Conferences Information TechnologyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Conferences Information Technology returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Collaborative Tools
 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Web, Video and Audio Conferencing
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Storage Security

Related Searches
 •   Calls Conferences Information
 •   Conferences Information B2B
 •   Conferences Information Technology Form
 •   Conferences Information West Virginia
 •   Conferences Information White Papers
 •   Orders Conferences
 •   Service Conferences
 •   Spreadsheets Conferences
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

10 Places SAP Customers Can Reduce Data Management Costs by Winshuttle, LLC

December 2008 - (Free Research)
This white paper highlights 10 key places SAP customers can reduce IT operational costs, with a focus on trimming support and data entry costs by automating data entry. 
(WHITE PAPER) READ ABSTRACT |

How Microsoft Designs the Virtualization Host and Network Infrastructure by Microsoft Corporation India Pvt Ltd

December 2009 - (Free Research)
This case study provides IT professionals and technical decision makers working in large enterprises with the information they need to plan and deploy server virtualization by using Windows Server 2008 Hyper-V. 
(CASE STUDY) READ ABSTRACT |

Unleashing Microsoft SharePoint 2010’s Web Content Management Features by AvePoint, Inc.

February 2011 - (Free Research)
In this white paper, we will discuss the requirements for dynamic websites in today’s hyper-competitive business landscape, the case for utilizing SharePoint Server 2010 for WCM, and how AvePoint’s DocAve Software Platform enhances the native WCM functionality SharePoint offers. 
(WHITE PAPER) READ ABSTRACT |

Fortifying the Pillars of IT Governance by AvePoint, Inc.

February 2011 - (Free Research)
This paper discusses what IT Governance entails, the business decisions that must be made prior to technology investment and implementation, the features in Microsoft SharePoint Server 2010 that encourage end-user adoption yet reveal unique governance challenges, and solutions available for enhancing Microsoft’s native governance functionality. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Top IT Consulting Firm Utilizes DocAve® to Manage SharePoint Infrastructure of Global Banking Organization by AvePoint, Inc.

February 2010 - (Free Research)
Read this case study to see how one of the largest IT consulting firms turned to DocAve solutions to provide their clients a robust solution for their collaborative digital workspace and SharePoint administration needs. 
(CASE STUDY) READ ABSTRACT |

IBM Information On Demand Virtual 2010 by IBM

December 2010 - (Free Research)
Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals. 
(WEBCAST)

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com

October 2009 - (Free Research)
This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more. 
(PRESENTATION) READ ABSTRACT |

Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge by IBM

December 2012 - (Free Research)
This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting. 
(EGUIDE) READ ABSTRACT |

CIO Tips for Seeing the ITIL Light by FrontRange Solutions Inc.

July 2013 - (Free Research)
CIOs often struggle to understand how the IT Infrastructure Library (ITIL) framework can be beneficial to their organization. This expert e-guide will help make the business case for ITIL adoption, providing an overview of the monetary benefits of ITIL as well as tips for viewing ITIL technology in a friendlier light. 
(EGUIDE) READ ABSTRACT |

Emerging StorageTechniques in Health Care by Asigra

October 2012 - (Free Research)
This essential guide on emerging storage techniques in health care demonstrates how, with a little creativity, organizations can benefit from the new cloud storage techniques that make electronic information easier to manage. 
(EGUIDE) READ ABSTRACT |

How to Give a Killer Presentation: Lessons from TED by Citrix Online Go To Meeting

June 2013 - (Free Research)
In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting. 
(WHITE PAPER) READ ABSTRACT |

CIO Insights: Fortifying ITIL and Change Management Strategies for Business Benefit by FrontRange Solutions Inc.

July 2013 - (Free Research)
This expert e-guide provides tips and tactics to help you fortify your IT Infrastructure Library (ITIL) framework in order to achieve significant IT and business benefits. Also inside, count down four ways that you can improve your change management strategy. 
(EGUIDE) READ ABSTRACT |

Service Orientation and Its Role in Your Connected Systems Strategy: Building Distributed Applications by Microsoft Corporation India Pvt Ltd

October 2008 - (Free Research)
This white paper presents the Microsoft Corporation vision for service orientation and service-oriented architecture in enterprise computing. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

ITIL: What It Is and Why You Should Care by Global Knowledge Network, Inc.

September 2005 - (Free Research)
ITIL is becoming the next big thing in Information Technology. This paper outlines the origin of ITIL, who controls its contents, who are the biggest users, and why you should care. 
(WHITE PAPER) READ ABSTRACT |

IBM Lotus Sametime Software Integration with Microsoft Applications: Connecting, Conversing and Collaborating More Conveniently by IBM

March 2009 - (Free Research)
Check out this paper to learn about the many benefits of IBM Lotus Sametime software integration and how it can enhance the collaboration and unified communications capabilities of all your Microsoft Office applications. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

CW Europe – March Edition by ComputerWeekly.com

March 2013 - (Free Research)
Never have we been so open about the information we share online, without so little concern for our privacy. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. 
(EZINE) READ ABSTRACT |

SCOPIA Conferencing Platform for IBM® Lotus® Sametime® by RADVISION

June 2008 - (Free Research)
The SCOPIA Conferencing Platform with SCOPIA Desktop enables users to create and initiate multiparty audio and video conferences directly from within Lotus Sametime. 
(WHITE PAPER) READ ABSTRACT |

Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by ZANTAZ

January 2008 - (Free Research)
This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold." 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts