Cases MethodWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Cases Method returned the following results.
RSS What is RSS?
Related Categories

 •   Application Lifecycle Management(ALM)
 •   Security Policies
 •   Business Intelligence Solutions
 •   Mobile Device Management
 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Enterprise Resource Planning (ERP)
 •   Access Control
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Cases Manager
 •   Cases Method Projects
 •   Cases Rfi
 •   Contracts Cases Method
 •   Device Cases
 •   Faq Cases Method
 •   Guides Cases Method
 •   Implementation Cases Method
 •   Licenses Cases Method
 •   Methods Cases Method
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

IT Courseware by SkillSoft Corporation

SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes. 
(ASP & SOFTWARE PRODUCT)

Building Your Business Case for Managed File Transfer by OpenText

November 11, 2011 - (Free Research)
The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Are 'strong authentication' methods strong enough for compliance? by Entrust, Inc.

September 26, 2011 - (Free Research)
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance. 
(EGUIDE) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 10, 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises by Global Knowledge

October 2008 - (Free Research)
This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Air-Cooled High-Performance Data Centers: Case Studies and Best Methods by Intel Corporation

November 2006 - (Free Research)
Combining innovations and best-known methods for air-cooled data center design helps provide new approaches for power and cooling. This white paper discusses real world examples of how to lower costs and improve performance within the IT infras... 
(WHITE PAPER)

E-Book: Unix-to-Linux Migration: A step-by-step approach for data center managers that covers everything from making the business case to getting the best training by Red Hat & IBM

December 2010 - (Free Research)
When migrating from  Unix to Linux, the most important case you will need to make is not a technical case but a business case. It’s all about the bottom line. How will the business benefit by moving over? What is the total cost of ownership and return on investment for the migration? Read on to learn more! 
(EBOOK)

Advanced Case Management: Empower the Knowledge Worker by IBM

April 2014 - (Free Research)
The following white paper explores the importance of advance case management (ACM)) solutions. See how when properly implemented ACM can achieve superior results in staff utilization and quality of service levels by empowering employees with relevant and timely knowledge. 
(WHITE PAPER) READ ABSTRACT |

Beaufort Memorial Case Study by Imprivata

February 2014 - (Free Research)
This case study highlights Beaufort Memorial Hospital's success in implementing a secure communications platform that allowed a more efficient, secure, and cost-effective clinician workflow. 
(WHITE PAPER) READ ABSTRACT |

Case Study: New capabilities of and applications for SIP Solutions by XO Communications

January 2014 - (Free Research)
This exclusive case study discusses how a multi-location auction company utilized an SIP solution that enabled them to capitalize on their investments in data and voice communications and maximize the performance of their IP. 
(CASE STUDY) READ ABSTRACT |

Case Study: Hospital Sees BlackBerry Smartphones as a Way to Improve Patient Care and save Lives by BlackBerry

November 2007 - (Free Research)
This case study describes why Trillium Health Centre gave 40 BlackBerry smartphones to all of the members of the ICU team making it the first hospital in North America to test push email as an essential part of how the health care team worked together. 
(CASE STUDY) READ ABSTRACT |

Securing Sensitive Information: An Examination of Information Security Issues, Methods and Securing Data With LTO-4 Tape Drive Encryption by Hewlett-Packard Company

July 2009 - (Free Research)
Each month many companies, big or small, well known or unknown, experience a data security loss with the potential exposure of thousands to millions of sensitive customer or employee records. This brief examines cryptographic methods, specifically tape data encryption, to combat such security losses. 
(ANALYST BRIEF) READ ABSTRACT |

Thomas & King Case Study: The Right Ingredients for Software Asset Management by Dell, Inc. and Intel®

October 2008 - (Free Research)
Read this Dell case study to learn how a restaurant franchisee gets its IT cooking with the right reporting from Dell Software Inventory & Usage Management. 
(CASE STUDY) READ ABSTRACT |

Case Study: Level 3 Communications - Going Agile at Scale by Rally Software

June 2013 - (Free Research)
You might think agile development is only for small organizations - but that isn't necessarily true. In this case study, discover how Level 3 was able to overcome the difficulties of a segmented office space and multiple development projects to successfully implement Agile throughout the entire organization. 
(CASE STUDY) READ ABSTRACT |

Expert Overview: Replication Use Cases and Implementation Techniques by EMC Corporation

October 2013 - (Free Research)
This e-guide discusses how replication fits into remote site data protection and reveals the pros and cons of host and array-based techniques. Find out whether replication can be used as a backup replacement and why real-time requirements should be factored into your selection of a synchronous or asynchronous method. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Case Study: Consolidated Communications Holdings, Inc. by IBM

November 2013 - (Free Research)
View this case study to find out how Consolidated Communications Holdings, Inc. leveraged an analytics software to analyze 80,000 network statistics in near-real time, eliminating the manual thresholds of their previous strategy. 
(CASE STUDY) READ ABSTRACT |

Sun World International: A case study in smarter planet leadership by IBM

May 2012 - (Free Research)
This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre. 
(CASE STUDY) READ ABSTRACT |

Air-Cooled High-Performance Data Centers: Case Studies and Best Methods. by Intel Corporation

August 2008 - (Free Research)
Designing an air-cooled data center has been challending and costly for many businesses. Read this white paper to learn how Intel Corporation achieved breakthrough power and heat densities of 15 kW per cabinet and more than 500 watts per square foot of server room area.</p> 
(WHITE PAPER)

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

Building Your Business Case for Managed File Transfer by OpenText

October 2013 - (Free Research)
This whitepaper details the benefits of managed file transfers and how to build an effective business case for implementation. 
(WHITE PAPER) READ ABSTRACT |

Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones by BlackBerry

September 2011 - (Free Research)
Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption. 
(CASE STUDY) READ ABSTRACT |

Mobile payment technology - a buyer's guide by ComputerWeekly.com

November 2010 - (Free Research)
The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.” 
(WHITE PAPER) READ ABSTRACT |

CW+: Mobile payments market opportunities for business by ComputerWeekly.com

December 2010 - (Free Research)
The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.” 
(WHITE PAPER) READ ABSTRACT |

LaRue County High School is Improving Student Engagement and Teacher Satisfaction by Dell, Inc.

December 2011 - (Free Research)
Read this case study to learn why LaRue County High School in Kentucky deployed a Dell Latitude netbook running Windows 7 to each of its 760 students and was aided by Dell Professional Learning Services, which helped the teachers bring to life a 21st-century learning environment that integrated netbooks into the curriculum on a daily basis. 
(CASE STUDY) READ ABSTRACT |

Object Persistence and Agile Software Development by Versant Corp.

December 2009 - (Free Research)
Agile Software Development is one of the most effective methodologies to develop application software. This paper examines and compares RDBMS with several object persistence methods within the context of Agile Software Development by quantifying the impact of these methods on the velocity and success of an agile application development project. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts