Application ImplementingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Implementing returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Contact Center Management
 •   Customer Self-service/ e-Self Help
 •   Mobile Device Management
 •   Application Management and Maintenance
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Workforce Management
 •   Telephony/ CTI/ VOIP
 •   Help Desk and Call Management

Related Searches
 •   Application Capacity
 •   Application Find
 •   Application Implementing Parts
 •   Application Implementing Resources
 •   Application Implementing System
 •   Configuration Application Implementing
 •   Disk Application Implementing
 •   Email Application
 •   Guides Application Implementing
 •   Pricing Application Implementing
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Getting a better grip on mobile devices by IBM

March 14, 2013 - (Free Research)
Read this whitepaper and learn how to unlock the business opportunities that BYOD has to offer through proper mobile device management. Get tips on managing mobile applications, implementing management technology, creating a BYOD plan, and more. 
(WHITE PAPER) READ ABSTRACT |

VW Credit, Inc. by Aspect

March 2008 - (Free Research)
Implementing Aspect eWorkforce Management and its Perform enhancement enabled VCI to optimize its agent performance by allowing better forecasting and more accurate planning, as well as more effective scheduling. 
(CASE STUDY) READ ABSTRACT |

Implementing ITIL Using the PMBOK Guide in Four Repeatable Steps by Global Knowledge

January 2006 - (Free Research)
This white paper provides an overview of the PMBOK® and the key process areas and functions within the IT Infrastructure Library. 
(WHITE PAPER) READ ABSTRACT |

BI Project Management for Oracle Shops by SearchOracle

February 2013 - (Free Research)
Check out this invaluable resource from the industry insiders at SearchOracle.com to learn how to take the first steps toward successfully implementing Oracle BI. Inside, gain access to tips on how to get executive approval, deriving actionable insight from both SQL and NoSQL data, and 5 areas to focus on when implementing Oracle BI applications. 
(EZINE) READ ABSTRACT |

Maximizing IT Investments: Recession-proofing Your Network by F5 Networks

July 2008 - (Free Research)
This whitepaper outlines a plan that enables network teams to implement a plan that optimizes application performance. It also identifies recession-proof networking technologies and their challenges. 
(WHITE PAPER) READ ABSTRACT |

Best practices for implementing 2048-bit SSL by Citrix

December 2011 - (Free Research)
The role of secure sockets layer (SSL) technology is no longer a luxury, it is now a crucial part of all networking systems. This guide explores some best practices for implementing 2048-bit SSL and how it can benefit your network infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Implementing a "Smart IPS": IANS Working Knowledge Series™ by Sourcefire

June 2008 - (Free Research)
The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire. 
(CASE STUDY) READ ABSTRACT |

Implementing an identity management solution by SAP America, Inc.

June 2008 - (Free Research)
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Five goals for implementing Oracle Business Intelligence Applications by SAP America, Inc.

December 2011 - (Free Research)
Oracle Business Intelligence Applications (OBIA) can give organizations deeper analytical views into their business performance. In this tip guide, readers will learn about five key areas organizations should focus on when implementing OBIA. 
(EGUIDE) READ ABSTRACT |

Implementing the IBM System Storage SAN Volume Controller (SVC) V5.1 by IBM

November 2010 - (Free Research)
This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage™ SVC, a virtualization appliance solution that maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Continue reading to learn how to implement the SVC at a 5.1.0 release level with a minimum of effort. 
(BOOK) READ ABSTRACT |

Implementing Oracle on VMware vSphere: New Technology, New Thinking and Great Results by VMware, Inc.

March 2014 - (Free Research)
In this webcast takes a fresh look at best practices for implementing Oracle databases and applications on the VMware vSphere platform. 
(WEBCAST) READ ABSTRACT |

Implementing Your BYOD Mobility Strategy: AN IT Checklist and Guide by Insight

February 2012 - (Free Research)
This mobility checklist will offer readers an easy-to-read breakdown of what the IT department absolutely needs to consider when implementing a BYOD program into their enterprise. Read on to learn about the applications to choose, the installation and configuration options available, how to evaluate device performance, and more. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Agile Development Process by IBM

March 2011 - (Free Research)
This e-guide examines organizational and team challenges of implementing the agile process. This e-guide also will detail how to scale agile software development to large organizations by scaling agile practices and agile work; how to transition small and large development teams to Scrum; and more. 
(EGUIDE) READ ABSTRACT |

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle by IBM

July 2009 - (Free Research)
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Managing the Performance of Mobile Applications by Hewlett-Packard Company

May 2012 - (Free Research)
Extremely high end-user expectations for enterprise mobile performance have IT teams scrambling to address its unique challenges. Read this e-guide for expert tips on choosing and implementing the best mobile performance management tools and strategies available today. Also, find in-depth industry analyst advice on functional testing. 
(EGUIDE) READ ABSTRACT |

E-Guide: Expert tips for Agile test strategies by Hewlett-Packard Company

April 2012 - (Free Research)
Many development organizations fail to realize that test automation doesn't implement itself; it requires a certain amount of planning and care to be truly effective. Read this e-guide to uncover expert guidance for successfully implementing automated testing. Then, find tips for managing testing within the short iterations of agile development. 
(EGUIDE) READ ABSTRACT |

Industrializing Agile Software Delivery with ALM 2.0+ by CollabNet

January 2012 - (Free Research)
In this webcast learn how  IT departments have increased developer productivity, saved millions, and realized governance by implementing DevOps. ALM 2.0+ fosters integration with operations and accepts tool and platform heterogeneity, helping FT1000 customers worldwide transitioning to DevOps. 
(WEBCAST) READ ABSTRACT |

InMage Provides Solid Defense for Tampa Bay Lightning’s Mission-Critical Data and Applications by InMage Systems

October 2013 - (Free Research)
This short case study explores how the pro ice hockey team, Tampa Bay Lightning, easily and affordably implemented one industry-leading backup and recovery software solution that leverages the advantages of disk-based data protection to provided application-aware recovery that can meet both remote and local requirements. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication by SafeNet, Inc.

September 2009 - (Free Research)
Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices. 
(WHITE PAPER) READ ABSTRACT |

Top Considerations for Implementing Secure Backup and Recovery by Zmanda Inc.

July 2008 - (Free Research)
Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data. 
(WHITE PAPER) READ ABSTRACT |

Being Agile in a Non-Agile World by Ivar Jacobson Consulting

July 2008 - (Free Research)
This paper discusses how to implement agile thinking in the context of both defined engineering practices and an organizations' Software Development Lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

Six Secrets to 24x7 Exchange Availability by Marathon Technologies

September 2009 - (Free Research)
The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster. 
(WHITE PAPER) READ ABSTRACT |

A Candid Examination of Data Deduplication by Symantec Corporation

August 2009 - (Free Research)
Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts