Articles About ImpactWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Articles About Impact returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Virtualization
 •   Security Policies
 •   Network Management
 •   Network Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Intelligence Solutions
 •   Application Servers
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Articles About Impact Based
 •   Articles About Impact Oklahoma
 •   Articles Regional
 •   Coding Articles About Impact
 •   Form Articles
 •   Full Articles About Impact
 •   Functions Articles About Impact
 •   Prices Articles About
 •   Purchasing Articles About Impact
 •   Seminars Articles About Impact
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 09, 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

WAN Speak Musings – Volume III by ComputerWeekly.com

November 01, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 1 by SearchBusinessAnalytics

January 27, 2012 - (Free Research)
The inaugural issue of BI Trends & Strategies offers sound advice to help you in ensuring your organization is on track to keep up with the rapidly changing landscape of BI and analytics. In this issue, readers will learn about a big data definition and the impact it will have on BI and data warehousing, agile development methodology and more. 
(EZINE)

A Beautiful, Cloudy Forecast: Research shows business potential in cloud-based predictive analytic solutions by Teradata

June 21, 2012 - (Free Research)
<p>Predictive analytics and cloud solutions are changing the way organizations do business. But what about predictive analytics in the cloud? Check out this article by industry expert James Taylor on the concerns and benefits regarding cloud-based predictive analytics and learn about companies that have experienced the impressive results. </p> 
(WHITE PAPER) READ ABSTRACT |

WAN Speak Musings – Volume I by ComputerWeekly.com

May 02, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects by Intermec

March 04, 2009 - (Free Research)
This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers. 
(WHITE PAPER) READ ABSTRACT |

Essential Guide to Threat Management by SearchSecurity.com

March 15, 2011 - (Free Research)
Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time. 
(EGUIDE) READ ABSTRACT |

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Data Deduplication Special Report by NetApp

March 2008 - (Free Research)
Data deduplication is one of the hottest storage topics in storage today. This Special Report highlights how data deduplication products are shaping the marketplace, who the key suppliers are and what you should be aware of when evaluating these products. 
(WHITE PAPER) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

WAN Speak Musings – Volume II by ComputerWeekly.com

July 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

Preparing the Enterprise for a Pandemic by Avaya Inc.

June 2008 - (Free Research)
This article suggests that enterprises need to look externally as much as internally to understand the impact a pandemic might have, and to prepare an appropriate response. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

The Business Impact of Data Security Regulations: Featuring Massachusetts by Sophos, Inc.

November 2009 - (Free Research)
Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance. 
(WHITE PAPER) READ ABSTRACT |

The business impact of data security regulations: Featuring Massachusetts by Sophos, Inc.

June 2009 - (Free Research)
This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken. 
(WHITE PAPER) READ ABSTRACT |

An Executive Approach to Strategic HR by TriNet

December 2007 - (Free Research)
This article discusses the key areas of HR that provide strategic impact and therefore merit an executive's time and attention. 
(WHITE PAPER) READ ABSTRACT |

Modern Infrastructure E-Zine Vendor Edition, January 2013 by SearchDataCenter.com

January 2013 - (Free Research)
Access this informative e-zine, Modern Infrastructure, that discusses the future of data center technologies. Read on for helpful articles on the latest data center trends and developments that can help you achieve the benefits of the data centers of tomorrow. 
(EZINE) READ ABSTRACT |

Panic Slowly: Integrated Disaster Response and Built-In Continuity by IBM

September 2006 - (Free Research)
This article highlights disaster preparedness plans to help reduce risk and minimize the damage to your business in the event of an emergency. 
(WHITE PAPER) READ ABSTRACT |

Pushing from Mobile to the Cloud: Enterprise Applications Everywhere by Kony

March 2013 - (Free Research)
Access this exclusive, expert E-Book to explore how mobile development teams finish projects on time and within budget despite today's reduced development cycles and financial resources. Read on to access three articles discussing how cloud-based techs are helping mobile applications development teams. 
(EBOOK) READ ABSTRACT |

eGuide: Blade Servers Trends by Dell, Inc. and Intel®

November 2008 - (Free Research)
The server type selected for a consolidation or virtualization project lays the foundation for the entire plan, it even impacts the benefits you'll see from the investment. 
(WHITE PAPER) READ ABSTRACT |

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Essential Guide to Solid-State Storage Implementation by SearchStorage.com

July 2012 - (Free Research)
Learn about the vast power and potential of solid-state storage in this Essential Guide to SSS implementation. Access five expert-written articles about SSS deployment, its impact, how to harness the most power from it and more! 
(ESSENTIAL GUIDE) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts