Critical PracticeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Critical Practice returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Data Center Management
 •   Application Management and Maintenance
 •   Enterprise Systems Management
 •   Disk-based Backup & Storage/ RAID
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Business Process Management (BPM)
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Applications Of Critical Practice
 •   Critical Audit
 •   Critical Buy
 •   Critical Practice Definition
 •   Critical Practice Packages
 •   Critical Practice Purchase
 •   Email Critical
 •   Licenses Critical Practice
 •   Portal Critical
 •   Reseller Critical Practice
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide by EMC Backup and Recovery Solutions

May 08, 2009 - (Free Research)
In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Best practices for selecting high quality hardware for mission-critical applications by Cisco Systems, Inc.

June 21, 2011 - (Free Research)
This expert e-guide from SearchSAP.com explores the specific requirements that must be met to maintain high usability and uptime within mission-critical environment such as SAP. Readers will gain access to tips and best practices for selecting server hardware that supports even the most demanding and critical business applications. 
(EGUIDE) READ ABSTRACT |

Fifty Critical Alerts for Monitoring Windows Servers - Best Practices by Prism Microsystems Inc.

September 2008 - (Free Research)
This document identifies and describes the most important events generated by your Windows servers so they can be addressed and corrected by IT personnel in the most efficient manner. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Government Security by SearchSecurity.com

May 2011 - (Free Research)
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats. 
(EGUIDE) READ ABSTRACT |

5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by Marathon Technologies

September 2009 - (Free Research)
This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Best Practices for Virtualizing Mission-Critical Applications by VMware and Intel

December 2010 - (Free Research)
In this expert e-guide from SearchServerVirtualization.com learn how virtualizing applications like SQL Server and Exchange can reduce data center space and power usage, improve disaster recovery and increase deployment flexibility. Plus get best practices and considerations for each specific application. 
(EGUIDE) READ ABSTRACT |

3-2-1 Archiving and Data Protection Best Practice by QStar Technologies, Inc.

March 2009 - (Free Research)
The 3-2-1 Archiving and Data Protection Best Practice advocates that a minimum of 3 copies of all business critical data be retained, that these copies should be kept on 2 different types of storage media, and that at least one copy should be offsite on removable media. 
(DATA SHEET) READ ABSTRACT |

Worst Practices in BI: Why Business Intelligence (BI) Applications Succeed Where BI Tools Fail by Information Builders Inc. (E-mail this company)

June 2007 - (Free Research)
Tthis paper provides insight into the top-four worst practices for BI. It also provides guidance on how to avoid and/or overcome worst practices in order to tap into the true power of BI. By reading this paper, you will have a solid understanding of how to avoid BI failure and achieve success with your BI initiatives. 
(WHITE PAPER) READ ABSTRACT |

Best practices for streamlining financial processes and reporting in SAP environments by Dolphin

October 2011 - (Free Research)
In this e-book, get expert advice and ideas on how to improve critical financial processes such as order-to-cash, controlling, general ledger, accounts receivable and financial reporting. 
(EBOOK)

Presentation Transcript: Virtualizing Business-Critical Applications Part 3 by VMware, Inc.

October 2010 - (Free Research)
Read this part 3 of 3 transcripts from a live chat with VMware experts and learn about application performance considerations, best practices and use cases for deploying Tier 1 applications on VMware. 
(PRESENTATION TRANSCRIPT)

Presentation Transcript: Virtualizing Business-Critical Applications Part 2 by VMware, Inc.

October 2010 - (Free Research)
Read this part 2 of 3 transcripts from a live chat with VMware experts and learn about application performance considerations, best practices and use cases for deploying Tier 1 applications on VMware. 
(PRESENTATION TRANSCRIPT)

Presentation Transcript: Virtualizing Business-Critical Applications Part 1 by VMware, Inc.

October 2010 - (Free Research)
Read this part 1 of 3 transcripts from a live chat with VMware experts and learn about application performance considerations, best practices and use cases for deploying Tier 1 applications on VMware. 
(PRESENTATION TRANSCRIPT)

Upcoming Live Expert Chat: Virtualizing Business-Critical Applications by VMware, Inc.

October 2010 - (Free Research)
In this chat with VMware experts, learn about application performance considerations, best practices and use cases for deploying Tier 1 applications on VMware. Please join us during the live chat on October 26 from 11am-2pm ET 
(WEBCAST)

HP P4000 LeftHand SAN Solutions with VMware vSphere Best Practices by HP and Intel

December 2011 - (Free Research)
This technical white paper provides best practices and configuration guidelines on how to best integrate VMware vSphere® 5.0 with HP P4000 LeftHand SAN Solutions. 
(WHITE PAPER) READ ABSTRACT |

Six critical best practices to gain insight with Workforce Analytics by SuccessFactors

February 2014 - (Free Research)
This resource counts down six HR best practices for using workforce analytics to deliver insights. Read on to learn how workforce analytics can help you hire the right talent, determine when to train or promote employees, and more. 
(WHITE PAPER) READ ABSTRACT |

SIEM Best Practices For Advanced Attack Detection by Hewlett-Packard Company

December 2013 - (Free Research)
SIEM struggles are common, but SIEM products are critical for advanced attack detection. This expert e-guide offers best practices when implementing SIEM products and how to overcome implementation issues. 
(EGUIDE) READ ABSTRACT |

Worst Practices in SOA Implementation: Why Service-Oriented Architectures Fail by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
Service-oriented architecture (SOA) enables different programs, applications, and tools to interact via self-contained services that do not depend on the context or state of the other service. This white paper provides insight into the top-four worst practices for SOA integration, and how to avoid and/or overcome these worst practices. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Resolving Business-Critical Application Problems by BMC Software, Extending Value with Identify Software

April 2008 - (Free Research)
This white paper details the challenges of application problem resolution, highlighting the best practices necessary to automate and accelerate the process as a means to optimize development. 
(WHITE PAPER) READ ABSTRACT |

Fast Tracking Data Warehousing & BI Projects Via Intelligent Data Modeling by Embarcadero Technologies, Inc.

September 2010 - (Free Research)
In this webcast, you’ll learn from BI and enterprise modeling expert, Claudia Imhoff how intelligent data modeling practices to design and deliver superior BI faster, the characteristics and benefits of intelligent data modeling, How to promote the use of data models to fast-track data warehouse and BI projects, and more. 
(WEBCAST) READ ABSTRACT |

Effectively virtualize mission-critical applications by building the right infrastructure by VMware, Inc.

November 2010 - (Free Research)
As the gold standard in data center virtualization technologies, VMware® provides a broad portfolio of capabilities that organizations can leverage to maximize the value, efficiency, and effectiveness of their virtualization initiatives. This white paper discusses the best way to virtualize mission-critical applications with VMware technology. 
(WHITE PAPER) READ ABSTRACT |

Valuing the Need for Data Speed at Critical Business Inflections by BlueArc Corp.

June 2008 - (Free Research)
The survey represents a close look into the issues, drivers, challenges, imperatives and best practices in maintaining system uptime in the midst of exploding demand for increased data performance and storage. 
(WHITE PAPER) READ ABSTRACT |

Locking Down Your Enterprise: What You Need to Know About Database Security Inside and Outside Your Company by Oracle Corporation

December 2010 - (Free Research)
This e-Book will take a look at how database managers can evolve their security strategies to match the increasingly sophisticated technologies used by hackers to attack their mission critical data. 
(EBOOK)

7 Keys to Success for Managing a Business-Critical Cloud with Confidence by Hewlett-Packard Company

April 2012 - (Free Research)
Need a few tips on how to manage your cloud infrastructure? Here are seven best practices that will keep your business-critical cloud environment up and running. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Power and Cooling Best Practices for Large Data Centers by Schneider Electric

August 2011 - (Free Research)
This expert e-guide from editors explores key power and cooling tips to optimize data center energy efficiency. In addition, discover best practices for backup power maintenance to ensure uninterrupted data center power. 
(EGUIDE) READ ABSTRACT |

The Best Best Practice Guide: Benchmarking for Service Desk Success by GoToAssist

November 2010 - (Free Research)
Benchmarking is a critical process for any Service Desk that wants to gauge the quality of their service delivery. Too often, however, desks are overly concerned with industry benchmarks and hitting industry standards for call waiting times, resolution time and the perennial cost per email. Download the SDI best practices guide to learn more! 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts