Abstract Texas DirectoryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Abstract Texas Directory returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Systems Management
 •   Disaster Recovery
 •   Authentication / Password Management
 •   Backup Systems and Services
 •   Identity Management/ User Provisioning
 •   Directory Services
 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Network Management
 •   Virtualization

Related Searches
 •   Abstract On-Line
 •   Abstract South Carolina
 •   Abstract Texas Benefit
 •   Abstract Texas Budget
 •   Abstract Texas Directory New York
 •   Abstract Texas Directory Source
 •   Documentation Abstract Texas Directory
 •   Example Of Abstract
 •   Metrics Abstract Texas Directory
 •   Review Abstract
Advertisement

ALL RESULTS
1 - 25 of 266 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Identity Simplification and Consolidation through Virtualization and Synchronization by Agilysys-Sun Technology Solutions

March 09, 2009 - (Free Research)
You'll want to read this paper if simplifying your company's identity and access management (IAM) infrastructures are on your agenda. Directory virtualization provides new opportunities to move towards this goal by abstracting disparate sources of identity data and presenting them in a unified fashion. Read on for details and more information. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Texas Tech University Requires Updated Backup & Recovery Software by CommVault Systems, Inc.

January 07, 2013 - (Free Research)
Check out this informative case study to find out which software Texas Tech University implemented to meet their environments needs. 
(CASE STUDY) READ ABSTRACT |

People-Centric Recruitment: Texas Roadhouse's Approach for Building and Preserving Company Culture by Ultimate Software

December 31, 2012 - (Free Research)
This brief case study details how restaurant chain Texas Roadhouse created and preserved a consistent organizational culture – even across multiple locations – and explores the value of the right people-centric recruiting tools. 
(CASE STUDY) READ ABSTRACT |

Robot/ SCHEDULE Enterprise: Improves Quality of Life at Farm Credit Bank of Texas by Help/Systems

October 19, 2009 - (Free Research)
Read this case study to see how FCBT used Robot/ SCHEDULE to connect and coordinate their job scheduling needs across multiple systems. 
(CASE STUDY) READ ABSTRACT |

Case Study: Compellent SAN earns an A+ in ROI for the University of North Texas by Dell Compellent

June 29, 2011 - (Free Research)
UNT needed to deploy a new SAN that could meet the performance, ease-of-management, and cost requirements. In the search for the right solution, they went through an extensive cost of ownership analysis of the competing vendors. Read this Case Study to learn more about the solution they found. 
(CASE STUDY) READ ABSTRACT |

GeoEnergy Experiences a Seismic Shift in Data Processing Throughput with sTec Enterprise SSDs by sTec | HGST

October 10, 2013 - (Free Research)
In this short case study, discover how a specialized seismic processing company, based in Houston, Texas, deployed innovative enterprise SSD solutions for up to ten-times-faster job performance and consistent, reliable project execution. 
(CASE STUDY) READ ABSTRACT |

Mastering the Multicore Challenge: An Elegant and Efficient Approach to Exploiting the Power of Parallelism by Texas Multicore Technologies, Inc.

August 26, 2010 - (Free Research)
Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments. 
(WHITE PAPER) READ ABSTRACT |

Major Healthcare Provider Protects Against Natural Disasters and Ensures 24/7 Desktop Access with AppSense by AppSense

November 17, 2010 - (Free Research)
This video discusses the benefits of desktop virtualization for a number of reasons including its ability to allow employees to access their desktop from anywhere and to ease virtual IT support. 
(VIDEO) READ ABSTRACT |

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye by FireEye

December 31, 2013 - (Free Research)
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system. 
(WHITE PAPER) READ ABSTRACT |

CW Buyer's Guide: Software-defined networking by SearchSecurity.com

April 05, 2013 - (Free Research)
Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Take Back the Endpoint by Kaspersky Lab

February 08, 2011 - (Free Research)
During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495. 
(WHITE PAPER) READ ABSTRACT |

Health Care Organization Gets Proactive with Virtual Instruments by Virtual Instruments

November 01, 2010 - (Free Research)
Plagued by frequent unplanned outages in a relatively simple SAN environment, a Texas health care facility turned to Virtual Instruments to provide the requisite insight and visibility for its new, much larger and complex virtualized SAN infrastructure. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

State Agency Boost Security and Reduces Costs with GoToMyPC Corporate by Citrix Online

January 2005 - (Free Research)
The Texas Department of Family and Protective Services gives top priority to securing the information gathered for its investigations and cases. 
(CASE STUDY) READ ABSTRACT |

Dell Protects Cloud-based Desktop Services with On Demand Networking from Vyatta by Vyatta Inc.

February 2011 - (Free Research)
Well known for its PCs and servers, Dell, based in Round Rock, Texas, also offers cloud-based services to enterprises, providing them the technology they need, without the burdens of upfront costs and complex maintenance, through services that feature on-demand scalability. 
(CASE STUDY) READ ABSTRACT |

The Top 12 Most Difficult Active Directory Management Tasks by Dell Software

October 2008 - (Free Research)
This paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier. 
(WHITE PAPER) READ ABSTRACT |

Mastering Active Directory Migrations: Controlling Critical Issues (webcast) by Dell Software

October 2013 - (Free Research)
This new webcast explores Active Directory migration challenges, key considerations for planning your own transition and how Dell Software's Active Directory migration and management solutions can help. 
(WEBCAST) READ ABSTRACT |

Memorial Hermann Delivers Secure, Reliable Wireless for Mission-Critical Patient Care by Aerohive Networks

March 2014 - (Free Research)
In this case study, learn how Memorial Hermann Health System is benefiting after upgrading to a wireless network. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers by Sendmail, Inc.

October 2008 - (Free Research)
This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure. 
(PODCAST) READ ABSTRACT |

Active Directory Expert Best Practices and Security Tips by Centrify Corporation

December 2012 - (Free Research)
Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more. 
(EGUIDE) READ ABSTRACT |

Using Microsoft Active Directory in the Domino World by PistolStar, Inc.

February 2009 - (Free Research)
Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Ensuring High Availability for Active Directory by Dell Software

September 2010 - (Free Research)
Every Active Directory administrator will agree that the health stability and recoverability of Active Directory is essential for the enterprise. If Active Directory fails, even in the slightest manner, one or all of the services and communications with Active Directory can also fail. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth by IBM

May 2011 - (Free Research)
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust. 
(EGUIDE) READ ABSTRACT |

Directory Services Integration with Database Enterprise User Security by Oracle Corporation

April 2008 - (Free Research)
This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 266 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts