Function CaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Function Case returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Data Security
 •   Data Center Management
 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance
 •   Enterprise Resource Planning (ERP)
 •   Network Security
 •   Virtualization
 •   Application Security
 •   Availability, Performance and Problem Management

Related Searches
 •   Erp Function Case
 •   Function Case Activity
 •   Function Case Montana
 •   Function Case Work
 •   Function Tutorials
 •   Group Function Case
 •   Manufacturers Function
 •   Scheduling Function Case
 •   Secure Function
 •   Systems Function
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Enterprise Disaster Recovery Planning: Calculating the Cost of Downtime by Iron Mountain

September 2008 - (Free Research)
Given the enormous long-term costs and implications of a systems interruption, companies need to carefully define and implement plans to mitigate losses. This paper arms you with how to build a strong business case for a recovery plan. 
(WHITE PAPER) READ ABSTRACT |

Process Automation for the Twenty-Ten Decade: The Automation of Business Technology by Network Automation, Inc

October 2010 - (Free Research)
This paper discusses the need for business process automation and how it can make your company vastly more efficient. Continue reading to learn how to stay ahead of the curve on process automation during the twenty-ten decade. 
(WHITE PAPER) READ ABSTRACT |

Rapid Deployment Solutions: Features, Functions, Apps by itelligence, Inc.

November 2013 - (Free Research)
In this expert resource, explore the drivers, use cases, and benefits of Rapid Deployment Solutions, as well as the features and functions of these tools. Discover if a Rapid Deployment Solution is right for your next application deployment by reading now. 
(WHITE PAPER) READ ABSTRACT |

The 7 Key Components for an Effective Case Management Methodology by ASG Software Solutions

May 2010 - (Free Research)
Case management is a care delivery framework with the potential to relieve three of the most significant pressures facing hospital leaders. The purpose of this paper is to illustrate a number of ways in which hospital case management can and does produce clinical, operational, and financial benefits for the organizations that employ them. 
(WHITE PAPER) READ ABSTRACT |

The Digital Enterprise by ComputerWeekly.com

March 2014 - (Free Research)
Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract. 
(BOOK) READ ABSTRACT |

BPM and enterprise architecture: The case for integration by IBM

February 2014 - (Free Research)
Business process management (BPM) and enterprise architecture (EA) sometimes seem to exist in parallel universes. However, that can be detrimental the function of each--and to the organization. In this e-guide, learn from industry experts as they make the case for integration of BPM and EA. 
(EGUIDE) READ ABSTRACT |

Case Study: Henderson Global Investors Bolsters Microsoft SharePoint Adoption with DocAve by AvePoint, Inc.

August 2011 - (Free Research)
This case study details the efforts of Henderson Global Investors, an asset management firm, to improve their SharePoint-based content management, backup and administrative functions using AvePoint's DocAve Software Platform. 
(CASE STUDY) READ ABSTRACT |

Case Study: Modernize Your Requirements Management Practice by HP Software

July 2011 - (Free Research)
View this webcast to how Novartis, a global health care company, improved requirements management in their SAP environment to provide more complete traceability, ensuring that they developed against their requirements and successfully tested them. 
(WEBCAST) READ ABSTRACT |

SAP Performance on Vblock Systems by VCE (E-mail this company)

February 2013 - (Free Research)
In this white paper, explore detailed run-downs of the possibilities for private cloud virtualization for mission-critical, enterprise-class SAP applications. Read on for more information on performance and comparison results across virtualization platforms, architecture and technology overviews, business and use cases, and more. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

The Business Case for Outsourcing to Vietnam by LogiGear Corporation

June 2011 - (Free Research)
This white paper provides a business case for considering Vietnam as an offshore outsourcing destination, and offers specific examples from the IT and software industries, including a US software testing firm with a facility in Vietnam. 
(WHITE PAPER) READ ABSTRACT |

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain. 
(WHITE PAPER) READ ABSTRACT |

DLP Content Discovery: Best Practices for Stored Data Discovery and Protection by Symantec Corporation

March 2009 - (Free Research)
According to author Rich Mogull, one of the most under-appreciated aspects of DLP solutions is content discovery. Read this paper on DLP and discover features, best practices for deployment, and example use cases to illustrate how it functions. 
(WHITE PAPER) READ ABSTRACT |

5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by Marathon Technologies

September 2009 - (Free Research)
This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure. 
(WHITE PAPER) READ ABSTRACT |

Mobile banking strategies - maximise your revenues by ComputerWeekly.com

December 2010 - (Free Research)
Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation API Delivery Platform : How to Use an API Server to Manage, Deliver and Secure APIs by Vordel now part of Axway

April 2013 - (Free Research)
In this white paper, discover the next generation of APIs: API delivery platforms and servers. Read on for more information and details on API management, security, and delivery, the next generation of application architecture, key app design and usage changes, and more. 
(WHITE PAPER) READ ABSTRACT |

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications by Hewlett-Packard Limited

December 2012 - (Free Research)
Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world. 
(PRESENTATION) READ ABSTRACT |

Automating Industrial Supply Chains by Intermec

March 2009 - (Free Research)
Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Disaster Recovery Seminar Presentation Download by EMC Backup and Recovery Solutions

September 2009 - (Free Research)
This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Perceptions of business technology in the 21st century by ComputerWeekly.com

February 2012 - (Free Research)
The Economist Intelligence Unit reviews changing expectations for technology and assesses their implications for  CIOs, the IT function and the business. 
(ESSENTIAL GUIDE) READ ABSTRACT |

IDS vs. IPS by Sourcefire

April 2011 - (Free Research)
When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system. 
(EGUIDE) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

The Case for Risk-Based, Business-Aligned Internal Audit by RSA, The Security Division of EMC

December 2010 - (Free Research)
The world we operate in as business professionals is rapidly changing. Organizations are faced with the increasing complexities of global operations, the growing morass of regulatory demands, pressures to decrease cost and increase efficiency, and the prospect of dealing with a set of new and potentially catastrophic risks. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts