Frameworks Major CategoriesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Frameworks Major Categories returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management
 •   Security Policies
 •   Business Intelligence Solutions
 •   Databases
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Quality
 •   Network Security

Related Searches
 •   Filing Frameworks Major
 •   Frameworks Major Hawaii
 •   Frameworks Major Utah
 •   Frameworks Manager
 •   Learn About Frameworks Major Categories
 •   Project Frameworks
 •   Regional Frameworks Major
 •   Requirement Frameworks
 •   Whitepaper Frameworks
 •   Workflow Frameworks Major
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

B2B Collaboration: How On-Demand Platforms Accelerate Value and Impact TCO by E2open

February 01, 2007 - (Free Research)
This report provides a value framework that can help companies validate if on-demand solutions are right for their B2B collaboration needs. 
(ARTICLE) READ ABSTRACT |

Presentation Transcript: Big Data Analytics- Profiling the Use of Analytic Platforms in User Organizations.pdf by BeyeNETWORK

December 06, 2011 - (Free Research)
In this presentation transcript, business intelligence (BI) expert Wayne Eckerson deep dives into the world of big-data analytics. He touches on the movement itself, what is behind it and offers up best practices for performing it. Eckerson also discusses big-data analytics engines and describes the framework for implementing big-data analytics. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Developing Mobile Apps Today by IBM

December 17, 2012 - (Free Research)
Read the expert guidance in this Solution Spotlight to learn how to recognize the differences between the main categories of mobile application delivery, resize service-oriented architecture (SOA) services to fit the confines of small devices, and ensure speed, reliability, and user expectations when developing mobile applications. 
(EGUIDE) READ ABSTRACT |

7 Leading Applications of Business Intelligence Software by MicroStrategy Incorporated

December 2005 - (Free Research)
This paper explores the leading business intelligence (BI) applications across industry verticals. It is useful for business users just learning about BI applications, as well as for project managers and report developers looking for best practices. 
(BOOK) READ ABSTRACT |

Evaluating Mainframe System Monitoring Tools by CA Technologies.

March 2013 - (Free Research)
This e-guide introduces various mainframe system monitoring tools, providing expert advice for purchasing and implementing those tools as well as explanations for how each functions. 
(EGUIDE) READ ABSTRACT |

Making a Strategic Business Intelligence Choice - A Checklist by Business Objects

March 2008 - (Free Research)
This white paper focuses on the factors your organization should consider when selecting a BI vendor and establishing its products as its BI standard. 
(ANALYST REPORT) READ ABSTRACT |

When Requirements Go Bad - Understanding the causes for Requirements errors can help prevent them by Ivar Jacobson Consulting

June 2008 - (Free Research)
This white paper discusses how to eliminate common requirements errors for a more effective software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

The Cloud Risk Framework by ComputerWeekly.com

June 2012 - (Free Research)
This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Assessing the Total Cost of Ownership for BI by LogiXML

January 2012 - (Free Research)
This report provides mid-market organizations a framework for evaluating the total cost of ownership (TCO) of business intelligence (BI) solutions. 
(WHITE PAPER) READ ABSTRACT |

McAfee Initiative to Fight Cybercrime by McAfee, Inc.

December 2008 - (Free Research)
Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks. 
(WHITE PAPER) READ ABSTRACT |

The EMA All-Stars in Enterprise Systems Management for 2008 by CA Technologies.

March 2008 - (Free Research)
Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines. 
(WHITE PAPER) READ ABSTRACT |

How iPads Enter the Workforce by Citrix

February 2011 - (Free Research)
Who could have imagined that a tablet would capture the imagination of employees and IT alike? But the iPad did, and it’s kicked off an arms race for smart mobile devices. This report introduces a simple framework to guide content and collaboration professionals through employee-fueled tablet scenarios and IT-led tablet projects. 
(ANALYST REPORT) READ ABSTRACT |

Cloud Readiness Flight-Check by EMC Corporation

October 2013 - (Free Research)
This short but in-depth quiz evaluates cloud readiness in four major categories: Strategy, infrastructure, applications, and processes. 
(WHITE PAPER) READ ABSTRACT |

iOS 6 Foundations by ComputerWeekly.com

July 2013 - (Free Research)
Jesse Feiler, author of iOS 6 Foundations, introduces basic programming techniques for Apple's iPhone and iPad operating system. 
(BOOK) READ ABSTRACT |

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Why You Should Consider Hosted Messaging Security by Trend Micro GmbH

February 2009 - (Free Research)
In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

Voice over IP Open-Source Platforms and the Session Initiation Protocol by Global Knowledge Network, Inc.

April 2006 - (Free Research)
This paper shows the industry-wide acceptance of SIP and the recent advances of the open source software projects related to Voice over IP (VoIP). Read why the author firmly believes that the VoIP open source is still in its infancy, but its acceptance and product maturity will grow rapidly over the next few years. 
(WHITE PAPER) READ ABSTRACT |

Sharepoint E-Zine Volume 6: How to Control Workflow Behavior with Custom Lists by SearchWinIT

January 2009 - (Free Research)
Learn how to integrate change management into a document library using SharePoint's own framework. 
(EZINE) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

HP TippingPoint Virtual Controller and Virtual Management Center by Hewlett-Packard Company

July 2011 - (Free Research)
Is management of a virtualized environment a major concern? The HP TippingPoint Secure Virtualization Framework is designed to provide IT personnel a single consolidated, yet flexible solution for extending the HP TippingPoint IPS Series with its excellent threat protection into the virtualized data center. 
(WHITE PAPER) READ ABSTRACT |

CW+: How to produce a business case for software quality by ComputerWeekly.com

January 2011 - (Free Research)
When a mission-critical application fails, the loss of business revenue is large and swift. Poor application quality causes highly-visible major outages; it also causes ongoing lapses in business performance thatare less visible, but steadily add up to substantial revenue loss. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts