Function It ControlsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Function It Controls returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Systems Management
 •   Application Management and Maintenance
 •   Network Management
 •   Access Control
 •   Application Security
 •   Change and Configuration Management
 •   Security Policies

Related Searches
 •   Data Function
 •   Files Function
 •   Function It Controls Massachusetts
 •   Function It Controls Support
 •   Function It Flowchart
 •   Function It Guide
 •   Function It Types
 •   Function Plans
 •   Manufacturers Function
 •   Strategic Function It
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 23, 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

Unlocking the Value of Global Deduplication for Enterprise Data Management by CommVault Systems, Inc.

February 2009 - (Free Research)
CommVault Simpana software is the only end-to-end data management solution that delivers global data deduplication across replication, backup and archiving functions. This white paper explains more about this single-platform architecture that keeps compressed data on shared storage resources, giving you control over all data management functions. 
(WHITE PAPER) READ ABSTRACT |

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

Migrating Millions to IP: A Mission Impossible? Not with a Migration Control Center by Alcatel-Lucent

January 2007 - (Free Research)
This paper describes the key business drivers for the creation and operation of the MCC, the critical functions of the MCC, and the basic principles for establishing an effective MCC organization. 
(WHITE PAPER) READ ABSTRACT |

Network Boost: control all data in your network and accelerate your data exchanges by Orange Business Services

April 2009 - (Free Research)
This quick Flash presentation gives us an overview of Network Boost, a turn-key networking solution that offers application acceleration tools that are focused on achieving performance objectives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

The Value of Deduplication in Enterprise Data Management by CommVault Systems, Inc.

January 2009 - (Free Research)
CommVault's integrated deduplication solution reduces cost and complexity in your IT infrastructure while delivering improved performance, enhanced manageability and increased storage efficiency. 
(WHITE PAPER)

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Multi Process HR Outsourcing for Large US Retailer by Wipro Technologies

January 2009 - (Free Research)
Learn from the success one of the largest U.S. retailers who implemented an integrated global HR outsourcing solution that combined process, technology, domain, and service delivery expertise. 
(WHITE PAPER) READ ABSTRACT |

How to tackle Enterprise Information Protection & Control by ComputerWeekly.com

November 2010 - (Free Research)
Information protection needs to cover all data, from word processing documents to datawithin databases and executable code. It covers enterprise and personal data and is not justconfined to protecting entertainment media, which tends to be generically referred to as“Digital Rights Management” (DRM). 
(WHITE PAPER) READ ABSTRACT |

Achieve Network Visibility and Control with Firewall Traffic Classification by Palo Alto Networks

March 2014 - (Free Research)
In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies. 
(WHITE PAPER) READ ABSTRACT |

Multiplying MES Value with PLM Integration by Apriso Corporation

August 2008 - (Free Research)
MES platforms have, and continue to provide, significant opportunities to integrate manufacturing functions while reducing wasted time, energy, and material on the factory floor. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Effective Network Access Control by Bradford Networks

December 2011 - (Free Research)
There is often confusion between the functions and benefits of 802.1X and those of commercially available NAC solutions. Which is best for particular networks? View now to explore the fundamentals of 802.1X and NAC technologies and why both is often required to provide the level of security, control and visibility needed in today’s network. 
(WHITE PAPER) READ ABSTRACT |

NetMRI -- Take Control of Network Configurations and Changes by Netcordia

September 2009 - (Free Research)
Network change is the number one cause of performance related issues. NetMRI helps reduce cost by automating network change, improve service quality by managing network configurations and mitigate risk by ensuring a compliant network. Check out this free trial download to learn more. 
(TRIAL SOFTWARE)

The Sonic ESB: An Architecture and Lifecycle Definition by Progress

January 2005 - (Free Research)
Enterprise service bus (ESB) is a key SOA infrastructure technology to connect, mediate and control services and their interactions. Read this detailed analysis of the architecture and lifecycle of an ESB. 
(WHITE PAPER) READ ABSTRACT |

Data stewardship program: Quality booster, but a hard step for many by SAP America, Inc.

December 2012 - (Free Research)
Data stewards are central to the success of data governance programs. Without data stewards to facilitate the communications about data issues between IT and the business side, diverging data definitions, policies and quality controls can easily get out of control. This e-guide offers tips and best practices. 
(EGUIDE) READ ABSTRACT |

Securing and Controlling Sensitive Data in the Cloud by Trend Micro

December 2012 - (Free Research)
This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance. 
(WHITE PAPER) READ ABSTRACT |

The Ultimate Guide to Gaining Control of Your WAN by SearchEnterpriseWAN E-Books

February 2009 - (Free Research)
Many of today's cost-saving IT projects are placing excessive pressure on the WAN. Learn how to overcome these challenges with WAN optimization technology. 
(EBOOK) READ ABSTRACT |

Is Your Outsourcing Strategy Under Your Control? by SearchDataCenter.com

October 2013 - (Free Research)
Proactive planning and evaluation can prevent common problems with IT outsourcing providers, keeping your data safe and ensuring your outsourcing venture is cost-effective. 
(WHITE PAPER) READ ABSTRACT |

Three Keys to Effective Service-oriented Architecture Governance by Accenture

June 2008 - (Free Research)
While most leading companies' IT organizations are well on the way to adopting service-oriented architecture capabilities, many find their progress slowed by questions about who owns business services. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Local Traffic Manager by F5 Networks

The BIG-IP® Local Traffic Manager is an application delivery networking system that provides the most intelligent and adaptable solution to secure, optimize, and deliver applications, enabling organizations to effectively and competitively run their business 
(HARDWARE PRODUCT)

Why a Shop Floor Execution (SFX) System Is an Essential Complement to Enterprise Systems by Casco Development, Inc.

July 2008 - (Free Research)
Shop Floor Execution (SFX) automates and streamlines factory operations by combining three popular applications: Labor Management, Machine Utilization and Paperless Dispatching. This provides the essential tools for real-time production process management 
(WHITE PAPER) READ ABSTRACT |

Optimizing Mainframe Success by Simplifying Ownership by CA Technologies.

December 2008 - (Free Research)
The mainframe offers value in today's enterprise computing environments, where growing workloads, constrained resources, regulatory imperatives and corporate "green" mandates are intensifying the pressure on IT organizations. As the industry's most experienced mainframe professionals approach retirement, organizations are facing tough choices. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts