Examples Of WhatWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Examples Of What returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Enterprise Systems Management
 •   Data Center Management
 •   Enterprise Data Protection and Privacy
 •   Databases
 •   Social Networks and Community Management
 •   Security Policies
 •   Business Intelligence Solutions
 •   Availability, Performance and Problem Management

Related Searches
 •   Equipment Examples
 •   Examples Buy
 •   Examples Hardware Provider
 •   Examples Notes
 •   Examples Of Georgia
 •   Examples Project
 •   Examples Tennessee
 •   Information Examples Of
 •   Pricing Examples Of What
 •   Reservation Examples
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Protect Your IT System with Next Generation Security by IBM

October 31, 2012 - (Free Research)
Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked. 
(WHITE PAPER) READ ABSTRACT |

Measuring Community Health with Indicee Analytics by Indicee

March 14, 2014 - (Free Research)
The e-book provides examples of what to measure to ensure healthy, engaged communities, and how to measure it using analytics. Also included is a re-cap of the location for the full framework. 
(EBOOK) READ ABSTRACT |

Stories That Move Mountains: Improve your presentation skills by ComputerWeekly.com

November 09, 2012 - (Free Research)
Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals. 
(BOOK) READ ABSTRACT |

Using Social Media to Win Over Customers by SearchCRM

March 12, 2013 - (Free Research)
While many businesses are eager to join their customers at the social media party, doing so without the proper internal processes in place could spell disaster. In this brief expert e-book, you can learn how to create a successful social CRM initiative (and valuable customer relations) through implementing the right processes and technologies. 
(EBOOK) READ ABSTRACT |

Using the Eclipse Data Tools Platform with SQL Anywhere 10 by Sybase iAnywhere

March 2008 - (Free Research)
The Eclipse Data Tools Platform (DTP) project is a new top-level project at eclipse.org. 
(WEBCAST) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS by SAS

May 2014 - (Free Research)
The following digital book, Text Mining and Analysis Practical Methods, Examples, and Case Studies Using SAS, provides the reader with a solid foundation to successfully leverage text analytics. Understand core components, strategies, and much more. 
(BOOK) READ ABSTRACT |

GIS in the Cloud - The Esri Example by Esri

February 2011 - (Free Research)
As the use of cloud computing continues to grow, nearly every organization is developing ways to use this new technology. This white paper discusses and provide examples on how users of geographic information system (GIS) technology could and should benefit from cloud computing. Read more to find out how. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Virtualization Defined - Eight Different Ways by F5 Networks

September 2008 - (Free Research)
Virtualization is not a new concept. Today it appears that virtualization is everywhere, which because of its ambiguity can be applied to any and all parts of an IT infrastructure. This whitepaper focuses on virtualization in the data center. 
(WHITE PAPER) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

How to Implement a Data Loss Prevention Strategy by Sophos, Inc.

April 2010 - (Free Research)
This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by looking at what’s driving data loss prevention, the consequences of data loss, and a possible solution. It then moves on to practical implementation advice and examples. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Cloud Storage: A list of applications to move there now by SearchStorage.com

May 2012 - (Free Research)
Prioritizing what your company puts into the cloud can be confusing - this expert tip guide can help you sort it out. 
(EGUIDE) READ ABSTRACT |

Moving to BI Publisher - Now What? Best Practices in Document Delivery Webcast by STR Software

October 2010 - (Free Research)
Learn about native Oracle E-Business Suite BI Publisher document delivery functionality including an overview of bursting control files, what an example looks like and how you upload a bursting control file into Oracle EBS.  In addition, you will learn about advanced fax and email technology available to Oracle E-Business Suite users. 
(WEBCAST) READ ABSTRACT |

IBM Adds Real-time Compression to Storage by IBM

June 2012 - (Free Research)
Why should your data center deploy Storwize V7000 with Real-time Compression? From an economic standpoint, Storwize V7000 provides the financial benefits you need to meet the growing storage requirements within the limits of a constrained budget. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Threat Landscape: A View from the Inside by Dell SecureWorks UK

October 2011 - (Free Research)
In this webcast, join Lee Lawson, head of the Security Testing and Response teams for EMEA, as he discusses today’s cyber threats facing organisations in the UK and across the globe. 
(WEBCAST) READ ABSTRACT |

Enhancing Business Process Management with Business Rules by FICO

May 2010 - (Free Research)
While a business process management system can save time and cut costs by governing process, it can’t decide what to do, given a particular circumstance. A business rules management system enables the right decisions to be made quickly. This white paper uses case studies to illustrate the value of adding rules to BPM. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Tips to Keep Your Small Business Safe by Trend Micro, Inc.

November 2010 - (Free Research)
Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address. 
(WHITE PAPER) READ ABSTRACT |

Security Virtualization: Re-architecting the Appliance Mentality by Crossbeam Systems

November 2008 - (Free Research)
In order to determine what "security virtualization" really means, it is useful to understand how companies define and enforce their security and accompanying compliance policies today. 
(WHITE PAPER) READ ABSTRACT |

Virtualization Realized - eBook by IBM

December 2012 - (Free Research)
You've probably heard the benefits of virtualization, but may still be wondering how it can work for your company. Access this comprehensive e-book to learn from 14 real-world examples how successful companies harnessed virtualization to modernize their IT environment, optimize application performance, increase system availability, and more. 
(EBOOK) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts