Applications Of Standard FunctionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Applications Of Standard Function returned the following results.
RSS What is RSS?
Related Categories

 •   Networks
 •   Business Intelligence Solutions
 •   Network Management
 •   Data Security
 •   WAN/ LAN Solutions
 •   Network Protocols
 •   Data Center Management
 •   Network Security
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Applications Of Communication
 •   Applications Starting
 •   Collection Applications
 •   Desktops Applications Of
 •   Implementations Of Applications
 •   Retail Applications Of
 •   Survey Applications
 •   Terms Applications Of Standard
 •   Trend Applications
 •   Trends Applications Of
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Cisco and Standards: Opening the Door to Borderless Networks by Cisco Systems, Inc.

November 30, 2010 - (Free Research)
This white paper details the need for standards adoption and adherence in order to reap the rewards in the following areas: Integration and testing, deployment, operations, problem resolution, availability, security, accessibility, open systems, cost savings, and choice. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

The TERA1200 Host Processor by Teradici Corporation

The TERA1200 Host Processor delivers a true, uncompromised PC experience over IP networks. It provides transparent USB and HD audio bridging, USB device authorization, and encrypted communications. 
(HARDWARE PRODUCT)

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

Virtual Machine Networking: Standards and Solutions by Cisco Systems, Inc.

August 2011 - (Free Research)
Uncover details about the two main standards for virtual networking and discover why using them as complementary options can help you achieve virtual networking success. 
(WHITE PAPER) READ ABSTRACT |

z Cisco Catalyst 2950 Series Switches with Standard Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Run SAP Services Fact Sheet by Hewlett-Packard Limited

February 2013 - (Free Research)
Consult this informative white paper to learn more about how you can manage your SAP ecosystem more efficiently and effectively. Learn how implementing application lifecycle management standards helps deliver value-added support to lower the total cost of operations. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc. (E-mail this company)

WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support every level of the global organization – executive, analytical, & operational – and make data available, accessible, and meaningful to every person or application that needs it. 
(SOFTWARE PRODUCT)

The Key to Seamless SSO by Radiant Logic, Inc.

April 2014 - (Free Research)
This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection. 
(WHITE PAPER) READ ABSTRACT |

The Impact of AJAX on the Network by F5 Networks

March 2007 - (Free Research)
Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies. 
(WHITE PAPER) READ ABSTRACT |

Rich Internet Applications: Design, Measurement, and Management Challenges by Keynote Systems

February 2008 - (Free Research)
This white paper details the evolution of traditional Web pages and applications, discussing the defining attributes of the emerging class of Rich Internet Applications (RIAs). 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

Improving Data Quality Through Data Modeling by CA ERwin from CA Technologies

April 2011 - (Free Research)
Enterprise data is largely falling short of a standard that makes it possible to utilize in how business will be conducted in the next decade. Most enterprise data is “adequate” for basic operational needs today. Download this paper to learn how to get the most out of your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

Augmenting the Value of ERP to Achieve the Perfect Plant by Apriso Corporation

September 2008 - (Free Research)
This paper reviews multiple compelling issues of establishing and maintaining connectivity to manufacturing operations to achieve the Perfect Plant through an existing ERP system. 
(WHITE PAPER) READ ABSTRACT |

3-Step-Migration: Microsoft Office 2003 to Oracle Open Office by Oracle Corporation

January 2011 - (Free Research)
This brief paper is designed to assist IT professionals and system integrators who want to move an organization from Microsoft Office 97/2000/XP/2003 to Oracle Open Office. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Integrating and monitoring business-to-business (B2B) value chains by ComputerWeekly.com

September 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on putting in place an effective, integrated, overall B2B solution. 
(ANALYST REPORT) READ ABSTRACT |

Applying ITIL Best Practice Principles to IPAM by BT Diamond IP

December 2010 - (Free Research)
This white paper will explain how each of the main ITIL areas can be applied specifically to IP address management (IPAM), and the benefits that can be accrued from using this management framework. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 25 February 2014: Banking with dinosaurs – the legacy IT crisis in financial services by ComputerWeekly.com

February 2014 - (Free Research)
In this week's Computer Weekly, we examine the IT problems at high-street banks, and learn how outsourcing led to the loss of key legacy IT skills. We ask what role wearable technology could have in enterprise IT. And we take an in-depth look at the tools for using Microsoft Azure for building hybrid clouds. Read the issue now. 
(EZINE) READ ABSTRACT |

WEALTH MANAGER'S TAKE ON OUTSOURCING by Wipro Technologies

February 2008 - (Free Research)
Wealth managers can ensure success of outsourcing relationships by ensuring a stringent service provider selection program based on service providers' processes, quality standards, cost efficiency and knowledge. 
(WHITE PAPER) READ ABSTRACT |

A SaaS-First Approach to Application Porfolio Management by BMC Software, Inc.

October 2011 - (Free Research)
This white paper discusses the virtues of SaaS for business operations and where the technology is headed. 
(WHITE PAPER) READ ABSTRACT |

Automating Job Card Generation for Maintenance, Repair and Overhaul by Enigma, Inc.

March 2008 - (Free Research)
Manual job card generation processes significantly hamper maintenance efficiency and accuracy for A, B, C, and D checks alike, directly resulting in lost time, errors, and flight delays. 
(WHITE PAPER) READ ABSTRACT |

AirMagnet WiFi Analyzer by AirMagnet

August 2011 - (Free Research)
AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities. 
(TRIAL SOFTWARE) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

Foundational Focus: OSI Model - Breaking Down the 7 Layers by Global Knowledge

April 2013 - (Free Research)
The OSI model is a conceptual tool used to discuss and describe network functions. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts