Examples Construction DistributionWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Examples Construction Distribution returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Virtualization
 •   Enterprise Systems Management
 •   Business Intelligence Solutions
 •   WAN/ LAN Solutions
 •   Business Process Management (BPM)
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Network Management
 •   Data Security
 •   Enterprise Resource Planning (ERP)

Related Searches
 •   Examples Construction Activity
 •   Examples Construction Capacities
 •   Examples Construction Schema
 •   Examples Function
 •   Examples Reporting
 •   Export Examples
 •   Fact Examples Construction Distribution
 •   Reservation Examples
 •   Summary Examples
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Virtualization Defined - Eight Different Ways by F5 Networks

September 2008 - (Free Research)
Virtualization is not a new concept. Today it appears that virtualization is everywhere, which because of its ambiguity can be applied to any and all parts of an IT infrastructure. This whitepaper focuses on virtualization in the data center. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007 by F5 Networks

November 2007 - (Free Research)
One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution. 
(WHITE PAPER) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Getting Started with LINQ to XML by Global Knowledge

December 2008 - (Free Research)
LINQ is an acronym which stands for Language Integrated Query. This new technology comes built into the .NET Framework 3.5 and can be used with any of the different languages that run under .NET. This paper serves as an introduction. 
(WHITE PAPER) READ ABSTRACT |

The Art of the Possible: Rapidly Deploying Cost-Effective Energy-Efficient Data Centers by IBM

February 2008 - (Free Research)
In this white paper, IBM® reveals the next generation data center: scalable, modular data centers (SMDC). 
(WHITE PAPER) READ ABSTRACT |

How the VMware Software Defined Data Center Works: An IaaS Example by VMware, Inc.

August 2013 - (Free Research)
This e-guide presents expert insights into an IaaS example and show how the dynamic nature of IaaS virtual data center gives business operations many different benefits. 
(EGUIDE) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Re-architecting Your Virtual Environment: Solutions to virtual infrastructure challenges by LEGACY - DO NOT USE - Insight and Sun Microsystems, Inc

July 2008 - (Free Research)
In this final session, Wolf discusses application selection, focusing on using chargebacks to counter physical storage challenges. He gives network architecture examples, offers some CPU considerations, and tackles issues with heterogeneous VM management. 
(VIDEOCAST) READ ABSTRACT |

Using UML and SDL for Next Generation Networking (NGN) by Telelogic, An IBM Company

July 1967 - (Free Research)
UML and SDL are the design languages for third generation systems. This whitepaper discusses using an integrated UML and SDL approach, and using a design example that utilizes Telelogic solutions for Model Driven Development (MDD). 
(WHITE PAPER) READ ABSTRACT |

HP Servers in a Virtual Environment by PC Connection and HP

March 2008 - (Free Research)
The purpose of this white paper is to provide examples of how HP server virtualization and HP storage virtualization technologies work together to improve data center operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

Determining Total Cost of Ownership for Data Center and Network Room Infrastructure by APC by Schneider Electric

February 2005 - (Free Research)
This white paper describes an improved method for measuring TCO for data center and network room physical infrastructure, and provides examples on how to relate these costs to the overall IT infrastructure and evaluate cost control strategies. 
(WHITE PAPER) READ ABSTRACT |

Unified Communication for Dummies by Avaya Inc.

November 2008 - (Free Research)
Find here the real-world examples of how unified communications is being used now to solve critical business challenges and the tips you can use to meet your business needs in the modern, mobile work environment. 
(BOOK) READ ABSTRACT |

Elavon Achieves Greater Business Agility with CA Data Center Automation by CA Technologies.

October 2008 - (Free Research)
Learn about a real-life example of how an automation architecture design that consolidates redundant, underperforming assets enabled one organization to meet the demands of an aggressive growth strategy while delivering high levels of service quality. 
(WHITE PAPER) READ ABSTRACT |

Switching Essentials: An Introduction to Network Switching by Global Knowledge

October 2008 - (Free Research)
In this white paper, we will address the basics of this Layer 2 technology and help you get your network switch up and running. For our examples, we will use Cisco's 2950 switch. 
(WHITE PAPER) READ ABSTRACT |

Document Solutions IP Faxing versus Conventional Faxing: A Critical Analysis by Premiere Global Services

October 2008 - (Free Research)
This white paper uses examples in three industries with the heaviest fax usage - finance, healthcare, and insurance - to demonstrate costs and risks that are shared across all industries. 
(WHITE PAPER) READ ABSTRACT |

Unraveling Web Malware by FireEye

September 2008 - (Free Research)
There's no denying the rapid rise in the use of Web-based blended threats to compromise client browsers and operating systems. Increasing use of Web 2.0 technologies, syndicated, iframes, third-party widgets - all of these proliferate malicious software. 
(WHITE PAPER) READ ABSTRACT |

Managing Unstructured Data: 10 Key Requirements by Varonis

August 2007 - (Free Research)
This white paper takes a practical approach to identifying the right enterprise-wide data protection solution for your specific business. Learn more about these ten imperatives to know when evaluating a vendor offering. 
(WHITE PAPER) READ ABSTRACT |

Optimizing the application testing of your Siebel CRM environment by HP and Infosys

August 2008 - (Free Research)
Infosys and HP invite you to join us for a webcast on September 10th at 3:00 EDT on the topic, Optimizing the application testing of your Siebel CRM environment with the "Siebel Business Process Testing (BPT) Accelerator," developed by Infosys and HP. 
(WEBCAST) READ ABSTRACT |

SSL VPN for Secure Wireless LAN Access by F5 Networks

October 2007 - (Free Research)
For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell... 
(WHITE PAPER) READ ABSTRACT |

Gaining Control of the Desktop by Persystent Technologies

July 2008 - (Free Research)
Desktop support systems can increase desktop availability and performance and provide the end-to-end stability needed to maintain business processes. Read this paper to learn how to reduce desktop management costs and gain control of your desktops. 
(WHITE PAPER) READ ABSTRACT |

Optimizing the Business Value of IT: How IT Investment Portfolio Management Helps Drive High Performance by Accenture

June 2008 - (Free Research)
Accenture has developed the Investment Portfolio Management Framework, a diagnostic model to help CIOs and top business executives align IT investments with the business needs and improve the management of limited IT resources. 
(WHITE PAPER) READ ABSTRACT |

Collaborative and Comprehensive: A Bold New Look for Global Sourcing by Accenture

June 2008 - (Free Research)
This paper explores challenges and opportunities inherent in the global sourcing movement and provides at least five capabilities to be mastered if an organization is to achieve world-class status in the sourcing approaches and management techniques. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts