Contractors Business ProgramWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Contractors Business Program returned the following results.
RSS What is RSS?
Related Categories

 •   Access Control
 •   Data Security
 •   Business Intelligence Solutions
 •   Network Security
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Technology ROI Tools
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Technology Planning and Analysis

Related Searches
 •   Contractors Business Markets
 •   Contractors Business Program Integrated
 •   Contractors Business Program Security
 •   Contractors Intranet
 •   Delivery Contractors Business
 •   Digital Contractors
 •   Migration Contractors Business
 •   Price Contractors
 •   Schema Contractors
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Home Agents by Avaya Inc.

June 2008 - (Free Research)
Employing home agents allows you to expand and improve your call center team. And they can be a form of insurance to keep your business running if disaster strikes. This white paper contains best practices for developing a Home Agents program. 
(WHITE PAPER) READ ABSTRACT |

Is your user management process getting you down? Improving efficiency and security through automation by NetIQ Europe

May 2011 - (Free Research)
Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Securing Network Access for Guests and Contractors by Bradford Networks

December 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm by AVG Technologies USA, Inc.

March 2010 - (Free Research)
R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges. 
(CASE STUDY) READ ABSTRACT |

Top Use Cases for Desktop Virtualization by Citrix

December 2013 - (Free Research)
This brief resource outlines the top use cases for desktop virtualization and details the specific benefits it can bring for each situation. 
(WHITE PAPER) READ ABSTRACT |

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation

July 2010 - (Free Research)
By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story. 
(WHITE PAPER) READ ABSTRACT |

Faster HP server firmware updates and system fixes for defense contractor by Hewlett-Packard Company

January 2014 - (Free Research)
Read through this concise case study to find out what HP recommended their customer to solve a hardware issue. 
(CASE STUDY) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

eBook: Techfocus - Data Center Construction by APC by Schneider Electric

November 2009 - (Free Research)
The chapters in this Techfocus eBook will discuss the importance of site selection and planning, data center conceptualization and cost analysis, and negotiating with contractors. 
(EBOOK) READ ABSTRACT |

Top Use Cases for Desktop Virtualization by Citrix

January 2014 - (Free Research)
Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization. 
(WHITE PAPER) READ ABSTRACT |

IT Handbook: Building Blocks of Data Center Construction by SearchDataCenter.com

November 2011 - (Free Research)
Data center demands continue to skyrocket, forcing organizations to build new facilities with meager funds. This expert handbook will help you future-proof your investments and avoid costly construction mistakes. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions E-Zine: The New BPM by SearchCIO.com

December 2013 - (Free Research)
Enterprise BPM is about more than battling bottlenecks. CIOs are looking to business process management to help grow the business and hone a competitive edge. 
(EZINE) READ ABSTRACT |

Oracle E-Business Suite: Boost Reporting and BI Capabilities (use for podcast, webcast and PT) by Noetix Corporation

October 2012 - (Free Research)
In this transcript, hear first-hand from Noetix customers and they divulge how the reporting and business intelligence (BI) tool saves IT time and resources by enabling end users to get at Oracle E-Business Suite data themselves. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Do More with Less: The Five Strategies used by Successful SMB Manufacturers by Infor

September 2008 - (Free Research)
A common issue facing small and medium-sized business (SMB) manufacturers today is how to increase revenue and grow their business without significantly adding staff. Read this paper to learn five strategies used by successful SMBs. 
(WHITE PAPER) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Building Data Quality Efforts Into Everyday Processes by DataFlux Corporation

July 2012 - (Free Research)
Poor data quality at the most minor level can have major ramifications. Read this expert e-book to gain advice on how to make data quality a high priority in your day-to-day business operations. Discover tips on implementing internal data quality standards and how to train users on data quality best practices. 
(EBOOK) READ ABSTRACT |

Collaborative software delivery: improving software quality with better lifecycle management by IBM

November 2011 - (Free Research)
Read this white paper and learn how an IBM Rational solution can help your company build better software faster, using an integrated application lifecycle management (ALM) solution designed to support collaboration across distributed agile development teams. 
(WHITE PAPER) READ ABSTRACT |

The Capital Delivery Revolution and Technology: Connecting Capital Planning, Construction, and Everything in Between by Oracle Corporation

January 2009 - (Free Research)
This white paper recognizes three principal solution areas in the capital project delivery lifecycle: project design, project execution, and organizational governance. In particular, it addresses the area of project execution and the means available today to drive successful project delivery on a consistent basis. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization by Bradford Networks

January 2009 - (Free Research)
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Accelerate Business Through a Cost-efficient Virtual Workforce: Citrix Transforms IT into an On-Demand Service for Virtual Workers by Citrix

May 2009 - (Free Research)
This white paper defines a virtual workforce, describes the challenges and requirements that organisations face when supporting a virtual workforce, and explains how Citrix solutions can address these requirements and scale accordingly to foster and support future growth. 
(WHITE PAPER) READ ABSTRACT |

Flexible Storage Enables Growth by Dell | EMC

June 2008 - (Free Research)
The AX4-5 has allowed McNeil to stand shoulder-to shoulder with much larger enterprises when it comes to data storage sophistication and efficiency. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts