Basics Of Maintenance ProgramsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Basics Of Maintenance Programs returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Virtualization
 •   Enterprise Systems Management
 •   Desktop Management
 •   Data and Application Distribution
 •   Availability, Performance and Problem Management
 •   Data Center Management
 •   Data Security
 •   Desktops/ Workstations
 •   Operating Systems and Subsystems

Related Searches
 •   Basics Devices
 •   Basics Of Full
 •   Basics Of Maintenance Part
 •   Basics Of Maintenance Security
 •   Basics Of Supplier
 •   Basics Researching
 •   Controls Basics Of
 •   Cycle Basics
 •   Statistics Basics Of Maintenance
 •   What Is Basics Of
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

A Framework for Developing and Evaluating Data Center Maintenance Programs by Schneider Electric

January 18, 2012 - (Free Research)
This white paper discusses the tiered infrastructure maintenance standard (TIMS), a straightforward method for easily evaluating the maturity of O&M programs to align everyone involved in the mission-critical environment. 
(WHITE PAPER) READ ABSTRACT |

Asset Management to Support Product Lifecycle Management (PLM) by IBM

December 07, 2010 - (Free Research)
Many manufacturers are already using Product Lifecycle Management (PLM) technology to design products, test them and automate their production. This same technology can be integrated with Enterprise Asset Management (EAM) solutions, like IBM’s Maximo® Asset Management to manage manufacturing assets involved in production. 
(WHITE PAPER) READ ABSTRACT |

Asset Management to Support Product Lifecycle Management by IBM

October 01, 2009 - (Free Research)
Leading-edge manufacturers are discovering that they can improve production efficiencies and manage MRO expenditures by integrating their Product Lifecycle Management (PLM) with Enterprise Asset Management (EAM) systems. 
(WHITE PAPER)

Networking Basics: What You Need to Know by Cisco Systems, Inc.

October 2008 - (Free Research)
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Endpoint security fundamentals by Sophos, Inc.

June 2009 - (Free Research)
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight. 
(PRESENTATION TRANSCRIPT)

IT Handbook: Windows 8 Migration Station by Dell, Inc. and Intel®

October 2012 - (Free Research)
This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing. 
(EBOOK) READ ABSTRACT |

IT Handbook: Windows 8 Migration Station by Dell, Inc. and Microsoft

October 2012 - (Free Research)
This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing. 
(EBOOK) READ ABSTRACT |

Global lessons in eHealth implementation by ComputerWeekly.com

April 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

PCI Basics: What it Takes to Be Compliant by Tripwire, Inc.

February 2011 - (Free Research)
This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply. 
(WHITE PAPER) READ ABSTRACT |

Change Management Best Practices for the Engineering and Construction Industry by Oracle Corporation

April 2009 - (Free Research)
The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a construction project, and provide a process to effectively manage changes on construction projects. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Endpoint security fundamentals by Sophos, Inc.

June 2009 - (Free Research)
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five Best Practices for Unified Communications by AT&T Corp

October 2009 - (Free Research)
Enterprises can realize value from their UC programs by following some basic practices, such as allowing for sufficient up-front planning, finding the right champion, and establishing cross-functional teams to manage program implementation. This article provides basic guidelines for implementing a successful UC program. Read on to learn more. 
(WHITE PAPER)

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Seven Email Marketing Refreshes by Bronto Software

October 2008 - (Free Research)
This whitepaper will detail seven key points that will help you quickly enhance your email-marketing program. You may also find some low hanging opportunities that you weren't aware you were missing. 
(WHITE PAPER) READ ABSTRACT |

Expert Guide to a Successful Server Virtualization Program by Dell, Inc.

July 2013 - (Free Research)
This expert e-guide covers the essential elements of an effective program for server virtualization, including considerations for collaborating with your organization's networking team, metering power usage and reviewing ongoing progress. 
(EGUIDE) READ ABSTRACT |

Revamping and optimizing your SAP GRC strategy by Security Weaver

November 2010 - (Free Research)
GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy. 
(EBOOK)

6 Key Metrics for Measuring Lean Success by Infor

September 2008 - (Free Research)
This webcast by IndustryWeek discusses the key metrics your company can use to help ensure you accomplish you lean goals. It brings together members of the manufacturing community to discuss strategic and operational initiatives. 
(WEBCAST) READ ABSTRACT |

Server Virtualization Basics: Understanding the Virtualization Market by SearchServerVirtualization

May 2013 - (Free Research)
This expert e-book examines the players in today's virtualization market and the ways in which the market continues to grow and evolve. 
(EBOOK) READ ABSTRACT |

System Grounding and Ground Fault Protection for Data Centers by Square D Critical Power Competency Center

November 2008 - (Free Research)
This paper presents the fundamentals of power system grounding, definitions and requirements of the National Electrical Code with respect to grounding, the need for low voltage ground fault protection and how it is implemented. 
(WHITE PAPER) READ ABSTRACT |

Getting ROI Out of Your ERP system by IFS

February 2012 - (Free Research)
In this e-guide, readers will learn more about the basics of ERP and how to reduce maintenance and support costs for these systems. 
(EGUIDE) READ ABSTRACT |

Cloud Computing: Get to know the basics by Red Hat

January 2012 - (Free Research)
This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy. 
(WHITE PAPER) READ ABSTRACT |

iSCSI SAN eGuide by Dell | EMC

January 2007 - (Free Research)
For many businesses, iSCSI is becoming an attractive SAN option because of its lower cost, easier maintenance and simpler management over Fibre Channel. This guide from SearchStorage.com provides a detailed overview of iSCSI, tips for deplo... 
(WHITE PAPER) READ ABSTRACT |

Identity Access Management for Windows Environments by Centrify Corporation

February 2013 - (Free Research)
In this e-guide learn about new tools that are expanding identity access management beyond the corporate firewall to help you better manage mobile device and cloud apps as well as some Windows networking identity basics to integrate Windows desktops and Linux servers into Active Directory. 
(EGUIDE) READ ABSTRACT |

The Desktop Transformation Project Virtual Desktops – Demystified by Matrix42

June 2011 - (Free Research)
Desktop virtualization has become a viable and cost justifiable alternative to the standard, physical laptop/desktop system. Review this white paper and learn the technical basics of this initiative along with the expected benefits this environment can bring to your organization. 
(WHITE PAPER) READ ABSTRACT |

Application security testing: Protecting your application and data by IBM

November 2011 - (Free Research)
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns. 
(EBOOK)

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts