Case Concept OfWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Case Concept Of returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Business Intelligence Solutions
 •   Storage Management
 •   Data Center Management
 •   Data Security
 •   Business Process Management (BPM)
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Business Planning
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Network Management

Related Searches
 •   Basic Case Concept Of
 •   Case Advantages
 •   Case Concept Of Publishing
 •   Case Firms
 •   Case On-Line
 •   Case Vendor
 •   Industries Case Concept
 •   Network Case
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc.

March 2008 - (Free Research)
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits and limitations of these technologies as well as the best use cases for each... 
(ANALYST REPORT) READ ABSTRACT |

Dispelling the Myths of IBM i Data Access by SEQUEL-Software

July 2010 - (Free Research)
Accessing data in a format that is usable for each type of user is often referred to as Business Intelligence, or BI. When done correctly, BI can be a powerful force in an organization. Unfortunately, that’s not often the case. Part of the problem is the many myths surrounding BI and its basic concepts. 
(WHITE PAPER) READ ABSTRACT |

PeopleSoft Testing by Hexaware Technologies

May 2008 - (Free Research)
The PeopleSoft Testing Accelerator Kit reduces the overhead of traceability and brings in the concept of reusability. 
(WHITE PAPER) READ ABSTRACT |

Closed Loop Lifecycle Planning: Optimizing for Energy Efficiency in the Upcoming Technology Refresh Cycle by Hewlett-Packard Company

January 2008 - (Free Research)
This paper encourages all businesses to consider a more formal "green" strategy in regards to client computing and the technology refresh cycle. The timing could not be better. There is also a business case to be made that the 'business as usual' environment could view the "green" initiative as a compelling event unto itself. 
(WHITE PAPER) READ ABSTRACT |

CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam by Global Knowledge

October 2008 - (Free Research)
This paper helps students understand the types of information required to pass the new 640-802 CCNA composite exam by providing a convenient review of the exam's critical concepts. 
(WHITE PAPER) READ ABSTRACT |

Cisco Telepresence Zones by Global Knowledge

April 2013 - (Free Research)
The concept of zones in Cisco TelePresence products is confusing to many people; but this white paper should clear up some of the confusion. 
(WHITE PAPER) READ ABSTRACT |

Storage Magazine Online November 2012 – Storage Salary Survey Results Revealed by SearchStorage.com

November 2012 - (Free Research)
In the November 2012 Storage Magazine, find the results of this year’s annual Storage Salary Survey and find expert articles from Rich Castagna, Jon Toigo, Terri McClure and others addressing BYOD, storage clouds, LTFS, NAS upgrades and much more. 
(EZINE) READ ABSTRACT |

TrendLabs: Global Threat Trends 1H 2010 by Trend Micro, Inc.

October 2010 - (Free Research)
In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world. 
(WHITE PAPER) READ ABSTRACT |

Beyond Business as Usual: The Mega Shift Toward Social Communications by IBM

October 2012 - (Free Research)
Discover how integrating social software with communications is transforming the modern workplace, maximizing the potential of human capital, and generating value for businesses worldwide. 
(WHITE PAPER) READ ABSTRACT |

Closed Loop Lifecycle Planning©: Optimizing for Energy Efficiency in the Upcoming Technology Refresh Cycle by Hewlett-Packard Company

October 2008 - (Free Research)
This paper encourages all businesses, regardless of size and complexities, to consider a more formal "green" strategy in regards to client computing and the technology refresh cycle. 
(WHITE PAPER) READ ABSTRACT |

Leveraging the Power of the Peloton to Lead Change by Global Knowledge

July 2013 - (Free Research)
This white paper combines the concept of the peloton with one of the most widely accepted approaches for enabling change in organizations: John P. Kotter's 8 Steps for Enabling Change. 
(WHITE PAPER) READ ABSTRACT |

Concept Becomes Reality with Quest by Dell Software

August 2010 - (Free Research)
In this Quest Software white paper by the Enterprise Strategy Group, learn more about the benefits of moving to a virtual desktop environment – and how choosing the right tool for the job makes it easy. Find out about a solution that not only makes implementing virtualization easy, but keeps cost low and uptime and efficiency high while doing so. 
(WHITE PAPER) READ ABSTRACT |

Continuous Customer Dialogues by Infor

November 2010 - (Free Research)
The need for customer insight and responsiveness to that insight is the foundation and driving rationale for the emerging CRM concept of continuous customer dialogue through multi-channel touchpoints. This concept is discussed further in the rest of this whitepaper. 
(WHITE PAPER) READ ABSTRACT |

Journal of Management Excellence: Creating Value, Part II by Oracle Corporation

May 2009 - (Free Research)
This collection of journal articles is focused on the concept of creating value and its importance as the key element for enterprise performance management (EPM). 
(JOURNAL ARTICLE) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

CW+ Open Group: The Open Group Architecture Framework (TOGAF™ 9) and the US Department of Defense Architecture Framework by ComputerWeekly.com

October 2010 - (Free Research)
Numerous architecture framework standards have been developed and matured over the past decade and the focus of these frameworks is diverse. Many engineers believe there is an ―either or‖ decision to be made regarding these frameworks; however, this is not always the case. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Data Warehousing Basics for SQL Server Analysis Services by Flowerfire, Inc.

November 2009 - (Free Research)
In this transcript of the "Data Warehousing Basics for SQL Server Analysis Services" webcast, learn how to build your data warehouse for your SQL Server environment. Discover the necessary steps involved and learn about major concepts, including relational data warehousing and supported SQL Server Analysis Services (SSAS) storage formats. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Virtual Private LAN Services: Extending Ethernet over the WAN by Tellabs

October 2008 - (Free Research)
This white paper includes an overview of the technical building blocks of VPLS, including a review of the MPLS features that help enable the creation of secure customer networks within a shared packet infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Using Talent Supply Chain Management to Overcome Challenges in the Professional Services Market by SAP AG

January 2007 - (Free Research)
Discover how implementing an integrated talent supply chain management environment can help professional services providers enhance revenues by improving delivery performance and speeding client response. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

Cisco IBSG Global Research Reveals New Ways for Banks To Prosper in an Omnichannel World by Cisco Systems, Inc.

August 2012 - (Free Research)
Banking customers worldwide are ready for an omnichannel experience – are you ready to give it to them? This resource describes the concept of omnichannel banking, why your customers need it, and why you shouldn't wait to offer it to them. 
(WHITE PAPER) READ ABSTRACT |

Lean Strategies for the Process Manufacturer by Sage Software

December 2009 - (Free Research)
This primer will serve to provide an understanding of the key concepts of Lean as they apply to the process sectors, including the steps for implementation and the benefits that may be realised. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Requirements - The Critical Details That Make or Break a Project by Global Knowledge

December 2008 - (Free Research)
This whitepaper will discuss the various kinds of information technology requirements, their importance, the different requirement types, the concept of requirements engineering and the process for gathering requirements. 
(WHITE PAPER) READ ABSTRACT |

Is it possible to have too many tools? by Nimsoft, Inc.

July 2012 - (Free Research)
Many enterprises are oblivious to the fact that they are suffering from IT service management (ITSM) tool overload and the consequences they are suffering because of it. Gain insight from IT guru George Spalding, executive VP at Pink Elephant, on the importance of performing ITSM tool inventory, the concept of "tool governance" and more. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts