Client-Server Control Over InternetWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Client-Server Control Over Internet returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Network Management
 •   Data Security
 •   Telephony/ CTI/ VOIP
 •   WAN/ LAN Solutions
 •   Content Delivery Networks/ Web Application Acceleration
 •   Access Control
 •   Unified Communications / Voice & Data Convergence
 •   Wireless Security
 •   Application Security

Related Searches
 •   Capacities Client-Server
 •   Client-Server Change
 •   Client-Server Contacts
 •   Client-Server Control Capacities
 •   Client-Server Control Order
 •   Client-Server Control Over Accounts
 •   Client-Server Control Over Training
 •   Infrastructure Client-Server Control
 •   Mapping Client-Server
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Implementing a Secure Wireless Network in an Educational Setting by NETGEAR Inc.

October 11, 2010 - (Free Research)
Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more.  
(WHITE PAPER) READ ABSTRACT |

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

EMA Whitepaper: Enabling Single Sign-On from Desktop to Cloud for the Extended Enterprise by Oracle Corporation

January 2011 - (Free Research)
IT security teams have the challenge of ensuring security while streamlining access to a variety of resources. Learn how Enterprise Single Sign-On can enable your business to effectively balance security and streamlined access. 
(WHITE PAPER) READ ABSTRACT |

The Essential Guide to Protecting Essential Information by Websense, Inc.

November 2008 - (Free Research)
Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential. 
(ARTICLE) READ ABSTRACT |

Common Models in SOA: Tackling the Data Integration Problem by Progress

December 2008 - (Free Research)
You're probably familiar with the use of common formats in integration. These common representations, or in some cases mutually agreed upon formats, are often found in B2B transactions. To see how a common model can simplify SOA development, let's examine the standards at the foundation of SOA and ESB to understand what they include and... 
(WHITE PAPER) READ ABSTRACT |

Transform the Internet into a Business- Ready Application Delivery Platform for Enterprise SOA Based SAP Deployments by Akamai Technologies

March 2008 - (Free Research)
For today's enterprises, enterprise SOA based on SAP and the Internet provide a complementary and highly agile platform for rapidly extending the enterprise to reach customers, partners and employees in markets globally. 
(WHITE PAPER) READ ABSTRACT |

IRMC Used VMware Virtual Desktop Infrastructure to Virtualize its Call Center Operations by AMD and VMware, Inc (E-mail this company)

March 2008 - (Free Research)
IRMC used VMware Virtual Desktop Infrastructure to virtualize its call center operations and support multiple call centers from a central data center, reducing IT costs while improving flexibility and competitiveness. 
(CASE STUDY) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

The Fine Art of Lead Management and Follow-Up: What Research Shows About Lead Qualification and Nurturing by KnowledgeStorm, Inc (E-mail this company)

May 2006 - (Free Research)
The Internet has changed the dynamics of technology sales and marketing. While most marketing efforts emphasize generating leads, and most sales efforts are focused on closing sales, not enough consideration is given to the little-understood but vital middle ground of lead qualification. Learn more about industry best practices. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Accelerate IPv6 Migration Testing by Mu Dynamics

September 2010 - (Free Research)
Avoid IPv6 migration nightmares and integration challenges and gain control of skyrocketing costs by following best practices for IPv6 migration testing and taking a unified approach to testing with Mu Dynamics’ IPv6 testing solution. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On by Ping Identity Corporation

August 2009 - (Free Research)
Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important. 
(VIDEOCAST) READ ABSTRACT |

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.

July 2009 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection. 
(ANALYST REPORT) READ ABSTRACT |

Control IM, P2P and Streaming Applications by BlueCoat

May 2010 - (Free Research)
Blue Coat’s secure Web gateway solution provides network administrators with the tools to control Internet applications, such as IM, P2P and streaming applications. Deployed between internal users and external applications, such as IM datacenters, ProxySG intercepts all outbound and inbound communications. 
(DATA SHEET) READ ABSTRACT |

The Business Case for Hybrid Network Unification: Maximizing Performance, Continuity and IT Savings by IPANEMA TECHNOLOGIES

April 2010 - (Free Research)
While enterprises can better serve their business needs by deploying two or more WANs, questions arise about what trade-offs need to be made. At issue is not only the ability to create a hybrid network with MPLS and Internet VPN between data centers and branch offices, but also the ability to control. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Citrix GoToMyPCCorporate - Security White Paper by Citrix Online - GotoMyPC

June 2008 - (Free Research)
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control. 
(WHITE PAPER) READ ABSTRACT |

Podcast - The Fine Art of Lead Follow-up by KnowledgeStorm, Inc (E-mail this company)

February 2006 - (Free Research)
The best practitioners of online marketing are those who meld Internet marketing and technology tools with timely follow-up and tried-and-true, old fashioned human contact. This podcast walks you through key strategies for implementing an effective lead follow-up and qualification process 
(PODCAST) READ ABSTRACT |

KnowledgeNote: What Research Tells Us About Lead Management and Follow-Up by KnowledgeStorm, Inc (E-mail this company)

May 2005 - (Free Research)
The best practitioners of online marketing are those who meld Internet marketing and technology tools with timely follow-up and tried-and-true, old fashioned human contact. This paper walks you through key strategies for implementing an effective lead follow-up and qualification process. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

How to Gain Visibility and Control of Encrypted SSL Web Sessions by BlueCoat

January 2006 - (Free Research)
Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

E-Guide: Private cloud performance assurance: Best practices by Dell, Inc. and Intel®

July 2012 - (Free Research)
While public cloud computing is typically accessed through the Internet, leaving users little control over their experience, most private cloud environments inherit the existing WAN technology to connect users with conventional data centers. This e-guide offers best practices to help you tackle the responsibilities that come with private clouds. 
(EGUIDE) READ ABSTRACT |

ROI for the Online Channel: The Business Drivers for Your Investments in WCM Technology by SDL Web Content Management Solutions Division

June 2009 - (Free Research)
This document provides you with the knowledge you need to make the connections between the SDL Tridion Web Content Management solution and its effects on your business. 
(WHITE PAPER) READ ABSTRACT |

Cisco ASA 5500 Series by Cisco Systems, Inc.

The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected. 
(HARDWARE PRODUCT)

DataShare by Excel Meridian Data, Inc.

DataShare is a dual-function server that performs both CD/DVD File Sharing tasks as well as NAS File Data Archiving. It is the first CD/DVD server available in the market that combines these unique features in one easy-to-use solution. 
(HARDWARE PRODUCT)

DataNAS XP by Excel Meridian Data, Inc.

The DataNAS XP is designed with performance in mind integrating Pentium Technology, Gigabit connectivity and low cost IDE resources to produce a reliable and economical NAS Filer. The DataNAS XP is scalable from 240GB to 2TB of storage capacity and provides unified file data access for your mixed environment clients without expensive licenses. 
(HARDWARE PRODUCT)

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts