Example Of Uses FileWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Example Of Uses File returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Storage Management
 •   Enterprise Data Protection and Privacy
 •   Databases
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Storage Security

Related Searches
 •   Charts Example Of
 •   Example Of Arkansas
 •   Firms Example Of
 •   Full Example Of Uses
 •   Graphics Example Of
 •   Indian Example Of Uses
 •   Integrated Example
 •   Issues Example Of Uses
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast) by Oracle Corporation

July 15, 2013 - (Free Research)
In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage. 
(PODCAST) READ ABSTRACT |

Course: Insecure Temporary Files (CWE-377) by Klocwork

November 13, 2013 - (Free Research)
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377. 
(WEBCAST) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 12, 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

The Growing Importance of E-Discovery on Your Business by Google Apps

November 2008 - (Free Research)
The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process. 
(WHITE PAPER) READ ABSTRACT |

Vestcom International: Personalization Drives Repeat Business by Exstream Software

April 2008 - (Free Research)
Vestcom International is a New Jersey-based firm that offers end-to-end personalized communication solutions. Vestcom used Exstream Software's Dialogue solution to design a sophisticated relationship management program that is fostering... 
(CASE STUDY) READ ABSTRACT |

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Building Your Business Case for Managed File Transfer by OpenText

October 2013 - (Free Research)
This whitepaper details the benefits of managed file transfers and how to build an effective business case for implementation. 
(WHITE PAPER) READ ABSTRACT |

Oracle Database Optimization for MSC SimManager using Oracle's Sun Flash by Oracle Corporation

December 2010 - (Free Research)
This paper will provide best practice configuration guidelines for using latest storage and server technology (Oracle's Sun FlashFire technology storage devices along with Oracle's Sun servers) to optimize such simulation management solutions. 
(WHITE PAPER) READ ABSTRACT |

Managing Unstructured Data: 10 Key Requirements by Varonis

August 2007 - (Free Research)
This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering. 
(WHITE PAPER) READ ABSTRACT |

Moving to BI Publisher - Now What? Best Practices in Document Delivery Webcast by STR Software

October 2010 - (Free Research)
Learn about native Oracle E-Business Suite BI Publisher document delivery functionality including an overview of bursting control files, what an example looks like and how you upload a bursting control file into Oracle EBS.  In addition, you will learn about advanced fax and email technology available to Oracle E-Business Suite users. 
(WEBCAST) READ ABSTRACT |

Data Deduplication – Different Approaches for Different Environments by Hewlett-Packard Company

October 2009 - (Free Research)
There are so many different types of deduplication: source, target, hash-based, delta differential-based, and global dedupe, for example. Read this presentation transcript for a discussion of data backup methods, data security, and data storage strategies for various environments. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Windows Server Multi-Site Clustering with Geocluster® by Double-Take Software

July 2008 - (Free Research)
In this webcast, get expert advice for implementing or optimizing Extract Transform Load (ETL) processes, and learn how to choose the best ETL software tools for your requirements and budget. 
(WHITE PAPER) READ ABSTRACT |

Article: Design Patterns for Case Management by EMC Corporation

August 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

Fast Delivery of Complex Financial Reports - How Leading CFOs Do It by IBM

November 2011 - (Free Research)
Reporting speed and accuracy are vital today. But it would be wrong to assume that you have to spend more to go faster and do a competent job. This white paper illustrates how some organizations achieved top-tier results in financial reporting and why some did not. 
(WHITE PAPER) READ ABSTRACT |

Clustering and Convergence: Recent Trends and Real-world Examples by Sirius Computer Solutions

September 2013 - (Free Research)
This e-guide explains how one organization adapted their storage infrastructure to accommodate large data files. Find out whether they decided to replace their existing storage architecture and learn about the latest developments in clustering and convergence and how various market offerings stack up. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Practical Open Source Data Integration Case Studies & Implementation Examples Volume 2 by Talend

February 2009 - (Free Research)
This document presents a few selected case studies, illustrating real-life implementations of open source data integration and its associated benefits. 
(WHITE PAPER) READ ABSTRACT |

SocialText Case Study: Boston College by Socialtext

February 2008 - (Free Research)
Boston College evaluated various options for increasing communication and collaboration in the classroom, including staying with Facebook, but in October 2006 ultimately decided to use the Socialtext hosted service for wikis. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: The Power of Universal Patterns and Models for Master Data Management by Embarcadero Technologies, Inc.

October 2009 - (Free Research)
In this presentation transcript featuring best-selling author, Len Silverston, learn how to implement universal patterns for data modeling to improve management flexibility. Gain insight into various modeling choices to meet your organization's needs. Discover how to improve quality and reduce management costs by re-using patterns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security by Tripwire, Inc.

February 2011 - (Free Research)
Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches. 
(WHITE PAPER) READ ABSTRACT |

GIS in the Cloud - The Esri Example by Esri

February 2011 - (Free Research)
As the use of cloud computing continues to grow, nearly every organization is developing ways to use this new technology. This white paper discusses and provide examples on how users of geographic information system (GIS) technology could and should benefit from cloud computing. Read more to find out how. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts