Functions Of Profile SharedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Functions Of Profile Shared returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Business Intelligence Solutions
 •   Storage Management
 •   Business Process Management (BPM)
 •   Network Security
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Information Integration/ Metadata Management
 •   Backup Systems and Services
 •   Enterprise Systems Management

Related Searches
 •   Automate Functions
 •   Charts Functions Of
 •   Functions Contacts
 •   Functions Of Cases
 •   Functions Of Export
 •   Functions Of Profile Organizational
 •   Functions Of Profile Strategy
 •   Functions Of Sql
 •   Functions Prices
 •   Size Functions
Advertisement

ALL RESULTS
1 - 25 of 445 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats by ComputerWeekly.com

September 2011 - (Free Research)
The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues. 
(IT BRIEFING) READ ABSTRACT |

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk by IBM Line of Business

June 2008 - (Free Research)
Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price. 
(WHITE PAPER)

IDC Vendor Profile: CommVault Gains Market Share and Continues to Outperform Storage Software Markets by CommVault Systems, Inc.

February 2010 - (Free Research)
Over the past five years, the storage software industry has faced consolidation. Large incumbents have acquired innovative technology from start-ups and emerging companies. CommVault Systems (CVLT) is a data and information management software provider challenging traditional incumbents. 
(ANALYST REPORT)

Documentum - Digital Asset Manager by EMC Corporation

EMC Documentum Digital Asset Manager exposes a set of powerful transformations and enhanced content previews, enabling you to fully leverage the value of your digital assets. 
(SOFTWARE PRODUCT)

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

ShareFile Customer Spotlight (U.S. Retail) by Citrix Systems, Inc. (E-mail this company)

August 2013 - (Free Research)
Imagine how your business could function more efficiently if all data was shared on compatible software without file size or format being a concern. This case study demonstrates how a major retail chain's business benefits from enterprise file sharing internally and across thousands of third-party agencies. 
(WHITE PAPER) READ ABSTRACT |

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms by ESET

February 2009 - (Free Research)
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Evaluating The Performance Of Shared WAN Links For Data Center Backup And Disaster Recovery by Silver Peak

September 2010 - (Free Research)
Backup and disaster recovery are perennially among the top three IT challenges, and they’re rated by 62% of enterprises as a high or critical priority. What exactly are these enterprises doing? Building multiple data centers. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

Oracle Data Mining 11g Release 2 Competing on In-Database Analytics by Oracle Corporation

June 2012 - (Free Research)
This paper offers an overview of Oracle Data Mining, detailing how you can build predictive models to better target customers, develop detailed customer profiles and detect and prevent fraud. Read on and learn how this data mining tool eliminates data extraction and movement, delivers the lowest TCO compared to traditional vendors and more. 
(WHITE PAPER) READ ABSTRACT |

Market Share Analysis: Data Center Hardware Integrated Systems , 1Q11 - 2Q12 by VCE (E-mail this company)

November 2012 - (Free Research)
The market for integrated systems is a key growth area for data center hardware infrastructure. This report sizes the market and profiles early leaders in this important and emerging area. 
(WHITE PAPER) READ ABSTRACT |

10 tips to integrate mobile and social marketing by IBM

November 2013 - (Free Research)
In this white paper, get 10 tips to help break through the silos and integrate social and mobile marketing with traditional channels. 
(WHITE PAPER) READ ABSTRACT |

Market Trends - Secure File Sharing and Collaboration in the Enterprise by Accellion, Inc.

February 2014 - (Free Research)
This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Data Systems Object Storage Solutions by Hitachi Data Systems

April 2013 - (Free Research)
This solution profile explores the innovation of object storage designed to address the challenges of fast growing file data, and integrate many key technologies in a single storage platform. Find out how this approach provides a path to short-term return on investment and significant long-term efficiency improvements. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 2 August 2011: We examine the calls for radical reform in the relationship between Whitehall and its IT suppliers by ComputerWeekly.com

August 2011 - (Free Research)
With the release of a scathing report on government IT, we examine calls for radical reform in the relationship between Whitehall and its IT suppliers. Also this week, the first part of our Buyer’s Guide to Big Data, and a case study on how Carphone Warehouse improved customer satisfaction by 38% using business process management (BPM) software. 
(EZINE) READ ABSTRACT |

AppSense User Virtualisation Platform by AppSense

June 2011 - (Free Research)
Immense changes are taking place throughout the IT infrastructure, especially in the area traditionally referred to as the "desktop." With mobile devices, laptops, netbooks and fixed desktops allowing simultaneous and varied computing experiences, user virtualisation creates one centralised control that manages users across multiple devices. 
(PRODUCT REVIEW) READ ABSTRACT |

Trust in Cyberspace by (ISC)2 UK Ltd

February 2014 - (Free Research)
In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product. 
(WHITE PAPER) READ ABSTRACT |

Placing Advanced Analytic Integration In The Palm Of Your Hand by Pitney Bowes Business Insight

November 2010 - (Free Research)
Businesses are always searching for new resources that give them a better understanding of their customers, prospects, competition and current operations. This insight can be achieved by integrating analytical tools into their business processes. Read this presentation transcript to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Storage and the WAN by Riverbed Technology, Inc.

April 2009 - (Free Research)
Looking to connect your remote office devices to primary central files? Looking for a way to increase bandwidth without increasing costs? Download this WAN Special Report to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Sustained Growth Through Operational Excellence by SAP AG

June 2009 - (Free Research)
Operational excellence is a simple concept with complex implications. Consistently doing things well across every element of the value chain is clear enough in principle. The ultimate goal is a "single source of truth" where senior executives have shared visibility into all parts of the organisation, enabling management by facts. 
(WHITE PAPER) READ ABSTRACT |

Achieving Sustained Growth through Operational Excellence by SAP AG

June 2009 - (Free Research)
Operational excellence is a simple concept with complex implications. Consistently doing things well across every element of the value chain is clear enough in principle. The ultimate goal is a "single source of truth" where senior executives have shared visibility into all parts of the organization, enabling management by facts. 
(WHITE PAPER) READ ABSTRACT |

Unlocking the Value of Global Deduplication for Enterprise Data Management by CommVault Systems, Inc.

February 2009 - (Free Research)
CommVault Simpana software is the only end-to-end data management solution that delivers global data deduplication across replication, backup and archiving functions. This white paper explains more about this single-platform architecture that keeps compressed data on shared storage resources, giving you control over all data management functions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 445 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts