Articles UsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Articles Us returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Security Policies
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Network Management
 •   Storage Management
 •   Security Monitoring
 •   Databases
 •   Data Center Management

Related Searches
 •   Active Articles
 •   Articles Practice
 •   Articles Us Graphs
 •   Articles Us Indian
 •   Articles Us Utility
 •   Contracts Articles Us
 •   Demo Articles Us
 •   Manufacturers Articles
 •   Processing Articles Us
 •   Use Articles Us
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to configure Mac OS X Server by ComputerWeekly.com

March 22, 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 09, 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

Secure internet routing by ComputerWeekly.com

April 10, 2014 - (Free Research)
This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Getting Started with LINQ and Entity SQL Queries to Oracle 11g Using the ADO.NET Entity Framework by Progress

July 12, 2010 - (Free Research)
This article explores how easy it is to connect Microsoft Visual Studio to an Oracle 11g server by using the Progress DataDirect Connect for ADO.NET in conjunction with the ADO.NET Entity Framework. This configuration lets you fully exploit the power of Microsoft’s ADO.NET Entity Data Framework when working with Oracle. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Smart cards: security risks by ComputerWeekly.com

April 17, 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Collaborate with Your Business Network in the Cloud by SAP America, Inc.

April 30, 2012 - (Free Research)
This resource discusses cloud-based business applications and the potential benefits to your business. 
(WHITE PAPER) READ ABSTRACT |

How to Bridge the Gap Between Business and Social Apps by ComputerWeekly.com

November 02, 2010 - (Free Research)
The promise of creating value by harnessing collective activities is attracting organisations to technology that connects employees, engages customers and partners inconversation, or boosts their R&D through crowd-sourcing initiatives. 
(WHITE PAPER) READ ABSTRACT |

UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010 by ComputerWeekly.com

June 02, 2010 - (Free Research)
In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010. 
(WHITE PAPER) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 28: Achieving the Right Level of Consolidation in a Virtual Data Center by SearchDataCenter.com

November 09, 2010 - (Free Research)
Virtualization allows organizations to consolidate servers, reduce costs and increase efficiency. But too much of anything is rarely good. In this issue, the downsides of excessive consolidation and strategies for striking the right balance to improve computing efficiency are explained. Plus, how to improve server performance and consolidation. 
(EZINE)

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 22, 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 11, 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Developing HTML5 Applications for AppUp: Part 1 A Simple Example by Intel

December 15, 2011 - (Free Research)
This is the first in a series of articles covering how to develop HTML5 applications for Intel AppUp. This first article will cover the basics of getting a minimal application packaged using the Encapsulator tool. Later articles will describe some larger example applications that illustrate different features of HTML5. 
(TRAINING GUIDE)

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: How to build an online community by ComputerWeekly.com

February 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

Harvard Business Review Article: Mastering the Management System by SAP America, Inc.

September 2011 - (Free Research)
In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system, which comprises five stages. 
(WHITE PAPER) READ ABSTRACT |

Article: Best practices for deploying iSCSI SANs in DSS database solutions by Dell, Inc.

April 2011 - (Free Research)
Scalability and availability are key factors of an effective DSS or DW solution. Adhering to the best practices outlined in this article for integrating Dell EqualLogic PS Series iSCSI SAN arrays into the design can help IT administrators create a scalable high-performance infrastructure. 
(ANALYST NEWS) READ ABSTRACT |

Article: Design Patterns for Case Management by EMC Corporation

August 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts