Focus ReviewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Focus Review returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Technology Planning and Analysis
 •   Data Security
 •   Virtualization
 •   Enterprise Systems Management
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Vulnerability Assessment
 •   Data Mining
 •   Treasury / Cash / Risk Management

Related Searches
 •   Call Focus Review
 •   Data Focus
 •   Expense Focus Review
 •   Focus Consultancy
 •   Focus Package
 •   Focus Review Asset
 •   List Focus Review
 •   Mapping Focus
 •   Reservation Focus
 •   Trend Focus
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 18 October 2011: Download the latest issue of the UK's leading technology publication, where we analyse the latest news in IT and what it means for IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we talk to the CIO of the London 2012 Olympics about progress on the UK's highest-profile IT implementation. We ask customers about Oracle’s long-awaited Fusion Applications; review the latest version of Windows Server; and find out how the Blackberry outage affected corporate customers. Download the new issue now. 
(EZINE) READ ABSTRACT |

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool by EMC Corporation

December 2013 - (Free Research)
Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Automating Your Code Review: Moving to a SaaS Model for Application Security by Veracode, Inc.

February 2009 - (Free Research)
Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security. 
(WHITE PAPER) READ ABSTRACT |

Independent Lab Comparative Review by Avaya

June 2011 - (Free Research)
MierConsulting engineers conducted an hands-on, comparative review of three leading contact center packages, focusing on these products' multimedia, mixed voice and text-based contacts - capabilities. 
(PRODUCT REVIEW) READ ABSTRACT |

Aberdeen Group: The 2011 Growth Imperative: Optimizing Speed and Cost in New Product Development by IBM

October 2010 - (Free Research)
This Aberdeen Business Review found that over one half of manufacturers are focused on profitability and margin growth.  The review offers insight into how leading companies are approaching the task to excel in innovation and new product development despite lean organizations budgets. 
(ANALYST REPORT) READ ABSTRACT |

Analytics, Decision Making & Teams That Do It Right by ComputerWeekly.com

October 2012 - (Free Research)
Experts advise how to make the most of analytics in this report from SAS and the Harvard Business Review. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Vblock Specialized Systems for high Performance Databases by VCE (E-mail this company)

December 2013 - (Free Research)
Designing a database system that's capable of achieving high levels of performance is a difficult task for any organization. In this ESG Lab review, learn how the configuration and delivery process of database systems can be made quicker and easier. 
(WHITE PAPER) READ ABSTRACT |

What’s the Best Focus for MDM Strategy Now? by SearchSecurity.com

March 2014 - (Free Research)
This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters. 
(EBOOK) READ ABSTRACT |

Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop by Klocwork

November 2009 - (Free Research)
As Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity. 
(WHITE PAPER) READ ABSTRACT |

Governance and control: Focus risk management on multiple levers of control by IBM

April 2009 - (Free Research)
Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

From ISV to SaaS: Move to the Cloud with Egenera Cloud Suite by Egenera

January 2013 - (Free Research)
This whitepaper covers a solution to the challenges for cloud vendors of shifting from a product based approach to a service based approach. 
(WHITE PAPER) READ ABSTRACT |

Comparative Performance Review: Endpoint Security Performance in Desktop Virtualization Environments by Trend Micro, Inc.

October 2010 - (Free Research)
This full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Successful data stewardship framework needs solid plan, firm focus by SAP America, Inc.

December 2012 - (Free Research)
Effective data stewardship is trickier than it seems, and is often hard to document and measure.This expert guide reviews the key tenets of planning and designing successful data stewardship programs. Read on to learn about 5 common pitfalls and concerns that organizations have to overcome. 
(EGUIDE) READ ABSTRACT |

Analyst Review: Private Cloud Platforms for IaaS, PaaS, and SaaS by IBM

September 2013 - (Free Research)
Learn about the IBM private cloud platform and the standards IBm puts in place in order to allow organizations freely deploy, manage and distribute their applications and services across geographical and vendor technology boundaries. 
(WHITE PAPER) READ ABSTRACT |

IT matters again by ComputerWeekly.com

December 2011 - (Free Research)
This report from Deloitte argues businesses are again investing in IT to provide the differentiation and innovation critical from their competitors despite the downturn. 
(IT BRIEFING) READ ABSTRACT |

How to tackle identity management and federated identity by ComputerWeekly.com

November 2010 - (Free Research)
The majority of user authentication schemes today still use userid and password. The burden to users of managing large numbers of userids and passwords has led to proposals for Federated Identity systems, where a single set of credentials can be used to authenticate with several organisations, which have agreed to work together as a federation. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Desktop Virtualization: Best Practices for a Seamless Deployment by Dell, Inc. and Intel®

March 2012 - (Free Research)
In the past, virtualization was mainly focused on servers and storage, but today virtual desktop infrastructures (VDI) are becoming a go-to solution for resolving network bandwidth issues and improving mobile workforce management. Read this expert e-guide to review common desktop virtualization challenges and deployment best practices. 
(EGUIDE) READ ABSTRACT |

PCI Basics: What it Takes to Be Compliant by Tripwire, Inc.

February 2011 - (Free Research)
This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply. 
(WHITE PAPER) READ ABSTRACT |

EMC's VNX Family: A Unifying Force in Storage by EMC

March 2011 - (Free Research)
EMC has just announced two new unified storage platforms. EMC states that these two products build on the simplicity and efficiency focus it is already driving by adding affordability and power – overall its new products are “optimized for virtualized IT.” This paper will review the validity and relevance of these assertions against market needs. 
(WHITE PAPER) READ ABSTRACT |

EMC's VNX Family: A Unifying Force in Storage by EMC

February 2011 - (Free Research)
EMC has just announced two new unified storage platforms. EMC states that these two products build on the simplicity and efficiency focus it is already driving by adding affordability and power – overall its new products are “optimized for virtualized IT.” This paper will review the validity and relevance of these assertions against market needs. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Chapter 3: Enterprise-Class Tape Library Purchase Considerations by Quantum Corporation

February 2010 - (Free Research)
Now that you've reviewed the essential issues involved in any backup acquisition, this guide focuses on the specific considerations of enterprise-class tape libraries. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors like Quantum Corp., Hewlett-Packard Corp., IBM, SpectraLogic Corp., and more. 
(EGUIDE) READ ABSTRACT |

Three Capabilities to Fuel Today’s Dynamic Planning, Analysis and Forecasting by IBM

November 2013 - (Free Research)
This whitepaper reviews the three main capabilities that organizations need to focus on in order to make intelligent business choices and steer their organization in the right direction. 
(WHITE PAPER) READ ABSTRACT |

IDC Brief: Cloud Computing in the Midmarket: Assessing the options. by IBM

July 2013 - (Free Research)
This IDC tech brief outlines the basics in cloud computing with a specific focus on midmarket options. Review the strengths and weakness of each cloud model, uncover metrics for evaluating success and discover the 5 essential questions to answer when considering the cloud. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts