Basic CorporationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Basic Corporation returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Backup Systems and Services
 •   Data Center Management
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Virtualization
 •   Network Management

Related Searches
 •   Basic Calls
 •   Basic Corporation Address
 •   Basic Corporation Definition
 •   Basic Corporation Document
 •   Basic Corporation Time
 •   Basic Manufacturers
 •   Basic Payment
 •   Basic Us
 •   Equipment Basic
 •   Implementation Of Basic Corporation
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Presentation Transcript: Presentation Transcript: EMC Corporation and the Benefits of Network Attached Storage for Small Businesses by EMC Corporation

July 27, 2009 - (Free Research)
The presentation transcript from EMC Corporation features Ashish Nadkarni, Principal Consultant with GlassHouse Technologies, discussing the benefits of Network Attached Storage for Small Businesses. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SOA Architecture & Infrastructure: Working with basic building blocks of SOA infrastructure by Talend

June 08, 2011 - (Free Research)
This E-book reveals how building a SOA infrastructure for the cloud requires a truly service-oriented approach and a thorough understanding of the value of services 
(EBOOK)

Dell Server Solutions - Server Hardware Configuration by Dell, Inc. and Intel®

April 12, 2011 - (Free Research)
All Servers are essentially the same, featuring the same basic hardware. The appearance and performance of the hardware in a particular server is what makes the difference. Learn more about Server Hardware such as Processors, Hard Drives, RAM, RAID, and Network Controller Cards in this video. 
(VIDEO) READ ABSTRACT |

Information security for SMEs by ComputerWeekly.com

May 23, 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Router Essentials by Global Knowledge

October 2008 - (Free Research)
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper. 
(WHITE PAPER) READ ABSTRACT |

Oracle Unbreakable Linux: An Overview by Oracle Corporation

December 2008 - (Free Research)
This white paper reviews support programs that address common problems on three Linux architectures: x86, x86-64, and Linux Itanium. Learn how to execute bug fixes and lower the risk of applying patches. 
(WHITE PAPER) READ ABSTRACT |

Five Calls to Make When Developing a Mobile Learning Strategy by SkillSoft Corporation

June 2011 - (Free Research)
Welcome to the exciting (and confusing) world of mobile learning. What are the five calls to make when developing a mobile learning strategy? Find out in this white paper. 
(WHITE PAPER) READ ABSTRACT |

The Impact of Disk Fragmentation on Servers by Diskeeper Corporation

November 2010 - (Free Research)
This paper examines the impact that disk fragmentation has on servers. Storage servers can experience high levels of disk thrashing caused from excessive file fragmentation. It also examines a series of tests that were conducted and their results to look at common server tasks that are likely to be affected by disk fragmentation. 
(WHITE PAPER) READ ABSTRACT |

SOA and BPM: A Process Centric Approach - Part 1 Background and Basic by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes - discussed here as Service-Oriented Computing (SOC) as a way of gaining a better view on SOA in relation to BPM. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime by ArcSight, an HP Company

December 2010 - (Free Research)
When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft. 
(EGUIDE) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

Expert Overview: New Data Protection Strategies and Success Metrics by EMC Corporation

July 2013 - (Free Research)
This e-guide explores the basic philosophy behind continuous data protection and how it's making its way into the current backup landscape. 
(EGUIDE) READ ABSTRACT |

Symantec 2010 SMB Information Protection Survey by Symantec Corporation

November 2010 - (Free Research)
Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Active Directory Change Reporter Download - 20 Day Evaluation! by Netwrix Corporation

July 2010 - (Free Research)
Download this 20 day evaluation version of the Active Directory Change Reporter.  This download includes both the standard and enterprise editions.  Just select between the Basic (standard) or Full-featured (Enterprise) modes in the setup wizard or in the Start Menu. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Eaton UPS and Power Management Fundamentals Handbook by Eaton Corporation

March 2013 - (Free Research)
This extraordinary 48-page reference handbook provides rich detail and an easy-to-navigate format to answer all of your questions and concerns from UPS design considerations to power blackout problems. Read on to gain insight from this UPS treasure chest. 
(WHITE PAPER) READ ABSTRACT |

PGP Whole Disk Encryption Workgroup Edition - The full-disk encryption solution for small companies and workgroups by PGP Corporation

February 2010 - (Free Research)
PGP Whole Disk Encryption Workgroup Edition is a comprehensive full-disk protection solution that provides industry-leading encryption for desktops, laptops, and USB devices with simple administration. With PGP Whole Disk Encryption Workgroup Edition, there are no servers or databases to configure and manage. 
(WHITE PAPER) READ ABSTRACT |

Introduction to the IP Multimedia Subsystem (IMS): IMS Basic Concepts and Terminology by F5 Networks

August 2007 - (Free Research)
IMS is a whole new way to deliver multimedia regardless of the device or the access medium. This paper will change the way you relate to an increasingly digital world. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a PeopleSoft Archiving Project: Seven Basic Principles for Archiving PeopleSoft Enterprise Data by IBM

March 2008 - (Free Research)
Only Princeton Softech Optim™ provides proven, full-lifecycle capabilities for archiving and managing PeopleSoft Enterprise application data, with the broadest range of implementation options to ensure your success. 
(WHITE PAPER)

Active Directory Expert Best Practices and Security Tips by Centrify Corporation

December 2012 - (Free Research)
Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more. 
(EGUIDE) READ ABSTRACT |

ESG: Market Landscape Report: Storage Tiering by DataCore Software Corporation

September 2011 - (Free Research)
It's almost impossible to conduct a conversation with a storage vendor without raising the topic of "storage tiering." Along with "virtualisation" and "cloud," it's one of those de rigueur phrases. And, like those other two, storage tiering suffers from an over-exposure that can assume familiarity and understanding where it does not exist. 
(WHITE PAPER) READ ABSTRACT |

Comparing disk-based backup methods by Quantum Corporation

October 2011 - (Free Research)
This SearchStorage.com E-Guide will compare the pros and cons of two disk-based backup methods – disk-as-tape and disk-as-disk - and offer insight into which technique is the correct fit for your organization. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Data Deduplication FAQ by Quantum Corporation

August 2010 - (Free Research)
Join Founder and Lead Analyst of DCIG, Jerome Wendt, as he answers the most common data deduplication questions he’s hearing today – including the technology’s  benefits, dedupe products to watch out for, target dedupe on a virtual tape library and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Deduplication FAQ by Quantum Corporation

August 2010 - (Free Research)
Join Founder and Lead Analyst of DCIG, Jerome Wendt as he answers the most common data deduplication questions he’s hearing today – including the technology’s  benefits, dedupe products to watch out for, target dedupe on a virtual tape library and more. 
(PODCAST) READ ABSTRACT |

Comparing Email Archiving Software with General Archiving Software by Symantec Corporation

November 2012 - (Free Research)
Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts