Examples Of An ItWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Examples Of An It returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Enterprise Systems Management
 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Intelligence Solutions
 •   Application Management and Maintenance
 •   Databases
 •   Network Security
 •   Data Security
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Application Of Examples
 •   Examples Industry
 •   Examples Of Configurations
 •   Examples Of Iowa
 •   Examples Survey
 •   Impact Of Examples Of An
 •   Quality Examples Of
 •   Rfp Examples Of
 •   Scheduling Examples Of An
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Targeted Cyber Attacks by GFI Software

March 18, 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Social Media: The New Frontier by SearchITChannel.com

May 15, 2014 - (Free Research)
This handbook examines social media-related opportunities for channel professionals, with discussions on social media platforms for business, integration, professional services and regulatory compliance concerns. 
(EBOOK) READ ABSTRACT |

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security by Trend Micro, Inc.

January 31, 2011 - (Free Research)
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management. 
(WHITE PAPER) READ ABSTRACT |

Locating Rogue 802.11n and Legacy Wireless Access Points by Fluke Networks

July 1967 - (Free Research)
Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security. 
(WHITE PAPER)

Dell EqualLogic TCO Analysis: The Economics of EqualLogic Virtualized iSCSI Storage by Dell, Inc.

December 2009 - (Free Research)
This ESG Lab report examines the economic excellence of highly scalable EqualLogic iSCSI storage solutions compared to traditional direct attached storage (DAS), Fibre Channel storage area network (FC SAN), and multi-protocol solutions (defined as systems that provide FC, iSCSI, and NAS connectivity). 
(ANALYST REPORT) READ ABSTRACT |

How to Effectively Secure Electronic Health Records by HP and Intel

February 2012 - (Free Research)
In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection! 
(WHITE PAPER) READ ABSTRACT |

Taming The Power Hungry Data Center by Fusion-IO

February 2009 - (Free Research)
The widening disparity between CPU performance and that of storage subsystems has spawned numerous solutions that do not fix the problem. This white paper exposes this fundamental flaw and introduces the means available today to substantively reduce power consumption while improving performance: Fusion-io's flash memory-based storage technology. 
(WHITE PAPER) READ ABSTRACT |

Maximizing Efficiency with Exchange 2010 on Dell Servers and Storage by Dell, Inc. and Intel®

May 2010 - (Free Research)
In this paper we compare a typical Exchange 2003 configuration of 10,000 mailboxes on somewhat legacy hardware with two examples of an Exchange 2010 configuration to show the potential efficiencies attainable by migrating to Exchange 2010 on new server and storage hardware from Dell. 
(WHITE PAPER) READ ABSTRACT |

Pund-IT (Charles King): Workload-Optimized Systems – IBM Shows the Way, Again by IBM

April 2010 - (Free Research)
Charles King at Pund-IT defines the phrase “workload-optimized systems” citing IBM Smart Analytics System as a true example. Oracle’s misleading Exadata TPC-C benchmark claims against old DB2 results are cited by Charles as an example of confusion elsewhere in the market today. Read this report to learn more. 
(ANALYST REPORT) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

How the VMware Software Defined Data Center Works: An IaaS Example by VMware, Inc.

August 2013 - (Free Research)
This e-guide presents expert insights into an IaaS example and show how the dynamic nature of IaaS virtual data center gives business operations many different benefits. 
(EGUIDE) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Power of Universal Patterns and Models for Master Data Management by Embarcadero Technologies, Inc.

October 2009 - (Free Research)
In this presentation transcript featuring best-selling author, Len Silverston, learn how to implement universal patterns for data modeling to improve management flexibility. Gain insight into various modeling choices to meet your organization's needs. Discover how to improve quality and reduce management costs by re-using patterns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

GIS in the Cloud - The Esri Example by Esri

February 2011 - (Free Research)
As the use of cloud computing continues to grow, nearly every organization is developing ways to use this new technology. This white paper discusses and provide examples on how users of geographic information system (GIS) technology could and should benefit from cloud computing. Read more to find out how. 
(WHITE PAPER) READ ABSTRACT |

Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS by SAS

May 2014 - (Free Research)
The following digital book, Text Mining and Analysis Practical Methods, Examples, and Case Studies Using SAS, provides the reader with a solid foundation to successfully leverage text analytics. Understand core components, strategies, and much more. 
(BOOK) READ ABSTRACT |

VMware vCloud Implementation Example by VMware, Inc.

July 2013 - (Free Research)
This reference guide provides an implementation example for deploying a private cloud in your VMware environment. Download now for a definition of vCloud and details about the architectural components and requirements for initial implementation. 
(WHITE PAPER) READ ABSTRACT |

Essential Guide to API Management and Application Integration by SearchBusinessAnalytics

November 2013 - (Free Research)
Explore your API options in this essential guide with tips from experts including Alex Gaber, API evangelist. Check out a range of stories that highlight examples of successful API management, trends with the technology, and key terms developers need to know. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Understanding the Value of Cloud Solutions: Maximize Your ROI by HP & Intel®

December 2012 - (Free Research)
This paper provides examples of the return on investment (ROI) of an HP Cloud Service Automation solution. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Managing Windows with IT Search by Splunk

April 2009 - (Free Research)
Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Virtualization Defined - Eight Different Ways by F5 Networks

September 2008 - (Free Research)
Virtualization is not a new concept. Today it appears that virtualization is everywhere, which because of its ambiguity can be applied to any and all parts of an IT infrastructure. This whitepaper focuses on virtualization in the data center. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Advanced Virtualization Management for Hyper-V and System Center Environments by Citrix

April 2009 - (Free Research)
Citrix Essentials for Microsoft Hyper-V extends the management capabilities of Hyper-V and System Center Virtual Machine Manager with advanced virtualization tools for managing storage in virtual environments, automating the virtual machine lifecycle, and dynamically provisioning Hyper-V infrastructure. 
(IT BRIEFING) READ ABSTRACT |

Cloud Cover for the Call Center: Meeting Demands Intelligently and Efficiently by Oracle Corporation

March 2012 - (Free Research)
This paper covers many of the complications and complexities of managing a call center. It explores the various solutions available and offers pros and cons to each of the options. It shows the positive financial impact picking the right choice can have. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts