About Keyword ToWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: About Keyword To returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Content Management (ECM)
 •   Records Management
 •   Business Intelligence Solutions
 •   Embedded Application Development
 •   Internet Access
 •   Document Management
 •   Storage Management
 •   Laptops/ Notebooks/ Tablet PCs
 •   Content Filtering

Related Searches
 •   About Keyword To Accounts
 •   About Keyword To Graphs
 •   About Keyword Tool
 •   Computing About
 •   Export About
 •   Impacts Of About
 •   Problem About
 •   Related About
 •   Simple About Keyword To
 •   Standards About Keyword
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Enterprise Engineer 3.5 by McLaren Software.
McLaren's Enterprise Engineer application suite assures the integrity of your asset documentation, providing a single point of control to manage the lifecycle of asset related more...
>> Discover more offerings from McLaren Software.

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by FTI Technology

November 04, 2009 - (Free Research)
In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set. 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery - A Guide for Fortune 1000 Companies by FTI Technology

December 18, 2009 - (Free Research)
With data collections growing at an epic pace, legal teams must sift quickly through documents and e-mail at rates that would have seemed unrealistic just 5 years ago. Simply put, keyword search strategies break when thrown against the mountains of data which define today’s legal matters. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Strategy Group (ESG) Report: Today's Information Access Requirements Outpace Open Source Search Options by Attivio, Inc.

March 24, 2010 - (Free Research)
This paper examines the new information access functionality and administrative requirements - including enterprise concerns for scalability, high availability, and fault tolerance - while measuring the ability of current open source alternatives to meet these demands. This report also explores the financial aspects of open source search adoption. 
(ANALYST REPORT) READ ABSTRACT |

Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It by Bloxx, Inc.

September 2008 - (Free Research)
The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet. 
(WHITE PAPER) READ ABSTRACT |

Apps Revolution by ComputerWeekly.com

February 2014 - (Free Research)
This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Special Report on Adobe by ComputerWeekly.com

February 2014 - (Free Research)
This special 7-page report from Computer Weekly, updated for 2014, analyses the challenges facing Adobe, its financial performance, the services and products it offers, its place in the IT market and its future strategy. 
(IT BRIEFING) READ ABSTRACT |

The Google/TechTarget Research Project by TechTarget

November 2008 - (Free Research)
Google and TechTarget teamed up to research the usage and interactions between search and online media during the IT purchase process. This research offers insights on making the right choices of keywords and online content for your online marketing plan. 
(WEBCAST)

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

What's New in System Center 2012 R2 Configuration Manager? by Global Knowledge

April 2014 - (Free Research)
This whitepaper details the new features added to System Center 2012 R2 Configuration and provides easy access to the information on the additions. 
(WHITE PAPER) READ ABSTRACT |

Expanding Information Access Initiatives with Embedded Enterprise Search by Vivisimo, Inc.

December 2009 - (Free Research)
This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications. 
(WHITE PAPER) READ ABSTRACT |

E-Guide A Decision Maker’s Guide to Log Management by ArcSight, an HP Company

October 2010 - (Free Research)
While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs. 
(EGUIDE) READ ABSTRACT |

Aungate Real Time Monitoring by ZANTAZ

December 2007 - (Free Research)
Aungate's Policy Management module sets a new benchmark in enterprise communication and regulatory monitoring. 
(WHITE PAPER) READ ABSTRACT |

Woods Gain Advanced Web Filtering Technology with Bloxx by Bloxx, Inc.

September 2008 - (Free Research)
The Bloxx Web filtering appliance with Tru-View Technology combines the best of traditional methods with its patented language analysis and intelligent identification techniques, providing three levels of protection. 
(WHITE PAPER) READ ABSTRACT |

NetAcuity IP Intelligence Technology by Digital Element

NetAcuity IP Intelligence provides the most comprehensive set of IP data available for targeted online advertising, content localization, geographic rights management, local search optimization, local ad serving, and enhanced analytics. 
(SOFTWARE PRODUCT)

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model by FireEye

June 2014 - (Free Research)
This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model. 
(WHITE PAPER) READ ABSTRACT |

A Smart Strategy for Streamlining and Accelerating Windows 7 Migration by Flexera Software

July 2013 - (Free Research)
This whitepaper will help you learn how to best go about taking on this necessary but overwhelming transition to Windows 7 from older operating systems. Get tips on making the business case, formulating a strategy, and more. 
(WHITE PAPER) READ ABSTRACT |

FAQ: Building a DR site vs. outsourcing disaster recovery by SearchStorage.com

April 2013 - (Free Research)
Access this E-Guide to learn more about the thought that should go into making this decision. Read on to discover more about the importance of a good DR plan and learn: pros and cons of custom-built DR sites vs. outsourced DR, differences between hot sites, cold sites and warm sites, considerationswhen developing your own site and more. 
(EGUIDE) READ ABSTRACT |

Deciphering the truth about Big Data hype and security intelligence by Hewlett-Packard Limited

April 2014 - (Free Research)
In this whitepaper, Randy Franklin Smith of UltimateWindowsSecurity.com discusses the key tenets of the realationship between Big Data and security information and event management. 
(WHITE PAPER) READ ABSTRACT |

5 Things You Thought You Knew About Linux Virtualization by Red Hat

December 2013 - (Free Research)
This video presentation discusses how IT can improve the decisions they make about Linux virtualization. 
(VIDEO) READ ABSTRACT |

5 hidden truths about virtualizing business-critical apps by VMware, Inc.

September 2013 - (Free Research)
This whitepaper summarizes the findings of a recent IDG study on virtualization. The study finds that virtualization can improve business efficiency without sacrificing security and reliability. 
(WHITE PAPER) READ ABSTRACT |

How to Succeed at Service-Oriented Architecture by Global Knowledge

June 2013 - (Free Research)
In this helpful resource, discover everything you need to know about succeeding with a service-oriented-architecture (SOA) project. You'll get advice on how to design your service interfaces, your services, your data model, and your business processes, along with other tips and guidelines. 
(WHITE PAPER) READ ABSTRACT |

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them by Symantec Corporation

November 2011 - (Free Research)
In this white paper, you'll learn about some of the most common pitfalls associated with backups and how to avoid them. You'll learn about the repercussions of poor/failed backups, and learn how to establish a backup strategy that can ensure minimal downtime during a disaster. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Understanding In-Database Analytics Technology - Benefits, Use Cases and ROI by Sybase, an SAP company

November 2009 - (Free Research)
Learn all about in-database technology in this E-book, designed to give you a complete overview of the technology and how it can be leveraged successfully. Read on to learn why more companies are choosing to leverage this new technology - and learn more about their ROI and business results. 
(EBOOK) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts