Ebay FindWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Ebay Find returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Application Servers
 •   Availability, Performance and Problem Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Purchasing
 •   Data Center Management
 •   Backup Systems and Services
 •   Enterprise Systems Management
 •   Customer Experience Management (CEM)

Related Searches
 •   Buying Ebay Find
 •   Ebay Download
 •   Ebay Find Address
 •   Ebay Find Development
 •   Ebay Prices
 •   Events Ebay Find
 •   Example Ebay Find
 •   Filing Ebay Find
 •   Licenses Ebay Find
 •   Reporting Ebay Find
Advertisement

ALL RESULTS
1 - 25 of 437 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly – 13 May 2014: Retail's data challenge by ComputerWeekly.com

May 12, 2014 - (Free Research)
In this week's Computer Weekly, we look at how data analytics is driving a new approach to customer relationship management within the retail sector. Customer who shops in multiple channels offer greater value to retailers. We find out how auction site eBay has developed a bespoke data analytics architecture to track every customer interaction. 
(EZINE) READ ABSTRACT |

EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard by Qualys, Inc.

May 2008 - (Free Research)
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks. 
(CASE STUDY) READ ABSTRACT |

Big Data in Big Companies by SAS

April 2014 - (Free Research)
Explore the following white paper to join analytics pioneer, Tom Davenport, as he reveals the findings of how big data fits into the data and analytics infrastructure of 20 large organizations. Find out how these companies are handling big data, the tools and skill sets used to maximize ROI, and what the future holds with analytics 3.0. 
(WHITE PAPER) READ ABSTRACT |

Big Data in Big Companies by Red Hat

April 2014 - (Free Research)
Explore the following white paper to join analytics pioneer, Tom Davenport, as he reveals the findings of how big data fits into the data and analytics infrastructure of 20 large organizations. Find out how these companies are handling big data, the tools and skill sets used to maximize ROI, and what the future holds with analytics 3.0. 
(WHITE PAPER) READ ABSTRACT |

Business Information E-Zine: NoSQL Makes its Mark by SearchBusinessAnalytics

April 2014 - (Free Research)
In this issue, we drill down on the facts of NoSQL databases, tapping into the experiences of savvy startups and other companies whose needs led them to NoSQL technologies. But is NoSQL right for you? Companies with fast-growing vaults of Web, social media, demographic and machine data should pay attention. IT experts chime in with timely advice. 
(EZINE) READ ABSTRACT |

Computer Weekly – 20 May 2014: The future of networks by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, we look how IT and networking departments are addressing demand for apps, bandwidth and services. Virtualisation technology is being used to consolidate multiple network equipment types onto industry-standard high-volume servers, switches and storage. 
(EZINE) READ ABSTRACT |

Technology industry at the cross-roads: Transforming quote-to-cash operations by ComputerWeekly.com

March 2013 - (Free Research)
This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Technology industry at the cross-roads: Transforming quote-to-cash operations by ComputerWeekly.com

March 2013 - (Free Research)
This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Data Center Servers and Storage E-Book Chapter 4: Reallocating Unused Server and Storage Hardware by SearchDataCenter.com

October 2011 - (Free Research)
With a bit of planning, a specific tiering-out of your system priorities and a dash of virtualization, you can breathe new life into your old servers -- even as you bring in replacements with all of their powerful new capabilities. Read this e-book to learn more. 
(EBOOK) READ ABSTRACT |

Data Center Servers & Storage E-Book Chapter 4: Reallocating Unused Server and Storage Hardware by Dell, Inc. and Intel®

November 2010 - (Free Research)
Virtualization's abstraction of resources offers some compelling solutions for keeping around old equipment past its usefulness for primary workloads. In chapter 4 of this e-book, you'll learn smarter ways to deal with reallocating your unused server and storage hardware. 
(EBOOK) READ ABSTRACT |

Data Center Servers & Storage E-Book Chapter 4: Reallocating Unused Server and Storage Hardware by Dell, Inc. and Intel®

June 2010 - (Free Research)
Virtualization's abstraction of resources offers some compelling solutions for keeping around old equipment past its usefulness for primary workloads. In chapter 4 of this e-book, you'll learn smarter ways to deal with reallocating your unused server and storage hardware. 
(EBOOK) READ ABSTRACT |

Vblock Drives Enterprise Cloud Growth for CSC by VCE (E-mail this company)

October 2013 - (Free Research)
Faced with the need to meet client demands for cloud-based IT support, systems integrator Computer Sciences Corporation (CSC) needed to find a new infrastructure that was built to handle cloud deployments. Read this case study to discover the approach they took. 
(WHITE PAPER) READ ABSTRACT |

Email archiving services by Arrow Electronics, Inc.

June 2008 - (Free Research)
Get details on the dynamics at play around email archiving: SEC regulations, backup considerations and best practices for retention. Finally, find out which hardware and software products do a good job at email archiving. 
(WEBCAST) READ ABSTRACT |

It's Not "If" You Collaborate, But "How" by Cisco Systems, Inc.

September 2009 - (Free Research)
To learn more about who collaborates and why, Cisco recently conducted one of the first comprehensive studies of the personal and cultural factors associated with successful adoption of network based collaboration. Read the full report, and find out more about how collaboration transforms business. 
(VIDEO)

Faster Oracle performance with IBM FlashSystem by IBM

May 2013 - (Free Research)
In an attempt to improve their Oracle database performance, many organizations are finding results by using flash storage to accelerate the most resource-intensive data that slows performance across the board. Access this resource today to find a discussion of methods for identifying I/O performance bottlenecks. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing by IBM

January 2011 - (Free Research)
Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Find the most effective cloud services for your business by HP & Intel®

October 2011 - (Free Research)
HP is driving the evolution of what we call the Instant-On Enterprise. It is an enterprise that embeds technology into everything it does to better serve citizens, partners, employees, and clients. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

Case Study: GoldenTree Asset Management by ESET

October 2010 - (Free Research)
In this case study you’ll learn how one London finance company did the following: found malware other AV products weren’t finding; secured the environment; witnessing virus protection doing what it is designed to do. Read on to learn so much more. 
(CASE STUDY) READ ABSTRACT |

eBook: Evaluating CRM: From SaaS to software, choosing the right CRM deployment style by Aplicor

March 2009 - (Free Research)
In this eBook, find out how on-demand and SaaS CRM is altering the CRM software landscape. Learn how both on-demand and on-premise CRM have evolved in recent years and how industry trends are playing into the decision-making process at many organizations. 
(EBOOK) READ ABSTRACT |

Find the Best Virtual Backup Software for Your Virtualized Environment by Symantec Corporation

December 2013 - (Free Research)
Check out this exclusive resource to find research that will help you understand what's new in the virtual backup market, evaluate potential vendors and products and determine which products are best for your business environment. 
(WHITE PAPER) READ ABSTRACT |

More Than Nothing, a Zero Client Simplifies the Desktop by SearchVirtualDesktop.com

February 2014 - (Free Research)
In this article, you'll find a detailed examination of what zero clients are, how they work, what their primary benefits might be and where their key limitations are to be found. 
(EBOOK) READ ABSTRACT |

Maintaining security in managed services by SearchSecurity.com

December 2011 - (Free Research)
Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model. 
(EGUIDE) READ ABSTRACT |

Optimizing the performance of ESB by SearchBusinessAnalytics

March 2012 - (Free Research)
The enterprise service bus (ESB) and what it does are still points of confusion and contention. Read this expert e-guide to find out why an ESB is indispensable to any application integration project. Also, find out how open source ESB options are changing the market and why this will matter to buyers. 
(EGUIDE) READ ABSTRACT |

Linux in the Mainstream: Highlighting Customers Running Their Business on Red Hat Enterprise Linux by Red Hat

January 2013 - (Free Research)
This IDC whitepaper presents three case studies of customers using Linux for large deployment, business-critical applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 437 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts