Article EventWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Article Event returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Vulnerability Assessment
 •   Disaster Recovery
 •   Data Center Management
 •   Application Security
 •   Security Policies
 •   Backup Systems and Services

Related Searches
 •   Article Event Online
 •   Article Event Open
 •   Article Whitepaper
 •   Flow Article Event
 •   Full Article Event
 •   Hr Article Event
 •   Improvement Article
 •   Learning About Article Event
 •   Open Article
 •   Webinars Article Event
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

CW Europe - November Edition by ComputerWeekly.com

November 01, 2012 - (Free Research)
The November 2012 edition of CWEurope focuses on what should always be one of your top IT priorities: Disaster recovery. Without a plan B, you risk the continuance of your business in the event of a natural disaster, hardware malfunction, human error or digital threat. It's disaster recovery or disaster devastation - the choice is up to you. 
(EZINE) READ ABSTRACT |

BPM and event processing for competitive advantage by IBM

November 01, 2011 - (Free Research)
A successful business process management (BPM) initiative can serve as a competitive differentiator. This 2-article e-guide will explore expert tips and analyst approaches for organizations considering a BPM initiative. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by Information Security Magazine

June 10, 2009 - (Free Research)
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more. 
(EZINE)

Panic Slowly: Integrated Disaster Response and Built-In Continuity by IBM

September 04, 2006 - (Free Research)
This article highlights disaster preparedness plans to help reduce risk and minimize the damage to your business in the event of an emergency. 
(WHITE PAPER) READ ABSTRACT |

CIO Thought Leadership: The Sum of all brands by ComputerWeekly.com

March 18, 2014 - (Free Research)
This article by Ade McCormack looks at the impact customer-centricity has on organisations. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Survive the Scrutiny of Litigation:Rediscover Records Management by Iron Mountain

August 27, 2012 - (Free Research)
Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management. 
(EBOOK) READ ABSTRACT |

Information Security Emagazine: Best Practices for the Evolving Threat Landscape by Hewlett-Packard Limited

December 02, 2013 - (Free Research)
In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats. 
(WHITE PAPER) READ ABSTRACT |

Global Threat Trends: October 2010 by ESET

November 10, 2010 - (Free Research)
Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more! 
(WHITE PAPER) READ ABSTRACT |

Global Threat Report: July 2010 by ESET

August 13, 2010 - (Free Research)
Read this paper to get a full analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month with almost 12.47% of the total was scored by the Win32/Conficker class of threat. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 09, 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

Beyond Backup Ezine: Disaster Recovery Strategies for Branch Offices by CIO Decisions

July 09, 2009 - (Free Research)
The July/August issue of CIO Decisions Ezine focuses on disaster recovery in remote and branch offices, especially in midmarket organizations. Read this issue to learn some great tips and techniques for increasing your remote workers' ability to bounce back after an unfortunate event. 
(EZINE)

Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? by Information Security Magazine

April 20, 2009 - (Free Research)
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology. 
(EZINE)

Virtual Data Center E-Zine - Volume 28: Achieving the Right Level of Consolidation in a Virtual Data Center by SearchDataCenter.com

November 09, 2010 - (Free Research)
Virtualization allows organizations to consolidate servers, reduce costs and increase efficiency. But too much of anything is rarely good. In this issue, the downsides of excessive consolidation and strategies for striking the right balance to improve computing efficiency are explained. Plus, how to improve server performance and consolidation. 
(EZINE)

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 22, 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 11, 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

Developing HTML5 Applications for AppUp: Part 1 A Simple Example by Intel

December 2011 - (Free Research)
This is the first in a series of articles covering how to develop HTML5 applications for Intel AppUp. This first article will cover the basics of getting a minimal application packaged using the Encapsulator tool. Later articles will describe some larger example applications that illustrate different features of HTML5. 
(TRAINING GUIDE)

The Essentials Series: Security Information Management by SecureWorks

October 2009 - (Free Research)
This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation. 
(WHITE PAPER) READ ABSTRACT |

Gartner: How to build an online community by ComputerWeekly.com

February 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

Harvard Business Review Article: Mastering the Management System by SAP America, Inc.

September 2011 - (Free Research)
In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system, which comprises five stages. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts