Event EmployeeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Event Employee returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Process Management (BPM)
 •   Event Automation
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Network Security

Related Searches
 •   Demos Event Employee
 •   Event Employee Communication
 •   Event Minnesota
 •   Event Process
 •   Event Rfi
 •   Impact Of Event Employee
 •   Manufacturing Event Employee
 •   Pos Event Employee
 •   Suite Event Employee
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

A Manager’s Guide to Perfecting Performance Management: How to Transform Your Employee Review Process by Ultimate Software

April 30, 2013 - (Free Research)
Experts agree that traditional, once-a-year employee reviews are holding back business performance. This resource counts down six simple steps that will help you perfect employee performance management at your organization. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Business Wire hosts award-winning events for client education with GoToWebinar by Citrix Online

June 24, 2009 - (Free Research)
Business Wire, a global market leader in commercial news distribution, adopted Citrix® GoToMeeting® with GoToWebinar® in order to enhance communication with clients, increase employee training and deliver added value to customers by providing top-notch educational Webinars. Download the case study to learn more. 
(CASE STUDY) READ ABSTRACT |

Six Secrets to 24x7 Exchange Availability by Marathon Technologies

September 28, 2009 - (Free Research)
The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster. 
(WHITE PAPER) READ ABSTRACT |

Business Analytics in the cloud: Driving business innovation through cloud computing and analytics solutions by IBM

May 14, 2013 - (Free Research)
It's no secret that businesses who build strong analytically oriented teams can set themselves apart from the crowd. Consult this white paper to learn more about how analytical are changing the game of corporate sales and supply chain operations. Find out how your business can balance quantifiable benefits against risks to make the right decisions. 
(WHITE PAPER) READ ABSTRACT |

Great Things Happen on the Road to Disaster Recovery by AppAssure Software, Inc.

April 10, 2009 - (Free Research)
In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup. 
(CASE STUDY) READ ABSTRACT |

The Cloud Risk Framework by ComputerWeekly.com

June 01, 2012 - (Free Research)
This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Essential Guide to SIMs Strategy by Information Security Magazine

October 26, 2010 - (Free Research)
Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more. 
(EGUIDE) READ ABSTRACT |

AON Case Study by GlobalScape

January 2008 - (Free Research)
Aon now uses the GlobalSCAPE single Enhanced File Transfer server to handle the needs of 500-600 users daily. 
(CASE STUDY) READ ABSTRACT |

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World by Tripwire, Inc.

February 2012 - (Free Research)
In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Fortune 500 Company Uses Rackspace Virtual Desktop Infrastructure To Unify Their Global Workforce by Rackspace Hosting

September 2011 - (Free Research)
Access this exclusive resource to find out how one company connected thousands of employees around the world and consolidated over 1,200 applications into a virtual desktop environment by deploying a hosted virtual desktop platform. 
(CASE STUDY) READ ABSTRACT |

Getting Personal with Business Continuity: Five Critical Success Factors in Overcoming Workforce Disruptions by IBM

October 2009 - (Free Research)
This white paper addresses the critical factors you need to be aware of when dealing with workforce disruption, including threats like pandemics. 
(WHITE PAPER) READ ABSTRACT |

Business Intelligence: The Strategic Imperative for CIOs by Information Builders

January 2007 - (Free Research)
Business intelligence (BI) allows organizations to integrate applications and databases essential to users and enables analysis of information to optimize decision-making. 
(WHITE PAPER) READ ABSTRACT |

Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization by McAfee, Inc.

March 2010 - (Free Research)
This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations. 
(WHITE PAPER) READ ABSTRACT |

5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by Marathon Technologies

September 2009 - (Free Research)
This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure. 
(WHITE PAPER) READ ABSTRACT |

HP Total Care Branch Office Consolidation Solutions by HP & Intel®

July 2009 - (Free Research)
If branch office consolidation is your goal, HP has developed solutions with a focus on lowering your Total Cost of Ownership (TCO) and boosting productivity for both branch office employees and IT staff. Read this paper for more details. 
(WHITE PAPER)

IBM® Cognos Financial Statement Reporting (FSR) and British Airways by IBM

June 2011 - (Free Research)
Through the years, accounting standards have changed and older processes need to be refined with the new complexities. This paper discovers how to maintain a master annual report without the risk of inaccuracies with data consolidation. 
(WHITE PAPER) READ ABSTRACT |

Monash University Video Testimonial by Concur Technologies (E-mail this company)

June 2014 - (Free Research)
Check out the following webcast to see just how Monash University was able to gain substantial benefits by revamping their records management solution. 
(VIDEO) READ ABSTRACT |

E-Guide: Uniting SIM and IAM to Boost Security by SearchSecurity.com

April 2011 - (Free Research)
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender. 
(EGUIDE) READ ABSTRACT |

Spam Is Annoying. Targeted Attacks Are Deadly by Tripwire, Inc.

March 2013 - (Free Research)
Join renowned security author Mike Cobb in this podcast as he shares valuable information regarding targeted attacks, including how they work, who's vulnerable, and how to defend yourself properly. 
(PODCAST) READ ABSTRACT |

Ensuring The Availability of Blackberry Enterprise Server by Double-Take Software

October 2009 - (Free Research)
In order to implement a plan for protecting and backing up BlackBerry handhelds, it's important to understand how the Blackberry Enterprise Server solution works within an existing email environment. This paper gives a quick lessong to that end, then concentrates on ensuring the availability of the Blackberry Enterprise Server 
(WHITE PAPER) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Increase Productivity by Providing Notebooks Beyond the Road Warriors by Intel Corporation

October 2008 - (Free Research)
Read this Forrester analyst report to learn how increased notebook deployments beyond just the road warriors and to the entire enterprise can benefit your company. 
(ANALYST REPORT)

International Marketing Company Gains Quick and Easy Messaging Disaster Recovery by Microsoft

August 2007 - (Free Research)
This case study examines the benefits Catalina Marketing began reaping once they signed up for Microsoft Exchange Hosting Services. 
(CASE STUDY) READ ABSTRACT |

Printing: a false sense of security? by ComputerWeekly.com

August 2013 - (Free Research)
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts