Designs Information ConferenceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Designs Information Conference returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Unified Communications / Voice & Data Convergence
 •   Wireless Security
 •   Collaborative Tools
 •   Managed Security Services

Related Searches
 •   Designs Analyst
 •   Designs Information Conference Risks
 •   Designs Information Conference Source
 •   Designs Information Knowledge
 •   Do Designs
 •   Function Designs
 •   Online Designs Information Conference
 •   Price Designs
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Solution Sheet: IBM tiered storage management helps reduce costs and complexity by IBM

October 2006 - (Free Research)
IBM storage software provides powerful capabilities to manage information through its lifecycle and customers can align data value with storage costs and required service levels. 
(WHITE PAPER) READ ABSTRACT |

Four Key Elements to Improving Systems Engineering in Aerospace and Defense by IBM

December 2010 - (Free Research)
This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration. 
(WEBCAST) READ ABSTRACT |

IBM Information On Demand Virtual 2010 by IBM

December 2010 - (Free Research)
Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals. 
(WEBCAST)

Airflow Uniformity through Perforated Tiles in a Raised-Floor Data Center by APC by Schneider Electric

January 2005 - (Free Research)
In this paper, the impact of data center design parameters on perforated tile airflow is quantified and methods of improving the uniformity are discussed. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Improve Organizational Communications by Cisco Systems, Inc.

October 2011 - (Free Research)
As an organization’s workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Learn about a collaboration platform that allows for improved employee communication and productivity. 
(WHITE PAPER)

How to Give a Killer Presentation: Lessons from TED by Citrix Online Go To Meeting

June 2013 - (Free Research)
In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 13 March 2012: The economics of private cloud by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT. 
(EZINE)

Creating a Mobile-Centric Organization by Hewlett-Packard Company

September 2013 - (Free Research)
Discover an innovative approach to designing and deploying networks that can help you support a mobile workforce while lowering costs and cutting complexity. 
(WHITE PAPER) READ ABSTRACT |

Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge by IBM

December 2012 - (Free Research)
This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting. 
(EGUIDE) READ ABSTRACT |

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com

October 2009 - (Free Research)
This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more. 
(PRESENTATION) READ ABSTRACT |

SCOPIA Connector for Microsoft Office Communications Server (OCS) 2007 by RADVISION

February 2008 - (Free Research)
The new SCOPIA OCS 2007 Connector enhances the Microsoft solution providing the capability for Office Communicator users to participate in conferences with standards-based video conferencing systems and devices. 
(ARTICLE) READ ABSTRACT |

Tip Guide: 'Big data' is friend, foe or fake? TDWI conference goers weigh in by Sybase, an SAP company

February 2012 - (Free Research)
This brief yet exceptional expert tip guide from SearchBusinessAnalytics.com offers market insight from attendees of the 2012 The Data Warehousing Institute's BI Executive Summit. Learn from these experienced thinkers whether big data is all 'hype' or if it is a justified and meaningful tool. 
(EGUIDE) READ ABSTRACT |

Managing Security on Mobile Phones by Nokia

January 2008 - (Free Research)
This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges. 
(ANALYST REPORT) READ ABSTRACT |

Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Presentation Transcript) by Oracle Corporation

August 2013 - (Free Research)
In this presentation transcript Jon discusses LTFS, Linear Tape File System – what it's designed to do, who's using it today, and if and when it is a dominant file storage platform. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

jQuery on Rails (The Real Ones) by The Ajax Experience

January 2009 - (Free Research)
The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users. 
(PODCAST) READ ABSTRACT |

Infosecurity Europe 2014 by ComputerWeekly.com

February 2014 - (Free Research)
Infosecurity Europe is the largest IT security event in Europe. Held in London, it is a free exhibition with over 325 exhibitors featuring the most diverse range of new products and services and an unrivalled free education programme. Register today! 
(BROCHURE) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

How Big Data Benefits Enterprise Information Security Posture by EMC Corporation

June 2013 - (Free Research)
In this expert guide from SearchSecurity.com, industry experts at the RSA Conference 2013 explain how big data benefits enterprise information security posture and how your organization can take security big data to the next level. 
(EGUIDE) READ ABSTRACT |

IBM Lotus Sametime Software Integration with Microsoft Applications: Connecting, Conversing and Collaborating More Conveniently by IBM

March 2009 - (Free Research)
Check out this paper to learn about the many benefits of IBM Lotus Sametime software integration and how it can enhance the collaboration and unified communications capabilities of all your Microsoft Office applications. 
(WHITE PAPER) READ ABSTRACT |

Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by ZANTAZ

January 2008 - (Free Research)
This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold." 
(WHITE PAPER) READ ABSTRACT |

CW Europe – March Edition by ComputerWeekly.com

March 2013 - (Free Research)
Never have we been so open about the information we share online, without so little concern for our privacy. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. 
(EZINE) READ ABSTRACT |

SharePoint Conference 2009: Steve Ballmer Keynote Address by Microsoft Corporation India Pvt Ltd

December 2009 - (Free Research)
This video covers highlights from the Microsoft SharePoint Conference in 2009, including Microsoft CEO Steve Ballmer's keynote address. 
(VIDEO) READ ABSTRACT |

SCOPIA Conferencing Platform for IBM® Lotus® Sametime® by RADVISION

June 2008 - (Free Research)
The SCOPIA Conferencing Platform with SCOPIA Desktop enables users to create and initiate multiparty audio and video conferences directly from within Lotus Sametime. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts