Conference ContractorsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Conference Contractors returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Access Control
 •   Security Monitoring
 •   Wireless Technologies and Mobile Computing
 •   Endpoint Security
 •   Virtualization
 •   Security Policies
 •   Network Management
 •   Networks

Related Searches
 •   Audits Conference Contractors
 •   Business Conference Contractors
 •   Conference Contractors Budgets
 •   Conference Contractors Format
 •   Conference Contractors Measured
 •   Conference Contractors Recovery
 •   Conference Contractors Work
 •   Conference Practice
 •   Conference Sheets
 •   Demo Conference Contractors
Advertisement

ALL RESULTS
1 - 25 of 150 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

Securing Network Access for Guests and Contractors by Bradford Networks

December 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm by AVG Technologies USA, Inc.

March 2010 - (Free Research)
R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges. 
(CASE STUDY) READ ABSTRACT |

Top Use Cases for Desktop Virtualization by Citrix

December 2013 - (Free Research)
This brief resource outlines the top use cases for desktop virtualization and details the specific benefits it can bring for each situation. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Faster HP server firmware updates and system fixes for defense contractor by Hewlett-Packard Company

January 2014 - (Free Research)
Read through this concise case study to find out what HP recommended their customer to solve a hardware issue. 
(CASE STUDY) READ ABSTRACT |

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation

July 2010 - (Free Research)
By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story. 
(WHITE PAPER) READ ABSTRACT |

SharePoint Conference 2009: Steve Ballmer Keynote Address by Microsoft Corporation India Pvt Ltd

December 2009 - (Free Research)
This video covers highlights from the Microsoft SharePoint Conference in 2009, including Microsoft CEO Steve Ballmer's keynote address. 
(VIDEO) READ ABSTRACT |

SCOPIA Conferencing Platform for IBM® Lotus® Sametime® by RADVISION

June 2008 - (Free Research)
The SCOPIA Conferencing Platform with SCOPIA Desktop enables users to create and initiate multiparty audio and video conferences directly from within Lotus Sametime. 
(WHITE PAPER) READ ABSTRACT |

IBM Information On Demand Virtual 2010 by IBM

December 2010 - (Free Research)
Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals. 
(WEBCAST)

How to Give a Killer Presentation: Lessons from TED by Citrix Online Go To Meeting

June 2013 - (Free Research)
In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting. 
(WHITE PAPER) READ ABSTRACT |

SCOPIA Connector for Microsoft Office Communications Server 2007 by RADVISION

June 2008 - (Free Research)
RADVISION is extending its support of the Microsoft unified communications product line with the new SCOPIA Microsoft Office Communications Server (OCS) 2007 Connector. 
(WHITE PAPER) READ ABSTRACT |

The Best of RSA: Mobile Security by SearchSecurity.com

May 2012 - (Free Research)
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies. 
(EGUIDE) READ ABSTRACT |

Desktop Video Conference Preparation: 4 Key Steps by SearchSecurity.com

November 2013 - (Free Research)
This expert E-Guide discusses what to expect and how to tackle the potential challenges of mobile and desktop video conferences in the workplace. 
(EGUIDE) READ ABSTRACT |

The 7 Biggest Mistakes You Can Make in Web Conferences by Citrix Online Go To Meeting

December 2013 - (Free Research)
In this white paper, unveil the top 7 biggest things to avoid when conducting web conferences so that you can efficiently and effectively lead meetings even when online. 
(WHITE PAPER) READ ABSTRACT |

Scheduling, Facility, Hoteling Software: Sharing Desks, Offices, Conference Rooms, and Even Parking Spaces by DeskFlex

August 2008 - (Free Research)
Desk sharing among mobile workers is known by several names, hoteling, hot-desking, virtual office, etc. Read this paper to learn how to increase office productivity with scheduling, facility, and hoteling software. 
(WHITE PAPER) READ ABSTRACT |

Navigating a New Generation of Conference Phone Solutions - A guide to selecting the right conferencing solution for different room environments by Polycom, Inc.

October 2007 - (Free Research)
Read this white paper to gain insight into voice conferencing complexities and the benefits that new equipment provides. 
(WHITE PAPER) READ ABSTRACT |

eBook: Techfocus - Data Center Construction by APC by Schneider Electric

November 2009 - (Free Research)
The chapters in this Techfocus eBook will discuss the importance of site selection and planning, data center conceptualization and cost analysis, and negotiating with contractors. 
(EBOOK) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge by IBM

December 2012 - (Free Research)
This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting. 
(EGUIDE) READ ABSTRACT |

Top Use Cases for Desktop Virtualization by Citrix

January 2014 - (Free Research)
Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Uniting SIM and IAM to Boost Security by SearchSecurity.com

April 2011 - (Free Research)
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 150 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts