Buys IssuesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Buys Issues returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Storage Management
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Enterprise Systems Management
 •   Technology Planning and Analysis
 •   Customer Relationship Management (CRM)
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Batch Buys
 •   Budget Buys Issues
 •   Buys Issues Demand
 •   Buys Issues History
 •   Buys Patent
 •   Buys Tennessee
 •   Functions Buys Issues
 •   Issues With Buys
 •   Making Buys Issues
 •   Pro Buys Issues
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Computer Weekly 4 October 2011: Download the latest issue of the UK's leading technology publication, with our analysis of the business technology news that matters to IT managers by ComputerWeekly.com

October 04, 2011 - (Free Research)
In this week's Computer Weekly, transformation. Download the new issue now. 
(EZINE)

Presentation Transcript: Making Time for Endpoint Security by BigFix

November 29, 2010 - (Free Research)
This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Brian Madden on Desktop Virtualization User Trends in 2013 by TechTarget

February 05, 2014 - (Free Research)
If virtual desktops don't increase the overall security of your environment and moving a desktop to the data center is hard, then why is it positioned as a remedy for many of todays' endpoint issues? Complete this short survey to receive exclusive access to Brain Madden's analysis and observations of current end user trends in desktop delivery. 
(RESOURCE)

Computer Weekly – 11 March 2014: Making data flow freely by ComputerWeekly.com

March 11, 2014 - (Free Research)
In this week's Computer Weekly, our latest buyer's guide looks at open data and how it can improve public services – and even help prevent a repeat of the recent floods. We report from Cloud Expo on the reasons why public cloud is yet to be embraced by enterprise IT. And we look at the key issues for buying HR software in 2014. Read the issue now. 
(EZINE) READ ABSTRACT |

About to Buy Guide: Building a Business Case for DR by SearchCIO.com

March 05, 2013 - (Free Research)
Are you a CIO looking to justify your DR project to upper management? This Q&A with Paul Kirvan, a consultant with more than 20 years of experience in business continuity management, will give you a perspective on the overall issue of DR and why your organization should implement a documented backup plan. 
(EGUIDE) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 15: Staying Compliant in a Virtual World by SearchDataCenter.com

October 06, 2009 - (Free Research)
In this month's issue, learn how to keep compliance a priority in a virtualized environment. Also in this issue, get advice on how to buy hardware for virtual systems, and take a closer look at your storage needs. 
(EZINE)

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine

July 13, 2009 - (Free Research)
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more. 
(EZINE)

Adapt your technology, services, and organization to cloud: HP Converged Cloud Workshop by HP & Intel®

May 31, 2012 - (Free Research)
This paper introduces the HP Converged Cloud Workshop, which helps you gain clarity on your cloud strategy, identify the cloud initiatives that can work for your business, and create a roadmap that defines your steps forward. Read on to better understand the cloud computing model and how it fits in with traditional IT solution sourcing. 
(WHITE PAPER) READ ABSTRACT |

Big Data Buying Decisions Call for Open Eyes and Minds by SearchBusinessAnalytics

February 27, 2014 - (Free Research)
Organizations are wising up to the business benefits of big data initiatives. In doing so, they have realized that business acumen is the cure for ailing big data plans. 
(EBOOK) READ ABSTRACT |

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 27, 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

Information Security Magazine - February 2013 by SearchSecurity.com

February 01, 2013 - (Free Research)
In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more. 
(EZINE) READ ABSTRACT |

Database Archiving Software by Storage Magazine

October 01, 2006 - (Free Research)
Are bloated data stores slowing down your database applications? Database archivers can trim the fat, improve performance and protect historical data. 
(JOURNAL ARTICLE)

Managing Network Bandwidth to Maximize Network Performance by Fluke Networks

August 2007 - (Free Research)
This white paper describes how to leverage best practices to monitor, baseline, and manage the network bandwidth and performance. It also highlights how to identify and eliminate issues such as unwanted traffic, unwanted protocols, and network problems with factory default switch configurations. 
(WHITE PAPER) READ ABSTRACT |

Managing Network Bandwidth to Maximize Performance by Fluke Networks

October 2010 - (Free Research)
This white paper describes how to leverage best practices to monitor, baseline, and manage the network bandwidth and performance. It also highlights how to identify and eliminate issues such as unwanted traffic, unwanted protocols, and network problems with factory default switch configurations. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

Essential Guide: Configuring Storage for Big Data Applications by EMC Isilon

January 2013 - (Free Research)
Check out this latest issue of Storage Magazine to for a comprehensive breakdown of how big data is revolutionizing storage, and the latest developments in leveraging big data for competitive advantage. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Identify And Influence Identity Stakeholders by Ping Identity Corporation

July 2012 - (Free Research)
This report outlines the stakeholder needs of the Identity and Access Management playbook, breaking down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change. 
(WHITE PAPER) READ ABSTRACT |

Chapter 1: Cloud Risks and Rewards - CIO Strategies for the Cloud by SearchCIO.com

September 2009 - (Free Research)
Some pundits foresee a future in which all data center computing is done in the "cloud," but that future is a long way off. Most organizations have just begun to venture into the cloud. Many others remain skeptical because of security and quality-of-service concerns. Read this ebook to learn what CIOs can to do now to prep their own environments. 
(EBOOK) READ ABSTRACT |

Securing the Organization: Creating a Partnership between HR and Information Security by ISC2

September 2008 - (Free Research)
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization. 
(WHITE PAPER) READ ABSTRACT |

Executive Brief Digital Transformation: Creating New Business Models Where Digital Meets Physical by IBM

November 2011 - (Free Research)
As businesses embrace the digital revolution, they're rethinking what customers value most and creating operating models that take advantage of what’s newly possible for competitive differentiation. This report is designed to provide senior executives with analysis and insight on how fast and how far to go on the path to digital transformation. 
(WHITE PAPER) READ ABSTRACT |

Delivering Storage Quality of Service with Oracle Pillar Axiom 600 by Oracle Corporation UK Ltd

September 2011 - (Free Research)
In this white paper, you will discover an Oracle storage technology designed from the ground up to deliver business-critical, guaranteed quality of service consistent with the business value of the application and its data. 
(WHITE PAPER) READ ABSTRACT |

Channel Strategies E-Zine - December 2010/ No.4 by SearchITChannel.com

December 2010 - (Free Research)
Read how the rise of cloud computing and virtualization is creating new opportunities for the channel in WAN optimization, and find out what skill sets VARs need to target business people who rely on smart phones or iPads on the road. 
(EZINE) READ ABSTRACT |

Intelligent Merchandising: Creating a Unique Shopping Experience, Part 1 by SAP AG

May 2007 - (Free Research)
Learn how you can how you can hook customers with fresh, unusual and relevant shopping experiences. Drive customer loyalty by training, empowering and providing employees with the technical tools to capture the nuances of customer behavior. 
(WHITE PAPER) READ ABSTRACT |

General Backup Purchasing Considerations by Quantum Corporation

December 2008 - (Free Research)
This chapter discusses the process of evaluating and purchasing backup products. Also discussed are the issues to be aware of during this process, such as recovery deadlines, scalability, security, and more. 
(WHITE PAPER) READ ABSTRACT |

Webcast Transcript: 7 Questions You Must Ask Before Buying a VM Protection Product by Quantum Corporation

March 2012 - (Free Research)
Check out this presentation transcript for 7 key questions to ask yourself before buying a VM protection product. These questions will not only help you ensure you’re buying a product that works, but buying a product that will optimise your virtual data protection without requiring you to redesign your data centre. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts