Event What IsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Event What Is returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Network Security
 •   Storage Management
 •   Business Process Management (BPM)
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Disaster Recovery
 •   Application Servers

Related Searches
 •   Active Event
 •   Call Event What Is
 •   Desktop Event What Is
 •   E-Commerce Event What
 •   Event Reservation
 •   Event What Contact
 •   Event What Is Conferencing
 •   Event What Is Performance
 •   Event What Technology
 •   Graphs Event What Is
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 27, 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 16, 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

What is the difference between Workflow Engines and BPM Suites? by Lombardi Software, An IBM Company

May 18, 2009 - (Free Research)
To understand the power of a BPM initiative, this paper provides background on the workflow solutions of the 90's, documents a few important events that helped shape the market, and presents the elements of a successful BPM suite. 
(WHITE PAPER) READ ABSTRACT |

SL Corporation - Enterprise RTView™ Case Study by SL Corporation

February 2008 - (Free Research)
With a deep penetration in the algorithmic trading and capital markets, Progress® Software needed to be able to provide traders with a way to create custom views of market data and their trading position. 
(CASE STUDY) READ ABSTRACT |

Choosing a partner for enterprise cloud production workloads by IBM

May 2013 - (Free Research)
Despite initial hesitancy, companies of all sizes are considering moving their enterprise-class applications to the cloud. This whitepaper provides a checklist for choosing the right managed third-party provider for your business. 
(WHITE PAPER) READ ABSTRACT |

Tripwire Log Center by Tripwire, Inc.

February 2011 - (Free Research)
A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important. 
(WHITE PAPER) READ ABSTRACT |

Building a digital government based on user needs by ComputerWeekly.com

December 2013 - (Free Research)
Liam Maxwell the government’s first chief technology officer talks about his strategy to deliver the technology that the user needs. 
(PRESENTATION) READ ABSTRACT |

Understanding How Converged Infrastructure Works by HP & Intel®

February 2013 - (Free Research)
This expert e-guide offers a discussion of the different types of converged infrastructure and provides an overview of their advantages for IT environments. The paper goes on to introduce converged infrastructure hardware and the advantages offered by its use of four types of virtualization. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: The Enterprise Integration Triangle - Services, Data and Events by Progress

March 2010 - (Free Research)
Read this transcript and learn about the enterprise integration triangle and how the world's favorite international airline has mastered the code and key tools for integration platforms. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events by Fluke Networks

August 2010 - (Free Research)
In this white paper you will learn when it is important to use a Network Recorder, and key considerations when selecting a network recorder for back-in-time forensics analysis. 
(WHITE PAPER) READ ABSTRACT |

Continuous Monitoring: Responding to New Threats in More Complex IT Environments by Tripwire, Inc.

February 2012 - (Free Research)
Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more. 
(WHITE PAPER) READ ABSTRACT |

4 issues caused by retaining too much unnecessary data by DLT Solutions

June 2012 - (Free Research)
Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two. 
(EGUIDE) READ ABSTRACT |

Active Administrator™, Version 5.6.1 by ScriptLogic Corporation

December 2010 - (Free Research)
Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights. 
(TRIAL SOFTWARE) READ ABSTRACT |

Playtech Case Study - HP monitoring tools deliver game-changing uptime by Hewlett-Packard Company

November 2013 - (Free Research)
Monitoring tools are often used today in order to view the true impact of events. Access this case study white paper that explains how Playtech, a gaming software company, relies on monitoring tools to ensure uninterrupted, high quality service. 
(WHITE PAPER) READ ABSTRACT |

Enabling rapid and effective IT recovery by ComputerWeekly.com

October 2011 - (Free Research)
This report from analyst, Freeform Dynamics, offers 7 key enablers of effective IT disaster recovery for IT department's in small and medium companies. 
(ANALYST REPORT) READ ABSTRACT |

The Progress Responsive Process Management (RPM) Suite Brochure by Progress

April 2010 - (Free Research)
The Progress RPM suite is a seamlessly integrated, interactive and customizable solution that provides the insight and controls you need to drive your business. It empowers you and other decision makers to monitor, control and improve your business in real time. Read this paper to learn all the features and benefits of the Progress RPM suite. 
(BROCHURE) READ ABSTRACT |

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation

January 2009 - (Free Research)
Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol. 
(WHITE PAPER) READ ABSTRACT |

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by IBM

June 2008 - (Free Research)
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed. 
(WHITE PAPER)

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing - Latest Buzzword or a Glimpse of the Future? by Google

February 2009 - (Free Research)
This paper provides a snapshot of what is happening in the arena of cloud computing. What are the benefits? Why are businesses embracing it? What does it mean to a business owner or executive? How does it affect the workplace? What are the payoffs and the pitfalls? Is it really ready for "prime time"? 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Best Practices in Selecting a SAP Managed Hosting Provider by Freudenberg IT

June 2009 - (Free Research)
In this presentation transcript, Michael Dortch, Founder and Lead Analyst of DortchOnIT.com, explains what to look for in an SAP managed hosting provider including how to determine your organization's requirements and how to evaluate potential providers. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Success with Hosted SAP Applications by Freudenberg IT

April 2009 - (Free Research)
In this presentation transcript, Michael Dortch, Founder and Lead Analyst of DortchOnIT.com, explains what to look for in an SAP managed hosting provider including how to determine your organization's requirements and how to evaluate potential providers. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

2013 Cyber Risk Report Executive Summary by Hewlett-Packard Company

February 2014 - (Free Research)
This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014. 
(WHITE PAPER) READ ABSTRACT |

Customer Cloud Adoption: From Development to the Data Center by Dell, Inc.

April 2013 - (Free Research)
This whitepaper details the results of a study commissioned by Dell to answer some major questions about how organizations are interacting with the cloud. 
(WHITE PAPER) READ ABSTRACT |

Under the Cloud, a Climate Change for IT by Cisco Systems, Inc.

December 2013 - (Free Research)
This brief write-up examines some of the key findings from a survey of over 4,000 IT leaders in 18 industries across nine key global economies on how the cloud is impacting IT. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts