Data HowWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data How returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Network Security
 •   Data Security
 •   Virtualization
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Data Quality
 •   Statistical Data Analysis
 •   Fraud Detection & Prevention
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Data How Capacities
 •   Data How Research
 •   Data How Tool
 •   Data Needs
 •   Data Texas
 •   Full Data How
 •   Service Data
 •   Summary Data
 •   Terminal Data How
 •   White Papers Data How
Advertisement

ALL RESULTS
1 - 25 of 442 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Analytics: The real-world use of big data - How innovative enterprises in the midmarket extract value from uncertain data by IBM

July 15, 2013 - (Free Research)
While big data means many things to many people, there's no arguing that today it's a business imperative. Recent research findings show that midsize organizations are just as likely to be using big data technologies to tap into data sources and get closer to their customers. 
(WHITE PAPER) READ ABSTRACT |

Protecting Credit Card Data: How to Achieve PCI Compliance by Motorola, Inc.

July 2007 - (Free Research)
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution. 
(WHITE PAPER) READ ABSTRACT |

HP TippingPoint: Next Generation Intrusion Prevention System by Hewlett-Packard Company

August 2012 - (Free Research)
Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company. 
(WHITE PAPER) READ ABSTRACT |

Leveling the Playing Field: How Companies Use Data for Competitive Advantage by SAP America, Inc.

August 2011 - (Free Research)
This report from the Economist Intelligence Unit examines how their practices are evolving and offers examples of data use at some highly successful companies. 
(WHITE PAPER) READ ABSTRACT |

Rewriting the Rules of Patch Management by IBM

February 2011 - (Free Research)
By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps. 
(WHITE PAPER) READ ABSTRACT |

New Research: How to Improve Your B2B Email Marketing Results in 2007 PDF Slides by KnowledgeStorm Webinars (E-mail this company)

February 2007 - (Free Research)
View the slides presented in the "New Research: How to Improve Your B2B Email Marketing Results in 2007" Webcast and find out how 3,637 marketers responded to tough questions about their open, click and conversion rates. Also, find out which tests work best, what's not working, list growth strategies and how email budgets are changing for 2007. 
(ANALYST REPORT) READ ABSTRACT |

New Research: How to Improve Your B2B Email Marketing Results in 2007 by KnowledgeStorm Webinars (E-mail this company)

January 2007 - (Free Research)
Find out how 3,637 marketers responded to tough questions about their open, click and conversion rates. Also, find out which tests work best, what's not working, list growth strategies and how email budgets are changing for 2007. Invite your entire team to attend – attendance for this Webcast is free! 
(WEBCAST) READ ABSTRACT |

Application Tiering and Tiered Storage by Dell, Inc.

March 2009 - (Free Research)
Storage consolidation brings many applications together to a single storage pool. It improves storage utilization, simplifies management, and increases reliability in well implemented SANs. While consolidation makes it easier to manage, provision, and backup your data, how do you manage different application service level requirements? 
(ANALYST BRIEF) READ ABSTRACT |

Capitalize on Business Opportunities and Respond to New Industry Situations: Quickly Extend Business Applications and Connectivity Solutions to Customers, Partners and Suppliers with Industry Data Acceleration by IBM

October 2009 - (Free Research)
This paper describes benefits of integrating industry data, how partner and supplier integration through industry connectivity can help maximize the value and effectiveness of a service-oriented architecture (SOA) or business process management (BPM) initiative, and the IBM® WebSphere® portfolio of products available to achieve such integration. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: FAQ: What is Health Data Archiving? by BridgeHead Software

January 2011 - (Free Research)
Read this E-guide to learn more about the regulations involved in storing health data, how a SAN can improve data archiving and how to weigh the pro's and con's to achieve the most efficient data archiving strategy for your organization. 
(EGUIDE) READ ABSTRACT |

Virtual Data Center: Health Care IT Edition, Sept. 2011 by SearchDataCenter.com

September 2011 - (Free Research)
Cloud computing holds a lot of promise for the healthcare industry, since infrastructure costs can hinder the adoption of EHR systems. However, many providers shy away from cloud services because of security concerns. Inside this e-zine, gain insight on how to utilize the cloud while still ensuring patient data security and HIPAA compliance. 
(EZINE) READ ABSTRACT |

Business Information ASEAN May 2014 by SearchDataManagement

April 2014 - (Free Research)
This ezine looks at how IT professionals in the ASEAN region are attempting to harness Big Data. 
(EZINE) READ ABSTRACT |

Business Information ANZ May 2014 by SearchDataManagement

April 2014 - (Free Research)
This ezine looks at how businesses in the ANZ are attempting to harness Big Data. 
(EZINE) READ ABSTRACT |

Presentation Transcript: How to Cut Your Primary Storage Costs in Half by Ocarina Networks

February 2009 - (Free Research)
In this paper Marc Staimer presents one of the biggest issues decision makers tasked with managing storage budgets that aren't growing at the same rate as their data. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Extracting Business Value from Unstructured Data by HP & Intel®

March 2013 - (Free Research)
Though the value of extracting intelligence from high-volume unstructured data is attractive, attempting to do so without a strategy could be disastrous for your company.  This expert-created e-guide illustrates how companies can successfully extract and analyze data to make better business decisions and reap the most benefits. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Microsoft Licensing made simple for Mobile Users, Desktop Virtualization and BYOD by Dell and Microsoft

May 2014 - (Free Research)
Read this presentation transcript to learn more about user-centric licensing, and how Microsoft and Dell are working together to make licensing simpler than ever before. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Podcast: Microsoft Licensing made simple for Mobile Users, Desktop Virtualization and BYOD by Dell and Microsoft

May 2014 - (Free Research)
Listen to this audio presentation to learn more about user-centric licensing, and how Microsoft and Dell are working together to make licensing simpler than ever before. 
(PODCAST) READ ABSTRACT |

Microsoft Licensing Made Simple for Mobile Users, Desktop Virtualization and BYOD by Dell and Microsoft

April 2014 - (Free Research)
Watch this video to learn more about user-centric licensing, and how Microsoft and Dell are working together to make licensing simpler than ever before. 
(WEBCAST) READ ABSTRACT |

Ten Steps to Protecting Your Sensitive Data by McAfee.

December 2010 - (Free Research)
Data loss prevention has become a major focus for companies of all sizes. One reasonis for this is mobile employees carry an increasingly large collection of sensitive data. How can you protect your organization's sensitive data from loss or theft? Read these ten steps. 
(ANALYST BRIEF) READ ABSTRACT |

Your Small Business Security Questions Answered: Social Networks, Sensitive Data, and Business Banking by AVG Technologies USA, Inc.

April 2010 - (Free Research)
This brief paper provides in depth answers to three pressing questions that many small businesses are asking about IT security: If social networks are such a risk, shouldn't we just block them? How liable am I for the loss of sensitive data? How safe is online business banking? Read on to learn the answers to these three questions and more. 
(WHITE PAPER) READ ABSTRACT |

How CIOs are overcoming common data challenges by Oracle Corporation UK Ltd

May 2012 - (Free Research)
Innovative CIOs are recognizing the connection between their enterprise's continued success and the ability to manage and mine large data sets. In this exclusive resource discover the ways other CIOs are utilizing big data, and expert tips for combating big data's biggest challenge, date storage. 
(EGUIDE) READ ABSTRACT |

E-Guide: Real-world Big Data strategies for analytics by ParAccel

November 2011 - (Free Research)
When dealing with large-scale data how you do know what data is worth analyzing? Read this E-Guide to find out how other companies are sifting through their data to get huge business benefits. 
(EGUIDE) READ ABSTRACT |

Computer Weekly Buyer's Guide to Mobile Device Management by TechTarget

March 2014 - (Free Research)
The trend for consumerisation and employees using their own devices for work comes as concerns over data security mount. In this 11-page buyer's guide, Computer Weekly examines how to formulate a strategic policy for mobile device management (MDM), and how to choose the right MDM approach and product portfolio for your organization. 
(RESOURCE)

Building the Business Case for a Mobile-First Infrastructure Refresh by Insight

May 2014 - (Free Research)
This whitepaper examines the true benefits of implementing a “mobile-first” infrastructure - including how it can help improve manageability, productivity and the end-user experience – and how to successfully manage mobility in your organization. 
(WHITE PAPER) READ ABSTRACT |

Dancing with Elephants - Making Your Business Processes Agile by Fujitsu America, Inc.

January 2011 - (Free Research)
Think Agile BPM is not for you because you don't have simple processes that follow the same path every time? Think again. This webcast illustrates how Agile BPM allows you to get results by striking the right balance between structure and flexibility in processes how Fujitsu's Agile BPM solution can help you to achieve that goal. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 442 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts