Form PartsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Form Parts returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID
 •   Virtualization
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Storage Security
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Form Monitoring
 •   Form Parts Device
 •   Form Parts Free
 •   Form Programming
 •   Form Request
 •   Global Form Parts
 •   Integrated Form
 •   Sample Form Parts
 •   Strategy Form Parts
 •   System Form Parts
Advertisement

ALL RESULTS
1 - 25 of 445 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Sportsbet enlists Concur for better accuracy in reporting on Expenses by Concur Technologies (E-mail this company)

June 16, 2014 - (Free Research)
While Sportsbet previously took about two days to report on expenses, it's now down to around 90 minutes with a far greater degree of accuracy--thanks to Concur. Check out the following video to see how! 
(VIDEO) READ ABSTRACT |

The Demise in Effectiveness of Signature and Heuristic Based Antivirus by ComputerWeekly.com

February 18, 2013 - (Free Research)
Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Designing Artificial Intelligence for Games (Part 1) by Intel Software Network

June 20, 2009 - (Free Research)
This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors. 
(WHITE PAPER)

Presentation Transcript: Three IT Questions for the Small Business Owner, Part 1 - What is a Server and Why Should I Care? by Dell, Inc. and Microsoft

December 18, 2009 - (Free Research)
In this webcast Q&A transcript with expert Greg Shields you'll learn how to take the first step to taking on a server into your infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Best Practices for Deploying Highly Resilient, Cloud-Ready, Scale-Out Storage Infrastructures Using VMware vSphere 4 and Xiotech ISE by Xiotech Corporation

June 02, 2010 - (Free Research)
Xiotech's Emprise 5000 and VMware vSphere 4 bring together the concepts of consolidation, high availability and fault tolerance for both storage and servers. This document contains virtualization concepts and scalable configurations using the Emprise 5000 and VMware vSphere. 
(WHITE PAPER) READ ABSTRACT |

Disaster Got You Down? by CDW Corporation

September 08, 2009 - (Free Research)
While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers. 
(WHITE PAPER) READ ABSTRACT |

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 10, 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

A Candid Examination of Data Deduplication by Symantec Corporation

August 11, 2009 - (Free Research)
Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available. 
(WHITE PAPER) READ ABSTRACT |

The EMA All-Stars in Enterprise Systems Management for 2008 by CA Technologies.

March 2008 - (Free Research)
Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines. 
(WHITE PAPER) READ ABSTRACT |

Increase Productivity and Effectiveness of Merchandising Audits with the MC35 by Motorola, Inc.

March 2007 - (Free Research)
The MC35's built-in durability delivers reliable performance, even with all day every day use in the retail store. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Critical Success Factors Deploying Pervasive BI by MicroStrategy Incorporated

June 2008 - (Free Research)
Pervasive BI is the ability to deliver integrated right-time DW information to all users - it also provides an enterprise with the necessary visibility, insight, and facts to make smarter decisions in all processes at all times. 
(WHITE PAPER) READ ABSTRACT |

America's Quest for IPv6 - Part II: An Analysis of the Business and Financial Metrics of the Coming IPv6 Marketplace by Command Information

June 2008 - (Free Research)
the transition to IPv6 is very much on its way to becoming a viable, profitable market. This white paper this conclusion with some attention grabbing highlights... 
(WHITE PAPER) READ ABSTRACT |

Expert Tips for Choosing PaaS Vendors for your Enterprise by IBM

May 2014 - (Free Research)
This expert e-guide highlights a new breed of private PaaS tools, which are aimed not at providing all the apps needed in operating systems and middleware, but rather at providing a form of "operationsware." Inside, learn tips to make PaaS a part of your organization's cloud strategy. 
(EGUIDE) READ ABSTRACT |

Virtualization Defined - Eight Different Ways by F5 Networks

September 2008 - (Free Research)
Virtualization is not a new concept. Today it appears that virtualization is everywhere, which because of its ambiguity can be applied to any and all parts of an IT infrastructure. This whitepaper focuses on virtualization in the data center. 
(WHITE PAPER) READ ABSTRACT |

Addressing Mobile Threats: Effective Detection and Response by ArcSight, an HP Company

March 2007 - (Free Research)
Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Capturing the ICT Dividend by ComputerWeekly.com

December 2011 - (Free Research)
This report from Oxford Economics and AT&T shows ICT investment and productivity growth are closely linked - and European countries are lagging behind other parts of the world in both areas. 
(ANALYST REPORT) READ ABSTRACT |

How to tackle trust and co-operation by ComputerWeekly.com

November 2010 - (Free Research)
It is well-known that eCommerce transactions require a level of trust between participants in that trust, in this context, gives each partner confidence that the other will fulfil his part of a bargain in the future. 
(WHITE PAPER) READ ABSTRACT |

Forging a CEM Strategy That Can Power Commerce by SearchCRM

April 2014 - (Free Research)
With a seemingly exhaustive number of methods to communicate -- not to mention an expected $280 billion in U.S. e-commerce sales in 2015 -- contact center technology today requires a new approach. 
(EBOOK) READ ABSTRACT |

Workload Automation: Helping Cloud Computing Take Flight by BMC Software, Inc.

April 2010 - (Free Research)
Many data centers are using the cloud to host applications and data storage but typically aren’t using the cloud to process effective batch computing workloads. Enterprise workload automation tools can give businesses a chance to take a much greater advantage of cloud computing. Read this whitepaper to learn how. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Incorporating Wireless into the Business Continuity Plan by AT&T Corp

October 2010 - (Free Research)
Increasingly WAN-centric enterprises make mobile equipment and services more important for business continuity. To determine the role wireless should play in an organization’s business continuity plan, IT should consider a mix of factors including type of business, physical locations and applications. 
(WHITE PAPER)

Faster, Higher, Stronger: In-Memory Computing Disruption and What SAP HANA Means for Your Organization by SAP America, Inc.

November 2011 - (Free Research)
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Intelligent Data Management for SMBs by Dell, Inc.

January 2009 - (Free Research)
The Intelligent Data Management (IDM) approach is used to simplify IT with products, services, and partnerships that make it easy and affordable for SMBs to manage and leverage their information from creation to end of life. 
(ARTICLE) READ ABSTRACT |

1 - 25 of 445 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts