Explain How OnlineWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Explain How Online returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Management
 •   Data Center Management
 •   Virtualization
 •   Backup Systems and Services
 •   Disaster Recovery
 •   Network Security
 •   Wireless Security
 •   Enterprise Information Integration/ Metadata Management
 •   Security Policies

Related Searches
 •   Contacts Explain
 •   Example Explain How
 •   Explain How Online Risks
 •   Explain How Sales
 •   Explain How Web Casts
 •   Explain Questions
 •   Firm Explain
 •   Function Explain
 •   Provider Explain How
 •   Related Explain
Advertisement

ALL RESULTS
1 - 25 of 444 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Access Accounts More Securely with Intel® Identity Protection Technology by Intel

August 02, 2011 - (Free Research)
This technology brief takes a closer look at today's threat landscape and presents key findings from a recent security survey. Discover the threats your clients are most vulnerable to as well as how they can develop an effective defense strategy against them. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Storage magazine Online June 2009: Heal Thyself by SearchStorage.com

May 28, 2009 - (Free Research)
A trend in storage product messaging these days is the theme of self-healing storage - the ability of a system to detect and repair hard disk problems automatically. In this month's cover story, independent storage expert Marc Staimer explains how and how well they work. This electronic issue also includes features on storage efficiency... 
(EZINE)

The Always Online Single-Instance Database by Oracle Corporation UK Ltd

December 31, 2009 - (Free Research)
Availability is a growing concern for all customers.  Information, and the databases underlying that information, have become more and more integral to business processes and products. 
(WHITE PAPER) READ ABSTRACT |

Storage Magazine October 2009: Guide to Snapshot Technologies by SearchStorage.com

October 13, 2009 - (Free Research)
The October 2009 edition of Storage Magazine Online focuses on snapshot technologies. Snapshots offer backup managers the ability to reduce RTOs and RPOs, but one size doesn’t fit all. Storage expert Marc Staimer explains how to evaluate and choose the best approach for your environment. 
(EGUIDE) READ ABSTRACT |

Optimizing Storage for Oracle PeopleSoft Applications by Oracle Corporation

June 08, 2011 - (Free Research)
This white paper explains how by partitioning databases based on the lifecycles of the information and compressing historical data, IT departments can reduce their dependency on high-end storage, reduce their incremental storage costs, keep more data online for longer periods, and improve the performance of applications. 
(WHITE PAPER) READ ABSTRACT |

Domino’s Pizza:  Datacentre Transformation by ComputerWeekly.com

May 29, 2012 - (Free Research)
Colin Rees, IT Director at Domino’s Pizza explains how a project to move the company data centre into the cloud has transformed its online business. 
(PRESENTATION) READ ABSTRACT |

CIO Handbook: Personalizing the Customer Experience by SearchCIO.com

March 14, 2013 - (Free Research)
CIOs must marry online and physical offerings to personalize business interactions for each and every customer in today's collaborative world. Find out how leading businesses are paving the way with top-notch customer experience strategies. 
(EBOOK) READ ABSTRACT |

Sybase PowerDesigner for information architecture by Sybase, an SAP company

April 16, 2012 - (Free Research)
<p>This paper explains how modeling information architecture (IA) can help reduce the costs associated with data management. Read this now and learn about the benefits of implementing IA and how Sybase's option offers modeling support for database design and enterprise architecture.</p> <p> </p> 
(WHITE PAPER) READ ABSTRACT |

IT Briefing: How to Optimize ETL for Demanding Data Environments by Syncsort

October 2008 - (Free Research)
This document is based on a Syncsort/TechTarget Webcast entitled "How to Optimize ETL for Demanding Data Environments." 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: “Health Care Data Protection” by Information Security Magazine

March 2011 - (Free Research)
This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - October 2009: Security 7 Awards by Information Security Magazine

October 2009 - (Free Research)
The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more. 
(EZINE)

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Mobile Security Solutions: Securing & Leveraging Mobile Devices by Entrust, Inc.

July 2012 - (Free Research)
This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information. 
(WHITE PAPER) READ ABSTRACT |

Multi-Hypervisor Environments: Worth the Work? by SearchCIO.com

April 2013 - (Free Research)
Are multi-hypervisor environments the right solution to virtualization oligarchy? Perhaps, but CIOs must also beware adding unnecessary complexities. 
(EZINE) READ ABSTRACT |

Storage Magazine: July-August 2010 by SearchStorage.com

August 2010 - (Free Research)
To realize the full benefits of vSphere, you need networked storage. And when it comes to virtualized servers, iSCSI is viewed as the top choice over Fibre Channel. In this month's cover story, Eric Siebert goes under the hood of VMware vSphere to show you how to make iSCSI work for virtual machines plus other essential and informative articles. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Beyond Backup Ezine: Disaster Recovery Strategies for Branch Offices by CIO Decisions

July 2009 - (Free Research)
The July/August issue of CIO Decisions Ezine focuses on disaster recovery in remote and branch offices, especially in midmarket organizations. Read this issue to learn some great tips and techniques for increasing your remote workers' ability to bounce back after an unfortunate event. 
(EZINE)

Boost Government Revenues Without a Tax Increase by SAP America, Inc.

June 2012 - (Free Research)
SAP analytics solutions can help today's government agencies overcome the many challenges associated with tax discovery. Read on to learn how SAP's public sector software solutions can benefit government agencies by improving performance, reducing costs and streamlining service delivery. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Zero-Time Upgrades to Oracle Database 11g Using Oracle GoldenGate by Oracle Corporation

February 2010 - (Free Research)
Organizations can upgrade or migrate to Oracle Database 11g with zero downtime. Using Oracle GoldenGate’s real-time data integration and replication capabilities, businesses can perform rolling upgrades, manage partial or phased migrations and upgrades, conduct data verification, and implement a reliable failback strategy. 
(WHITE PAPER) READ ABSTRACT |

Serious About Mission Critical by Dell, Inc. and Intel®

June 2011 - (Free Research)
This solution brief explains how organizations can meet new demands for higher performance, security, reliability, and service levels. Gain insight into a processor-based architecture that will allow you to achieve this goal. 
(PRODUCT OVERVIEW) READ ABSTRACT |

How to be influential online by ComputerWeekly.com

November 2012 - (Free Research)
Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively. 
(BOOK) READ ABSTRACT |

Managing Complex Applications by BlueStripe Software

December 2008 - (Free Research)
Listen to the Podcast, "Managing Complex Applications with Intelligence" for a quick overview of the challenges virtualization has brought to managing applications. 
(PODCAST) READ ABSTRACT |

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by Symantec Corporation

October 2013 - (Free Research)
Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important. 
(EGUIDE) READ ABSTRACT |

Gartner: How to build an online community by ComputerWeekly.com

February 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by GeoTrust, Inc.

May 2013 - (Free Research)
This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 444 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts