Articles DeliveryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Articles Delivery returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Content Delivery Networks/ Web Application Acceleration
 •   Data Security
 •   Network Management
 •   Data Center Management
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Application Servers
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Networks

Related Searches
 •   Articles Delivery Measurement
 •   Articles Delivery Purchase
 •   Articles Statements
 •   Employee Articles Delivery
 •   Graph Articles
 •   Lists Articles Delivery
 •   Manufacturers Articles
 •   Program Articles Delivery
 •   Public Articles Delivery
 •   Remote Articles Delivery
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

An Agile Approach to "Metrics": Applied Macromeasurements to Ensure On-Time Delivery by CollabNet

January 2011 - (Free Research)
This article challenges the value of traditional metrics for managing product development schedules and presents an alternative compatible with Agile approaches such as Scrum and XP. It is written for development managers or Scrum Product Owners who want to make decisions based on empirically derived schedule forecasts instead of shots in the dark. 
(WHITE PAPER) READ ABSTRACT |

Tech Guide: Desktop Virtualization and the Network by Dell, Inc.

February 2012 - (Free Research)
Discover the impact desktop virtualization and virtual desktop infrastructure have on your network. 
(EGUIDE) READ ABSTRACT |

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

Virtual Data Center eZine - Volume 3 by Virtual Data Center eZine - Volume 3

June 2008 - (Free Research)
This third issue of the Virtual Data Center e-zine sifts through the maze of products and technologies that make up VMware's virtualization ecosystem. It then takes a comprehensive look at the new world of virtual desktop delivery and management 
(WHITE PAPER) READ ABSTRACT |

Governance of IT, an executive guide to ISO/IEC 38500 by ComputerWeekly.com

December 2013 - (Free Research)
This extract from the book: Governance of IT, an executive guide to ISO/IEC 38500, tells you the key things you need to consider before you start a project implementation. 
(BOOK) READ ABSTRACT |

SAP Managed Services Survey Findings by ComputerWeekly.com

July 2010 - (Free Research)
During Q2, 2010 The Birchman Group carried out a survey focused on SAP support and managed services. 
(WHITE PAPER) READ ABSTRACT |

CW+: Cloud computing - look before you leap by ComputerWeekly.com

October 2010 - (Free Research)
Over the past 18 months we have seen the irresistible rise of a new phenomenon, cloud computing. This term is given by the IT industry to a new business model for computing, one where capacity for computer, storage and networking can be dynamically acquired, on demand,and paid for according to usage. 
(WHITE PAPER) READ ABSTRACT |

Tech Guide: Building and Optimizing Private Clouds by Dell, Inc. and Intel®

July 2012 - (Free Research)
This Tech Guide from SearchNetworking.com explores the ins and outs of building and optimizing the private clouds.  In three articles, learn about application performance, top challenges you may encounter, and an overview of cloud computing architecture. 
(EGUIDE) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 3: Using WebSphere CloudBurst to Create Private Clouds by IBM

September 2010 - (Free Research)
Read this article to get an introduction to WebSphere CloudBurst and WebSphere Application Server Hypervisor Edition and discover how these new offerings bring the significant advantages of private cloud computing to WebSphere enterprise environments. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 2: WebSphere sMash and DB2 Express-C on the Amazon EC2 Public Cloud by IBM

September 2010 - (Free Research)
Read this article to see how IBM WebSphere sMash and IBM DB2 Express-C Amazon Machine Images can be combined to help you deliver Web applications hosted on the Amazon Elastic Compute Cloud (EC2) infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Network Evolution: Building the Infrastructure to Enable the Changing Face of IT by OnX USA LLC

April 2012 - (Free Research)
This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets. 
(EZINE) READ ABSTRACT |

TechGuide: Applying Virtualization Networking in the Cloud by Dell, Inc.

March 2012 - (Free Research)
This Tech Guide from SearchNetworking.com explores emerging network virtualization protocols and strategies, and uncovers the need for software-defined networking in cloud environments. 
(EGUIDE) READ ABSTRACT |

E-Guide: 10 Gb Ethernet: Evaluating When and Why to Upgrade by Dell, Inc.

February 2012 - (Free Research)
In this E-Guide from SearchNetworking.com, learn more about upgrading to 10 Gigabit Ethernet, and also uncover many of the common misconceptions regarding this technology. 
(EGUIDE) READ ABSTRACT |

The future of software development: The LateRooms Group by ComputerWeekly.com

July 2012 - (Free Research)
David Heath, head of software engineering at the LateRooms Group, gives his views on the future of software development, in this presentation for Computer Weekly's 500 Club. 
(IT BRIEFING) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 28: Achieving the Right Level of Consolidation in a Virtual Data Center by SearchDataCenter.com

November 2010 - (Free Research)
Virtualization allows organizations to consolidate servers, reduce costs and increase efficiency. But too much of anything is rarely good. In this issue, the downsides of excessive consolidation and strategies for striking the right balance to improve computing efficiency are explained. Plus, how to improve server performance and consolidation. 
(EZINE)

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Negotiating cloud contracts by ComputerWeekly.com

January 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

Developing HTML5 Applications for AppUp: Part 1 A Simple Example by Intel

December 2011 - (Free Research)
This is the first in a series of articles covering how to develop HTML5 applications for Intel AppUp. This first article will cover the basics of getting a minimal application packaged using the Encapsulator tool. Later articles will describe some larger example applications that illustrate different features of HTML5. 
(TRAINING GUIDE)

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Gartner: How to build an online community by ComputerWeekly.com

February 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts