Canadian Service HomelandWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Canadian Service Homeland returned the following results.
RSS What is RSS?
Related Categories

 •   Homeland Security
 •   Data Security
 •   Security Policies
 •   Network Security
 •   Security Monitoring
 •   Data Center Management
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Vulnerability Assessment

Related Searches
 •   Canadian Advantages
 •   Canadian Service Digital
 •   Canadian Service Homeland Arizona
 •   Canadian Service Homeland Open
 •   Canadian Service Homeland Schedules
 •   Canadian Service Monitor
 •   Cases Canadian
 •   Contact Canadian Service
 •   Tutorial Canadian Service Homeland
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

MapXTreme Java Edition Data Sheet by Pitney Bowes Business Insight

January 01, 2007 - (Free Research)
MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet. 
(DATA SHEET) READ ABSTRACT |

Edmonton Catholic Schools: Catholic school district supports 21st century learning with HP Converged Infrastructure by HP & Intel®

December 31, 2012 - (Free Research)
This brief case study introduces one Canadian school district that offers publicly funded Catholic education to over 34,600 students at 88 schools – deploying a compact, virtualized, high-performance server and storage infrastructure to provide increased capacity and maximum flexibility and to ensure redundancy. 
(CASE STUDY) READ ABSTRACT |

Canadian Airport Reaps the Benefits of Truly Unified Communications by Hewlett-Packard Company

June 2007 - (Free Research)
In this case study learn how Halifax International Airport Authority, one of Canada's largest airports, developed and integrated a unified communications solution that created flexibility and efficiency for how their terminal space is utili... 
(WHITE PAPER) READ ABSTRACT |

Railroad Carrier Virtualizes SAP on Converged Infrastructure by VCE (E-mail this company)

December 2013 - (Free Research)
In order to realize cost savings and operation efficiencies, rail carrier Canadian Pacific (CP) wanted to move from inefficient outsourced IT services to a private cloud implementation. This brief case study illustrates how CP leveraged a converged infrastructure to virtualize its extensive suite of SAP and other business-critical applications. 
(CASE STUDY) READ ABSTRACT |

ICBC Builds Cutting-edge Contact Center as Part of their Customer-Centric Strategy by Genesys

December 2012 - (Free Research)
This case study reveals how Canadian insurer ICBC built a flexible, cutting-edge contact center as a key part of its customer-centric strategy, enabling the company to improve routing flexibility, increase customer satisfaction, and more. 
(CASE STUDY) READ ABSTRACT |

Case Study: Helping AIC Cut Daily Backup Window While Saving Money & Staff Time by Quantum Corporation

April 2009 - (Free Research)
Read this customer case study to see how Canadian mutual fund company AIC Ltd. leveraged Quantum's DXi™5500 disk backup solution featuring data deduplication and replication technology in order to drastically reduce backup time as well as cut storage costs and management. 
(CASE STUDY) READ ABSTRACT |

Case Study: London Life Insurance by Pitney Bowes Business Insight

July 2010 - (Free Research)
London Life Insurance needed to move quickly after it acquired Prudential Insurance’s entire Canadian business operations. London Life wanted to welcome its new client base and maintain its reputation for providing superb customer service. Read on to learn how a new document composition solution allowed for keeping pace with its expanding business. 
(CASE STUDY) READ ABSTRACT |

Unified Storage: Capacity Optimization Features andVirtualization Capabilities by IBM

October 2013 - (Free Research)
View this short video to learn how the largest Canadian-based provider of human resources consulting and outsourcing services upgraded and modernized its storage infrastructure using virtualized software defined storage systems designed to consolidate workloads into a single storage system for simplicity of management. 
(WEBCAST) READ ABSTRACT |

Alpha Exchange Improve Performance, Reduces Cost by Migrating to Red Hat Enteprise Linux by Red Hat and HP

April 2013 - (Free Research)
This informative case study describes how a leading Canadian financial group was able to increase performance and reduce costs by migrating to a Linux environment. 
(WHITE PAPER) READ ABSTRACT |

Leading Insurance, Financial and Banking Services Provider Replaces Citrix with Ericom's Server Based Computing Solution by Ericom Software

May 2008 - (Free Research)
Western Financial group was facing a challenge to provide insurance brokers with remote access from the organization's core insurance application running on Windows terminal Servers, so to overcome this issue they moved on to Ericom. 
(WHITE PAPER) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Canucks Sports & Entertainment wins at the storage expansion game by IBM

June 2012 - (Free Research)
This brief case study explores the challenges of unprecedented digital media data growth that a Vancouver, British Columbia, Canada sports & entertainment organization experienced and the implementation of a comprehensive storage solution to alleviate IT headaches. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: Migration from Microsoft Exchange 2007 to Google Apps by Google

March 2010 - (Free Research)
Read this presentation transcript to learn about Delta Hotels and Resorts unique cloud computing strategy encompassing Google Apps and other community-building tools. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

Reduce Fraud, Waste and Abuse with Flexible Analytics by SAP America, Inc.

June 2012 - (Free Research)
This paper examines how SAP's latest analytics solutions can analyze multiple databases in real-time to identify and prevent improper government payments before they happen. Read on to learn how government agencies can leverage this technology to speed up the process of accessing multiple data sources, reduce the burden on IT staff and much more. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Migration from Microsoft Exchange 2007 to Google Apps by Google Apps

January 2011 - (Free Research)
Read this presentation transcript to learn about Delta Hotels and Resorts unique cloud computing strategy encompassing Google Apps and other community-building tools 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Migration from Microsoft Exchange 2007 to Google Apps by Google Apps

November 2010 - (Free Research)
Read this presentation transcript to learn about Delta Hotels and Resorts unique cloud computing strategy encompassing Google Apps and other community-building tools 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

TrendLabs: Global Threat Trends 1H 2010 by Trend Micro, Inc.

October 2010 - (Free Research)
In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world. 
(WHITE PAPER) READ ABSTRACT |

Taking the fear out of bringing Government Systems online by IBM

July 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Securing the Next-Generation Data Center by McAfee, Inc.

August 2011 - (Free Research)
Because today’s data centers must be optimally available, flexible, resilient, and secure, the traditional approach to adding security after the fact compromises their primary intent: robust and uninterrupted service delivery. This brief explores the need to build security in the design phase for maximum flexibility and advanced threat mitigation. 
(WHITE PAPER) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

Virtual Criminology Report Cybercrime versus Cyberlaw by McAfee, Inc.

December 2008 - (Free Research)
Global cybercrime has a significant impact on businesses and consumers across the globe. Read this whitepaper for a discussion on the extent to which cyberlaw is keeping up with the crimes being committed, and bring to justice the perpetrators of c... 
(WHITE PAPER) READ ABSTRACT |

A Hack Attack: Six Steps to Recovery by Cisco Systems, Inc.

January 2011 - (Free Research)
It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts