Common StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Common Study returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Security Policies
 •   Virtualization
 •   Database Planning and Implementation
 •   Backup Systems and Services
 •   Enterprise Systems Management
 •   Technology Planning and Analysis

Related Searches
 •   Basic Common Study
 •   Common Download
 •   Common Expense
 •   Common Portals
 •   Common Study Claims
 •   Common Study Rfq
 •   Common Study Value
 •   Computerized Common Study
 •   Record Common
 •   Resources Common Study
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies by ArcSight, an HP Company

August 02, 2010 - (Free Research)
The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(WHITE PAPER) READ ABSTRACT |

ORC International Database Manageability and Productivity Cost Comparison Study: Oracle Database 11g Release 2 vs. IBM DB2 Enterprise 9.7 by Oracle Corporation

September 06, 2011 - (Free Research)
Conducted by the research firm ORC International, this study found that performing common database management tasks for Oracle Database 11g R2 took less time and fewer resources than performing the same tasks for DB2 Enterprise 9.7. Although funded by Oracle, the study was independently conducted by ORC. 
(ANALYST REPORT) READ ABSTRACT |

Improving IT Economics and Gaining Business Value with CA Enterprise IT Management Software: An ROI Study by CA Technologies.

November 30, 2008 - (Free Research)
This paper details a study that used standard IDC ROI methodology to calculate the costs of performing common IT administrative, operational, and support functions. With the recent dislocations in the world economy, the findings here can guide your company to increased productivity, cost savings, and revenue. 
(WHITE PAPER) READ ABSTRACT |

E-book: Planning upgrades in global SAP environments: Best practices, common pitfalls and real-world advice by Atos Origin

December 10, 2009 - (Free Research)
In this e-book, find out what you need to know before embarking on a global SAP upgrade project. Learn best practices and tips for global SAP upgrades. Read a real-world case study about an SAP upgrade for a major multinational - and discover insider advice about the most common pitfalls of global upgrades - and how to avoid them. 
(EBOOK) READ ABSTRACT |

Cybersecurity Readiness Study: An Executive Summary by ArcSight, an HP Company

May 17, 2011 - (Free Research)
This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats. 
(WHITE PAPER) READ ABSTRACT |

First Annual Cost of Cyber Crime Study by ArcSight, an HP Company

February 07, 2011 - (Free Research)
Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions. 
(WHITE PAPER) READ ABSTRACT |

Amplifying the Signal in the Noise of IT Monitoring by Zenoss, Inc.

October 30, 2013 - (Free Research)
This case study details the value of moving past the traditional, fragmented approach to IT monitoring. 
(WHITE PAPER) READ ABSTRACT |

Managing Paper Patient Records In a Clinical Practice by Nuance

October 25, 2011 - (Free Research)
Read this study conducted by Nuance Communications to better understand the bottlenecks and issues that arise from using paper documents in the health care field and how electronic document management can greatly eliminate these issues. 
(WHITE PAPER) READ ABSTRACT |

The State of System i Security 2008 by PowerTech

August 2008 - (Free Research)
This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i. 
(WHITE PAPER) READ ABSTRACT |

Agility Meets Stability: Best Practices for Application Integration by IBM

December 2011 - (Free Research)
In this white paper, Dan Moore, the senior vice president of professional services at IBM, Cast Iron reviews the current application environment in light of emerging trends, describes an ideal complete integration solution and discusses common sense best practices as well as pitfalls. 
(WHITE PAPER) READ ABSTRACT |

Client Case Study: Bouyges Telecom by IBM

July 2011 - (Free Research)
In this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 19 February 2013: Software Developers in demand by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at why companies are struggling to attract the right talent for in-house IT. We investigate why CIOs are not happy with Oracle's Fusion strategy. And betting company William Hill tells us how mobile technology has changed the high street bookmaker. Read the issue now. 
(EZINE) READ ABSTRACT |

2010 Endpoint Risk Assessment: Internal Vulnerabilities by Promisec

May 2011 - (Free Research)
This study will show you the most common security issues that were found and how they were dealt with by the various organizations. 
(WHITE PAPER) READ ABSTRACT |

Executive Insight: Multi-Sourcing in the Call Center by inContact

February 2009 - (Free Research)
This paper examines how many executives are beginning to understand that cutting cost by outsourcing call center operations isn't always the best solution. Learn how "cheaper" often comes at the expense of "better". 
(WHITE PAPER) READ ABSTRACT |

Case Study: Inside Hitachi Global Storage Technologies' Rapid Supply Chain Deployment by E2open

January 2005 - (Free Research)
Read this case study to learn provide how Hitachi builds an integrated face to all of its business partners and customers to make it simple for suppliers and customers to do business with Hitachi. 
(CASE STUDY) READ ABSTRACT |

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions by Symantec Corporation

August 2010 - (Free Research)
This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business. 
(WHITE PAPER) READ ABSTRACT |

Proactive technical support: the overlooked essential in business resilience: Combine hardware and software technical support with business continuity and disaster recovery plans by IBM

October 2011 - (Free Research)
Read this white paper and discover how IBM tech support solutions fit into every good resiliency plan and what to look for in a good business resilience vendor. 
(WHITE PAPER) READ ABSTRACT |

The State of System i Security 2007 by PowerTech

April 2007 - (Free Research)
This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400. 
(WHITE PAPER) READ ABSTRACT |

Seven keys to managing your business-critical cloud by HP & Intel®

April 2013 - (Free Research)
Learn how to avoid the common pitfalls when deploying the cloud inside. Review the top seven best practices for effectively implementing and managing a cloud environment along with a case study to help guide you. 
(WHITE PAPER) READ ABSTRACT |

TechInsights Report: What Smart Businesses Know About DevOps by CA Technologies.

September 2013 - (Free Research)
In this white paper, explore the wide range of technologies and processes that are used to implement DevOps, from a study of 1,300 senior IT decision-makers worldwide. You'll learn how successful organizations are investing in tools, measuring results, and overcoming common obstacles to DevOps processes. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Recovering from IT disaster: What’s really causing your outage? by Dell Compellent

November 2011 - (Free Research)
Most IT disasters have nothing to do with the hurricanes, earthquakes, and floods that can wipe out a facility. In fact, studies show that hardware failure is the number one reason for DR declarations.  This e-guide describes common DR misconceptions and consequences, and provides backup and testing suggestions for optimal recovery. 
(EGUIDE) READ ABSTRACT |

Employee engagement: How common-sense principles drive uncommon business benefits by SuccessFactors

March 2014 - (Free Research)
This resource describes the benefits of improved employee engagement and offers recommendations to help you get there. 
(WHITE PAPER) READ ABSTRACT |

Comparing DBA Productivity: An Oracle/DB2 Task Complexity Analysis by IBM

August 2011 - (Free Research)
Comparing DBA Productivity: An Oracle / DB2 Task Complexity Analysis - A must read, this study dives into six  common DBA administration task areas, showing quantitatively that DB2 offers simpler administration  and helps achieve time savings as compared to Oracle Database. 
(WHITE PAPER) READ ABSTRACT |

Comparing DBA Productivity An Oracle / DB2 Task Complexity Analysis by IBM

March 2011 - (Free Research)
A must read, this study dives into six  common DBA administration task areas, showing quantitatively that DB2 offers simpler administration  and helps achieve time savings as compared to Oracle Database. 
(ANALYST REPORT) READ ABSTRACT |

What Smart Businesses Should Know About DevOps by CA Technologies.

August 2013 - (Free Research)
Though many businesses have implemented DevOps and seen measurable benefits, not everyone agrees on the best path to DevOps. In this research report, explore the findings of a study of 1,300 IT leaders on the topic of DevOps. Get the information you need to determine the right path to DevOps for your organization 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts