End TrendsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: End Trends returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Network Security
 •   Application Security
 •   Statistical Data Analysis
 •   Storage Security
 •   Endpoint Security
 •   Disk-based Backup & Storage/ RAID
 •   Application Management and Maintenance
 •   Secure Instant Messaging
 •   Data and Application Distribution

Related Searches
 •   End Devices
 •   End Trends Methods
 •   End Trends Timeline
 •   Finding End
 •   Notes End Trends
 •   Organizational End Trends
 •   Part End Trends
 •   Performance End Trends
 •   Standards End Trends
 •   System End Trends
Advertisement

ALL RESULTS
1 - 25 of 457 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to make the storage decisions to ensure virtualisation success by ComputerWeekly.com

April 04, 2010 - (Free Research)
This report examines the tools, technologies and best practices forbuilding an effective virtualisation strategy, with a particular focuson the role of storage for success in server virtualisation to achievegreater efficiencies through optimising infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 01, 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security by Trend Micro, Inc.

January 31, 2011 - (Free Research)
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management. 
(WHITE PAPER) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 21, 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

InterScan Messaging Hosted Security (IMHS) Trial by Trend Micro, Inc.

August 21, 2009 - (Free Research)
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7. 
(DOWNLOAD) READ ABSTRACT |

LiveWire Mobile Brings Music to Your Ears with Insight from Business Objects by SAP America, Inc.

June 01, 2008 - (Free Research)
Read this case study and see how Business Objects helped Livewire manage their royalty stream for end-user downloads, measuring performance and the end-user experience, and analyzing trends quickly and accurately. 
(CASE STUDY) READ ABSTRACT |

CommVault counts on snapshot management for data protection by CommVault Systems, Inc.

October 29, 2012 - (Free Research)
This research paper examines CommVault's progress in snapshot management – launching its latest data recovery management software for application-aware snapshot management of heterogeneous disk arrays to take advantage of end user trends. 
(WHITE PAPER) READ ABSTRACT |

IBM Business Analytics for Linux on System z by IBM

August 18, 2010 - (Free Research)
This paper presents the case for business analytics, outlining the trends that are redefining analytics and the weaknesses of decentralized analytics solutions. Gain additional insight into IBM Business Analytics solutions on System z, an end-to-end solution that includes BI, predictive analytics and data warehousing on a single platform. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: On Implementation Trends and Lean Supply Chain Management (SCM) by E2open

April 17, 2009 - (Free Research)
Read this presentation transcript to learn what a lean supply chain is and how it can cut costs out of your supply chain, as well as make your supply chain as efficient as possible. Learn what steps a company must take to make its supply chain lean, and the top ten technology trends to implement a lean supply chain, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Understanding the Benefits of Application Virtualization by Dell and Microsoft

June 28, 2012 - (Free Research)
Explore how application virtualization can help your business prepare for the consumerization of IT. Access this expert resource to gain insights on its many use cases, how it differs from desktop virtualization, and the substantial benefits it can offer both your IT department and end-users. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 2 by Dell, Inc.

February 10, 2012 - (Free Research)
The second edition of BI Trends & Strategies, an e-zine offering advice on business intelligence (BI), analytics and data warehousing, explores whether or not it's the end of enterprise data warehouses as we know them, how to manage multiple business intelligence (BI) tools at once and the potential uses of data virtualization tools. 
(EZINE) READ ABSTRACT |

X-Force Mid-Year Trend Report by IBM

January 11, 2012 - (Free Research)
This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. 
(ANALYST REPORT) READ ABSTRACT |

A Next-Gen Solution for Application Visibility and Control by Citrix

March 29, 2013 - (Free Research)
Are you ready to solve the application visibility challenge? This resource outlines how a next-gen visibility solution provides the end-to-end visibility you need to win the battle. 
(WHITE PAPER) READ ABSTRACT |

Game-changing business analytics trends for 2011 and beyond by IBM

September 29, 2011 - (Free Research)
This expert e-guide explores new and emerging business analytics trends and technologies that have the potential to give companies the competitive advantage they need. 
(EGUIDE) READ ABSTRACT |

The InfoPro end-user storage study highlights shifts in data protection by The 451 Group (E-mail this company)

October 02, 2012 - (Free Research)
In this Spotlight report, we analyze the data protection findings from the latest TIP Storage Wave study. Among mid-large sized enterprises, the hot spots are de-duplication appliances and backup/recovery for virtual servers – not cloud storage. 
(WHITE PAPER) READ ABSTRACT |

Workplace Mobility, Consumerization, and Alternative IT Strategy Drive End-user Computing Transformation by VMware, Inc.

December 31, 2013 - (Free Research)
Access this exclusive, informative white paper to find out how organizations are accommodating the end-user computing transformation. 
(WHITE PAPER) READ ABSTRACT |

Benefits and Best Practices For Deploying SSDS In An OLTP Environment Using Dell Equallogic PS Series by Dell, Inc.

May 05, 2009 - (Free Research)
Using Solid State Disks (SSDs) in enterprise storage arrays is one of today's hottest storage trends. This whitepaper discusses the best practices for deploying SSDs in an OLTP environment using Dell EqualLogic PS Series arrays. 
(WHITE PAPER) READ ABSTRACT |

Gain Visibility And Insight Into All Your Application Investments by Hewlett-Packard Company

August 31, 2012 - (Free Research)
Trends such as Agile development, mobile applications, outsourcing, and composite applications are changing the definition of application lifecycle management (ALM). You need a complete end-to-end view of your application investments -- you need project and portfolio management (PPM) as a part of your ALM strategy. 
(WHITE PAPER) READ ABSTRACT |

IT Handbook: Beyond PC’s: Navigating the New End User Client Landscape by SearchSecurity.com

March 15, 2013 - (Free Research)
Access this expert guide to get an in-depth understanding of the various kinds of mobile devices that your environment needs to be able to support. Learn how trends such as consumerization and bring your own device (BYOD) can be utilized to boost productivity, mobility and efficiency. 
(EBOOK) READ ABSTRACT |

IT Handbook : Smartphones & Tablets in the Enterprise by SearchSecurity.com

April 10, 2012 - (Free Research)
This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization. 
(EGUIDE) READ ABSTRACT |

How to get more from BYOD by Cisco (E-mail this company)

March 20, 2014 - (Free Research)
This exclusive paper examines a set of mobile solutions designed to enable BYOD environments by combining best-of-class technology, validated designs, and end-to-end support. 
(WHITE PAPER) READ ABSTRACT |

E-Book: The New Best Practices for Document Imaging, OCR, and Scanning by Nuance

July 12, 2011 - (Free Research)
Successful document management begins with efficient and well-managed document imaging, scanning and capture processes. This eBook examines the latest trends in document imaging and scanning, as well as optical character recognition (OCR), and provides expert advice on best practices in those areas. 
(EBOOK)

Splunk for Business Analytics by Splunk

April 04, 2012 - (Free Research)
This paper looks at one way of improving your analytics capabilities and gaining end-to-end visibility into the trends and behaviors of customers, services and systems. 
(WHITE PAPER) READ ABSTRACT |

Helping CRM Serve Its Purpose: How to Reduce the Increasingly Complex Risks That Threaten ROI by OnDemand Software

April 2008 - (Free Research)
This white paper briefly highlights CRM's recent evolution, examines the risks that accompany those developments and most important identifies the capabilities contained in an effective synchronized content development platform. 
(WHITE PAPER) READ ABSTRACT |

Global Threat Trends- Year-End Report 2009 by ESET

January 2010 - (Free Research)
In this paper you'll learn the most prevalent threats, including their percentage values relative to all the threats detected by ThreatSense.Net®. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 457 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts