Computing TopWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computing Top returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Mobile Device Management
 •   Application Security
 •   Security Policies
 •   Desktop Management
 •   Wireless Security
 •   Laptops/ Notebooks/ Tablet PCs
 •   Desktops/ Workstations

Related Searches
 •   Computing Industry
 •   Computing Search
 •   Computing Top Crm
 •   Computing Top Offices
 •   Computing Top Open
 •   Downloads Computing Top
 •   Firm Computing
 •   Functions Computing Top
 •   Method Computing Top
 •   Skills Computing Top
Advertisement

ALL RESULTS
1 - 25 of 424 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Getting cloud computing right by IBM

May 04, 2011 - (Free Research)
Cloud computing can potentially be a disruptive change to the way an enterprise’s IT services are delivered. We propose that examining a candidate cloud solution provider’s reference architecture should be a standard element of a CIO’s cloud vendor evaluation strategy. Learn more now. 
(WHITE PAPER) READ ABSTRACT |

Eguide: Top 10 risks in cloud computing and how to stay compliant by Intel

October 03, 2011 - (Free Research)
Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing. 
(EGUIDE) READ ABSTRACT |

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins by Intel

October 04, 2011 - (Free Research)
This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment. 
(WEBCAST) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 11, 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 27, 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

E-Guide: Cloud 101- Top Trends, Resources, and Benefits by KineticD

April 06, 2011 - (Free Research)
This e-guide will walk through the current VAR cloud computing business trends, how to weigh the risks and benefits to determine the need for it in your storage portfolio, and the top 10 cloud computing market resources. 
(EGUIDE) READ ABSTRACT |

Top Eight Features of Windows 8 Client by Global Knowledge

June 06, 2012 - (Free Research)
Explore new and exciting features that the upcoming Windows 8 release brings to the tablet and desktop computing sphere. 
(WHITE PAPER) READ ABSTRACT |

Impact of Cloud: Top 10 Insights by Cisco Systems, Inc.

December 19, 2013 - (Free Research)
This whitepaper shares some of the key findings from a study of the dramatic changes cloud computing is creating for IT at all key consumption lifecycle stages – how businesses plan for, procure, deploy, operate, and govern IT. 
(WHITE PAPER) READ ABSTRACT |

Tablets in the enterprise: five steps for successful adoption by ComputerWeekly.com

June 27, 2012 - (Free Research)
Tablet devices will give enterprises a competitive advantage according to this in-depth report from Booz&Co. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Top 10 Myths of Desktop Virtualization by Virtual Computer, Inc.

January 01, 2011 - (Free Research)
There are many misconceptions about desktop virtualization that prevent businesses from leveraging the many benefits of this technology. This white paper debunks the top 10 myths about desktop virtualization with specific examples and use cases. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges by Panaya, Inc.

April 07, 2010 - (Free Research)
This presentation transcript of the webcast “Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges” explores the top challenges of an SAP ERP 6.0 upgrade and provides must-know advice, real-world examples, technical tips and other tricks to help you solve them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cloud Management: Overcoming today’s Top Risks by Intel

April 27, 2012 - (Free Research)
Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them. 
(EGUIDE) READ ABSTRACT |

The Mobile App Top 10 Risks by Veracode, Inc.

February 15, 2011 - (Free Research)
This expert webcast reveals the top 10 mobile application risks facing organizations today. 
(WEBCAST) READ ABSTRACT |

Mythbusting DaaS: Debunking the Top 10 Cloud-Hosted Virtual Desktop Myths by Desktone (VMware)

May 01, 2013 - (Free Research)
Access this helpful white paper to learn about the top 10 myths concerning desktop as a service (DaaS). 
(WHITE PAPER) READ ABSTRACT |

Top Three Mobile Application Threats by Hewlett-Packard Limited

November 30, 2012 - (Free Research)
This white paper reveals the top three mobile application threats enterprises today are facing and offers advice on how to mitigate the potential risks. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Top Five Requirements for Next Generation Storage Architectures by Brocade

February 28, 2014 - (Free Research)
This brief white paper discusses the top 5 requirements of a next generation storage network architecture to conquer the ongoing performance demands of the compute layer. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Considerations When Evaluating Unified Communications Solutions - Learn the top solution differentiators to look for before deciding by Cisco Systems, Inc.

August 02, 2011 - (Free Research)
This paper breaks down ten areas to consider when evaluating an upgrade of your unified communications solution. 
(WEBCAST)

Understanding the risks of mobile apps by Veracode, Inc.

May 11, 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

P2V Benefits: Moving Servers From the Physical to the Virtual World Cuts Costs, Saves Space and Parallels Green Initiatives by CDW Corporation

September 08, 2009 - (Free Research)
Virtualization basically means inserting a software layer between your hardware and your operating system. This decouples the operating system from the hardware and allows you to run many operating systems at the same time on top of that same physical piece of hardware. Read this short paper to learn about the benefits of using virtual servers. 
(WHITE PAPER) READ ABSTRACT |

SearchSecurity Survey Reveals Top 5 Enterprise Mobile Security Issues by BlackBerry

September 20, 2013 - (Free Research)
This expert guide examines the top five enterprise security issues that plague organizations today. Some are as simple as lost devices, but others are active threats you need to be prepared for. 
(EGUIDE) READ ABSTRACT |

Impact of Cloud on IT Consumption Models: Top 10 Insights by Cisco Systems, Inc.

November 08, 2013 - (Free Research)
This whitepaper reviews the conclusions from a survey of IT leaders around the world. 
(WHITE PAPER) READ ABSTRACT |

Supercomputers: prestige objects or crucial tools for science and industry ? by ComputerWeekly.com

April 19, 2012 - (Free Research)
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. 
(PRESENTATION) READ ABSTRACT |

Top Ten Data Management Trends by Scalability Experts

May 31, 2011 - (Free Research)
Read this white paper to get the top ten data management trends that will be important in 2011 and beyond. Leveraging these trends will enable you to make more insightful business decisions, reduce your IT costs and make your environment more responsive, available and scalable. 
(WHITE PAPER) READ ABSTRACT |

Unified Communications Trends and Challenges: How to Stay on Top by ScanSource Communications

April 06, 2011 - (Free Research)
This e-guide discusses the top trends affecting the unified communication's (UC) market as well as potential UC and IP telephony challenges. Learn what you can do to tackle these issues and stay ahead of the competition. 
(EGUIDE) READ ABSTRACT |

Top 10 Tips to Make Access to SaaS, Enterprise Class Secure by Intel

October 12, 2011 - (Free Research)
In today’s cloud environment, the number of security breaches is on the rise - driving a new mandate for strong authentication technologies to ensure a more secure SSO. In this case study brief, learn first hand from industry experts and customers, their top 10 tips to make your federated SSO implementation a success and Enterprise class secure. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 424 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts