Computer Learn AboutWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computer Learn About returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Business Process Management (BPM)
 •   Network Management
 •   Enterprise Systems Management
 •   Enterprise Resource Planning (ERP)
 •   Data Center Management

Related Searches
 •   Advanced Computer Learn
 •   Case Computer Learn
 •   Computer Learn About Case Study
 •   Computer Learn About Hardware
 •   Computer Learn About Part
 •   Computer Learn Arkansas
 •   Computer Learn Definition
 •   Computer Minnesota
 •   Latest Computer Learn About
 •   Scheduling Computer Learn About
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

HP and VMware Take the Cost and Complexity Out of IT by VMware, Inc.

February 23, 2009 - (Free Research)
To meet the constant demand to deploy, maintain and grow a broad array of services and applications, IT organization must continually add new servers. Read this to learn about creating a fully functional virtual machine that can run its own operating system and applications just like a real computer. 
(WHITE PAPER) READ ABSTRACT |

Defending Against APTs: Do You Have the Complete Picture? by Hexis Cyber Solutions Inc

July 17, 2013 - (Free Research)
Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Computer Weekly – 29 January 2013: The end of the PC refresh cycle? by ComputerWeekly.com

January 29, 2013 - (Free Research)
In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now. 
(EZINE) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 09, 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly 19 July 2011: A Conversation with the CIO of one of the UK government’s biggest IT estates by ComputerWeekly.com

July 18, 2011 - (Free Research)
In this week's issue of Computer Weekly we talk exclusively to one of the top CIOs in UK government about the challenges of innovating with IT at a time when the public sector is forced to make huge cuts in spending. An informative buyer's guide on desktop virtualisation is also featured, plus much more. Download this issue now. 
(EBOOK) READ ABSTRACT |

Virtual Computer on 2nd Generation Intel Core vPro Processors by Intel

September 12, 2011 - (Free Research)
Peter Marconi, Senior VP of Engineering at Virtual Computer, talks about how NxTop, Virtual Computer's baremetal client hypervisor, and 2nd generation Intel® Core™ vPro™ processors work together to deliver a secure, desktop virtualization solution. Watch this informative video to learn how to increase your PCs manageability and performance. 
(VIDEO) READ ABSTRACT |

Dell Cuts IT Work, Tightens Security, Improves Performance with New Software by Dell, Inc. and Intel®

November 25, 2009 - (Free Research)
Dell is planning to upgrade its 100,000 desktop and portable computers to the Windows® 7 operating system to reduce desktop management costs and enhance data security. Read this case study to learn more about Dell's business needs as well as the features and benefits achieved from Microsoft's solutions. 
(CASE STUDY) READ ABSTRACT |

Social Engineering: Hacking People, Not Machines by AVG Technologies USA, Inc.

March 31, 2010 - (Free Research)
Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Impact of High Density Hot Aisles on IT Personnel Work Conditions by APC by Schneider Electric

January 26, 2011 - (Free Research)
The use of modern enclosed hot aisles to address increasing power densities in the data center has brought into question the suitability of working conditions in these hot aisle environments. In this paper, it is determined that the additional heat stress imposed by such high density IT environments is of minimal concern. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 11 December 2012: Microsoft puts up prices again by ComputerWeekly.com

December 11, 2012 - (Free Research)
In this week's Computer Weekly, we look at Microsoft's latest price increase for key business software products, and hear from experts on why the decision is flawed. We talk to an organisation that swapped 3,000 BlackBerrys for iPads and iPhones. And we examine the importance of service-level agreements when moving to the cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 04, 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Building a Home Lab for VMware vSphere by Global Knowledge

February 12, 2010 - (Free Research)
Read this paper by Global Knowledge instructor, John Hales, to learn how to build a home lab for VMware vSphere for study. This paper is broken down into three major sections; the first and most detailed is about the hardware required, the second is about the Workstation configuration, and the third is about installing vSphere and Virtual Center. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Automating Resource Monitoring with Robot/CONSOLE by Help/Systems

April 28, 2010 - (Free Research)
Listen as we discuss the importance of monitoring and event notification for today’s computer systems. Learn about the critical role that Robot/CONSOLE can play by automating these processes. 
(PODCAST) READ ABSTRACT |

The New Learning Content Model: How Content Management Challenges Are Changing the Way Learning Content Is Purchased, Deployed and Managed by Plateau System LTD.

March 2008 - (Free Research)
With dynamic learning essential to meeting an entire new era of challenges, organizations simply can't afford to base their learning budget on their best guess about who, when, and how their employees will use eLearning content. 
(WHITE PAPER) READ ABSTRACT |

Computer Forensics and its Role in the Risk Management Process by IBM

May 2011 - (Free Research)
The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies. 
(EGUIDE) READ ABSTRACT |

Profitably Improving Site Infrastructure Energy Efficiency by Upsite Technologies, Inc.

October 2008 - (Free Research)
Learn about the causes of energy overconsumption and how to improve your organization's overall energy efficiency, resulting in huge cost savings. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Evaluating Email Security Solutions by SonicWALL

April 2008 - (Free Research)
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions. 
(WHITE PAPER) READ ABSTRACT |

Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security by Lumension

May 2008 - (Free Research)
Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter. 
(WHITE PAPER) READ ABSTRACT |

Debunking the Top 5 Misconceptions about Data Protection by Lumension

May 2008 - (Free Research)
Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets. 
(PODCAST) READ ABSTRACT |

Business Technology Marketing Benchmarks: 2006-2007 Data and Trends by KnowledgeStorm Webinars (E-mail this company)

August 2006 - (Free Research)
Find out what 1,900 B2B marketers in software, hardware and technology services industries revealed about what works for lead generation. Supplement this report with the webinar titled "KnowledgeStorm Webinars: Business Technology Marketing Benchmarks: 2006-2007 Data and Trends" and learn about B2B e-mail and search engine marketing strategies. 
(ANALYST REPORT) READ ABSTRACT |

Learn More About KnowledgeStorm by KnowledgeStorm, Inc (E-mail this company)

June 2007 - (Free Research)
KnowledgeStorm is the Internet's top-ranked search resource for technology solutions and information. With our premier network, search expertise and performance tools and services, KnowledgeStorm provides technology vendors the most opportunities to reach buyers on the Internet and convert them into Web leads. 
(WHITE PAPER) READ ABSTRACT |

Learning Computing: Why object orientated programming works. by ComputerWeekly.com

January 2012 - (Free Research)
Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey. 
(JOURNAL ARTICLE) READ ABSTRACT |

Client Management Best Practices for Managing Mac Systems by CDW

April 2010 - (Free Research)
One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts