, workflow, knowledge articles, and more. 
(WHITE PAPER) READ ABSTRACT |

How a New-generation MES Can Drive Flexible Manufacturing by Apriso Corporation

June 2008 - (Free Research)
A new generation of MES is needed, not only to address the challenges of flexible production, but also to adapt to a global marketplace where a flexible plant may have to be opened at any time, on any continent. 
(WHITE PAPER) READ ABSTRACT |

Disrupt IT:  A new model for IT in the digital age by ComputerWeekly.com

March 2014 - (Free Research)
Ian Cox, specialist in digital transformation and IT leadership, assesses the impact of digital technology on the role of the CIO. 
(ESSENTIAL GUIDE) READ ABSTRACT |

A New Approach to Custom App Development by ServiceNow

June 2013 - (Free Research)
This resource discusses how the right tools and platforms can help IT significantly speed up custom application development and deliver greater value to your organization. 
(WHITE PAPER) READ ABSTRACT |

Streamlining Global Operations: A New Approach to Two-Tier ERP by NetSuite

December 2013 - (Free Research)
This resource reveals how a new cloud-based approach to two-tier ERP can deliver the full functionality that your organization needs to support global operations – while still keeping costs low. 
(WHITE PAPER) READ ABSTRACT |

Managing City Assets: A New Perspective; A New Model; and Transformed Value by IBM

September 2013 - (Free Research)
In this white paper, you will learn about a leading technical approach that accelerates implementation, substantially removes funding hurdles, ensures an ongoing solution and incentivizes cities to migrate from a fragmented, costly and inadequate model to a common leading-edge solution. 
(WHITE PAPER) READ ABSTRACT |

A New Breed of Data Warehouse by ASG Software Solutions

February 2010 - (Free Research)
Read this paper to learn about an emerging data warehouse technology that addresses many of the implementation challenges organizations face. 
(WHITE PAPER) READ ABSTRACT |

Malware Attacks Demand a New Malware Defense Approach by Imperva

June 2013 - (Free Research)
Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Expert Tips for a New Era of Application Integration by TIBCO Software Inc.

March 2013 - (Free Research)
The complexity of today's communications calls for new application integration strategies. In part one of this in-depth resource, Benoit Lheureux, a research vice president at Gartner, explains how master the five integration competencies will put you at a competitive advantage. 
(EGUIDE) READ ABSTRACT |

A New Threat-Centric Security Model for Before, During, and After an Attack by Sourcefire

April 2014 - (Free Research)
This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Your CEO Wants to Connect a New Device to the Corporate Network. Now What? by Sophos, Inc.

November 2013 - (Free Research)
This exclusive paper examines the key challenges, risks and rewards of BYOD, discussing how to implement the right strategy to mitigate security concerns. 
(WHITE PAPER) READ ABSTRACT |

The ROI of a New Learning Management System (LMS): How to Construct a Successful Business Case by SuccessFactors

February 2014 - (Free Research)
This resource describes key features and capabilities of a new-generation learning management system (LMS), and counts down six steps for demonstrating LMS value, rooted in ROI. Learn how you can make a successful business case for an LMS by reading on now. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Information Archiving: It’s Time for a New Strategy by OpenText

February 2014 - (Free Research)
Access the following white paper to discover what poor archiving really is. Learn if you're keeping too much or too little, where to turn for cost-effective storage, and more. 
(WHITE PAPER) READ ABSTRACT |

A New Security Approach for Today's Advanced Attacks by FireEye

December 2013 - (Free Research)
This paper examines the limitations of existing security solutions, and several security architectures, including sandbox-based products that can truly protect against today's advanced attacks. 
(WHITE PAPER) READ ABSTRACT |

A New Era of IT by Information Builders

December 2012 - (Free Research)
This resource explores how combining the right business intelligence (BI) platform with an expert integrated system will allow you to reorient and optimize IT practices for cloud computing, resulting in better performance, scalability, reliability, and more. 
(WHITE PAPER) READ ABSTRACT |

SAP NetWeaver BPM White Paper - Bruce Silver by SAP America, Inc.

January 2009 - (Free Research)
Business process management provides a new management discipline, a new suite of software technologies and tools, and a new IT implementation style based on concrete links between strategy and execution. This white paper explains SAP's place in the BPM landscape and describes its new offering in that arena, NetWeaver BPM. 
(WHITE PAPER) READ ABSTRACT |

Solve Exchange Storage Problems Once and for All: A New Approach without Stubs or Links by Mimosa Systems

May 2008 - (Free Research)
This white paper discusses how Mimosa NearPoint can reduce Exchange storage and keep email accessible to end users, without requiring stub files in Exchange. 
(WHITE PAPER) READ ABSTRACT |

A New Tool for the Security Arsenal: Next-Generation Firewall by Dell Software

August 2013 - (Free Research)
In this e-book, IDG discusses a new set of network security challenges as companies try to balance productivity and security. Download your copy today. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Security: Defining the Total Cost of Ownership by Sophos, Inc.

March 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT) READ ABSTRACT |

Extending Business Intelligence with a New Generation of Dashboards by IBM

February 2011 - (Free Research)
Learn how a new generation of dashboards can enrich your business intelligence solutions and become an integral part of your business analytics arsenal in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Transcript: A New Paradigm for Big Data by Red Hat

January 2013 - (Free Research)
This white paper defines big data, elaborates on its key drivers, and showcases a technology designed to help you address the challenges that come with it. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality by TippingPoint

August 2009 - (Free Research)
This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world. 
(WHITE PAPER) READ ABSTRACT |

A New Charter for HR by Jive Software

February 2014 - (Free Research)
In this white paper, Stowe Boyd of GigaOM Research explores:The current state of the workforce: What is the new normal? How HR and technology leaders can work together to responsibly invest in social technologies? What HR must become to embrace the modern workplace and earn a seat at the executive table. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security by Trend Micro, Inc.

January 2011 - (Free Research)
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts