Contract Enforcement PartWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Contract Enforcement Part returned the following results.
RSS What is RSS?
Related Categories

 •   Contract Management
 •   Data Security
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Business Process Management (BPM)
 •   Wireless Technologies and Mobile Computing
 •   Storage Security
 •   Managed Security Services
 •   Mobile Device Management

Related Searches
 •   Backup Contract
 •   Buy Contract
 •   Case Contract Enforcement
 •   Companies Contract Enforcement
 •   Contract Enforcement Papers
 •   Contract Enforcement Part Desktop
 •   Contract Enforcement Retail
 •   Product Contract Enforcement
 •   Providers Contract
 •   Suite Contract Enforcement Part
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to tackle trust and co-operation by ComputerWeekly.com

November 10, 2010 - (Free Research)
It is well-known that eCommerce transactions require a level of trust between participants in that trust, in this context, gives each partner confidence that the other will fulfil his part of a bargain in the future. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry by IBM

March 22, 2011 - (Free Research)
This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models. 
(EGUIDE) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 12, 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 24, 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends by ComputerWeekly.com

August 15, 2011 - (Free Research)
In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now. 
(EBOOK) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-end Approach by Hewlett-Packard Company

December 23, 2008 - (Free Research)
This white paper explains a structured way to manage requirements and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

Genuine parts save the day for a government finance agency by Hewlett-Packard Company

January 31, 2014 - (Free Research)
Read through this concise case study to find out how HP resolved an organization's data loss issues, when it was discovered their hardware was not genuine HP parts. 
(CASE STUDY) READ ABSTRACT |

What can go wrong with counterfeit parts : What unauthorized support providers don't tell you - Government Finance customer by Hewlett-Packard Company

November 30, 2013 - (Free Research)
Read through this concise case study to find out how HP resolved an organization's data loss issues, when it was discovered their hardware was not genuine HP parts. 
(CASE STUDY) READ ABSTRACT |

Reducing Risk through Requirements-driven Quality Management: An End-to-End Approach by Hewlett-Packard Company

May 01, 2007 - (Free Research)
Read this white paper to learn a structured way to manage requirements, and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends by ComputerWeekly.com

August 23, 2011 - (Free Research)
In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now. 
(EZINE) READ ABSTRACT |

eGuide: Information Security - Buyer's Guide to Messaging Security by SearchSecurity.com

November 20, 2009 - (Free Research)
Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging. 
(EGUIDE) READ ABSTRACT |

Computer Weekly – 3 June 2014: How big data brings big donations for charities by ComputerWeekly.com

June 03, 2014 - (Free Research)
In this week's Computer Weekly, hear how big data is helping charities to improve their fundraising by better targeting potential donors. We find out how the UK's biggest newspaper publisher is moving its IT to the cloud. And we examine the options for datacentre cooling technologies to cut your energy costs. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 27 March 2012: What the Budget means for IT by ComputerWeekly.com

March 27, 2012 - (Free Research)
This week’s Computer Weekly asks what chancellor George Osborne's Budget means for the UK IT community and if he can deliver his goal to make Britain "the technology centre of Europe". Also you'll find the final part of our private cloud Buyer's Guide and we examine the options for choosing the right WAN optimisation strategy. 
(EZINE)

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 20, 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

CISCO PIX 515E SECURITY APPLIANCE by Cisco Systems, Inc.

The Cisco® PIX® 515E Security Appliance delivers a wealth of advanced security and networking services for small-to-medium business and enterprise networks, in a modular, purpose-built appliance. 
(HARDWARE PRODUCT)

Protecting SharePoint Data Long Term by Varonis

July 30, 2009 - (Free Research)
This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help. 
(WHITE PAPER) READ ABSTRACT |

Faster, Higher, Stronger: In-Memory Computing Disruption and What SAP HANA Means for Your Organization by SAP America, Inc.

November 28, 2011 - (Free Research)
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 13, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Detect and Survive by Guidance Software, Inc.

April 15, 2010 - (Free Research)
This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software. 
(WHITE PAPER) READ ABSTRACT |

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs by Persystent Technologies

June 2008 - (Free Research)
Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction. 
(WHITE PAPER) READ ABSTRACT |

Upgrade Strategies and Third-Party Support: Taking Back Control of Your Enterprise Applications Road Map by Rimini Street, Inc.

June 2011 - (Free Research)
How to use third-party support to get information on enterprise application software licensing renewels. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization for On-Demand Growth by Citrix

December 2013 - (Free Research)
Access this exclusive, informative resource to find out how one data center solution can provide you with the support you need for desktop virtualization. 
(WHITE PAPER) READ ABSTRACT |

A Strategic Blueprint to Increase Return on Assets: A Global Financial Institution Case Study by Hitachi Data Systems

April 2009 - (Free Research)
A leading global financial institution embarked on a data center consolidation and reclamation project that spanned nearly 2000 servers and 76 EMC arrays. The results included US$4 million in savings by reducing physical storage capacity 40 to 60 percent. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 19 February 2013: Software Developers in demand by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at why companies are struggling to attract the right talent for in-house IT. We investigate why CIOs are not happy with Oracle's Fusion strategy. And betting company William Hill tells us how mobile technology has changed the high street bookmaker. Read the issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts