Directories Source Professionals AreWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Directories Source Professionals Are returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Enterprise Systems Management
 •   Data Center Management
 •   Authentication / Password Management
 •   Application Security
 •   Network Security
 •   Application Management and Maintenance
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Directories Procedure
 •   Directories Source Customers
 •   Directories Source Professionals Service
 •   Directories Source Professionals Usa
 •   Directories Source Rhode Island
 •   Directories Terms
 •   Manufacturers Directories
 •   Measurement Directories Source
 •   Offices Directories Source
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Centrify Express 2010.1 by Centrify Corporation

August 06, 2010 - (Free Research)
Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings. 
(DOWNLOAD)

Presentation Transcript: Understanding the Differences Between Desktop and Server Virtualization by Dell, Inc.

September 05, 2011 - (Free Research)
Access this exclusive resource to discover the fundamental differences of virtual desktops and virtual servers and how to find out which one is best for your organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Cloud: Practical Advice for Taking the Next Steps - Americas by Hewlett-Packard Company

March 04, 2010 - (Free Research)
By attending this complimentary, interactive, virtual conference, you will receive the latest independent expert insight and best practices to determine how to properly implement cloud at your organization and achieve all the benefits this technology offers... 
(VIRTUAL TRADE SHOW) READ ABSTRACT |

Cloud: Practical Advice for Taking the Next Steps by Hewlett-Packard Company

March 01, 2010 - (Free Research)
By attending this complimentary, interactive, virtual conference, you will receive the latest independent expert insight and best practices to determine how to properly implement cloud at your organization and achieve all the benefits this technology offers... 
(VIRTUAL TRADE SHOW) READ ABSTRACT |

Presentation Transcript: Understanding the Differences Between Desktop and Server Virtualization by Dell and VMware

September 05, 2012 - (Free Research)
Access this exclusive resource to discover the fundamental differences of virtual desktops and virtual servers and how to find out which one is best for your organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Evaluation Guide: SharePoint 2010 for the Professional Developer by Microsoft Corporation India Pvt Ltd

December 04, 2009 - (Free Research)
The SharePoint 2010 developer evaluation guide describes the SharePoint 2010 developer platform, including walkthroughs of some of the new capabilities for developers. 
(EGUIDE) READ ABSTRACT |

Identity Simplification and Consolidation through Virtualization and Synchronization by Agilysys-Sun Technology Solutions

March 09, 2009 - (Free Research)
You'll want to read this paper if simplifying your company's identity and access management (IAM) infrastructures are on your agenda. Directory virtualization provides new opportunities to move towards this goal by abstracting disparate sources of identity data and presenting them in a unified fashion. Read on for details and more information. 
(WHITE PAPER) READ ABSTRACT |

Economic Value Validation of Riverbed Performance Management Cascade by Riverbed Technology, Inc.

December 31, 2013 - (Free Research)
Businesses continue to change their data centers and networks to better adapt to the global marketplace. This guide explores the role of the data center in the ever-changing IT landscape and how IT professionals are dealing with these changes. 
(WHITE PAPER) READ ABSTRACT |

Salary Report: Trends in IT Compensation and Certifications by Global Knowledge Network, Inc.

May 2006 - (Free Research)
Global Knowledge keeps up to date with trends in IT careers, certifications, and compensation. In this, our inaugural quarterly report, we offer a look at salaries for the top 25 IT jobs, organized by region. We also offer a look at the top certifications and in-depth analysis from our resident market research analyst. 
(ANALYST REPORT) READ ABSTRACT |

HRG Assessment: Comparing IBM PureSystems and HP Converged Systems by IBM

December 2012 - (Free Research)
Read this informative paper to discover how IT professionals are keeping pace with today's IT complexity. Included is a comparison of two integrated system offerings – IBM PureSystems and HP Converged Systems. Read on for an in-depth analysis of both offerings 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth by IBM

May 2011 - (Free Research)
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust. 
(EGUIDE) READ ABSTRACT |

A Unified Records Management Approach to Maximize SharePoint and Social Media by Iron Mountain

December 2012 - (Free Research)
As the use of social media and SharePoint technologies continues to rise, effective records management is becoming more difficult than ever before.  Inside this paper, learn best practices for effectively managing SharePoint and social media, including 5 questions to consider and 4 key issues to address when designing your overall strategy. 
(WHITE PAPER) READ ABSTRACT |

Technology Industry Survey 2014 by ComputerWeekly.com

November 2013 - (Free Research)
From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry. 
(RESOURCE) READ ABSTRACT |

Toad for Data Analysis - Query, Understand & Report on Data From Any Source by Dell Software

Toad for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports. 
(ASP & SOFTWARE PRODUCT)

The 2008 (ISC)2 Global Information Security Workforce Study by ISC2

May 2008 - (Free Research)
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide. 
(WHITE PAPER) READ ABSTRACT |

How social media drives business success by ComputerWeekly.com

May 2012 - (Free Research)
There is a growing recognition that rather than being a distraction or a time drain, social tools could hold the key to a more productive way of doing business, this report from Google argues. 
(IT BRIEFING) READ ABSTRACT |

IBM Social Analytics: The science behind social media marketing by IBM

December 2011 - (Free Research)
Access this white paper to learn how savvy marketing professionals are using new technologies to learn about their customers' attitudes, preferences and buying habits from what they say publically, available on social media and through the full range of interactions that can be recorded, measured, and analyzed. 
(WHITE PAPER) READ ABSTRACT |

IT pay & compensation survey 2012/2013 by ComputerWeekly.com

April 2013 - (Free Research)
This report assess the  bonuses and pay rises IT professionals received in 2012 and their compensation expectations for 2013 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW+ XpertHR: Computer staff salary survey by ComputerWeekly.com

July 2010 - (Free Research)
Although pay levels are unlikely ever again torise as fast as they did at the end of the 1990s when fears about the “millennium bug” stoked thefires of an already over-heated job market – or to fall as fast as they did when the bug failed to bite– employers are acutely aware of the need to keep a close eye on short- and long-term pay trends. 
(WHITE PAPER) READ ABSTRACT |

IBM's Approach to Advanced Persistent Threats by IBM

August 2012 - (Free Research)
Access this video to learn more about advanced persistent threats (APTs) and how to address them. Topics covered the nature of APTs, preventative measures to take, and how professionals are addressing this challenge. 
(VIDEO) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

Solution Summary  - Secure Cloud by Radiant Logic, Inc.

February 2011 - (Free Research)
This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine by SearchSecurity.com

February 2014 - (Free Research)
In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year. 
(EGUIDE) READ ABSTRACT |

Active Directory Disasters and Tools to Prevent Them by Dell Software

January 2013 - (Free Research)
Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives? 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts