General ModernWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: General Modern returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Center Management
 •   Application Management and Maintenance
 •   Mobile Device Management
 •   Enterprise Systems Management
 •   Wireless Technologies and Mobile Computing
 •   Application Servers
 •   Security Monitoring
 •   Application Integration
 •   Customer Service (General)

Related Searches
 •   Downloads General Modern
 •   Environment General Modern
 •   General Billing
 •   General Modern Coding
 •   General Modern Environment
 •   General Modern Iowa
 •   General Modern Online
 •   Measured General
 •   Reservation General
 •   Terminal General Modern
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

Modern Infrastructure June issue, The Case for Platform as a Service by SearchDataCenter.com

June 05, 2013 - (Free Research)
Understanding the differences between Infrastructure and Platform as a Service can be tricky in the cloud world. This issue of Modern Infrastructure explains where Platform as a Service (PaaS) can fit into the enterprise, and how IT managers are using it. 
(EZINE) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 11, 2011 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

 Five tips to reduce risk from modern web threats by Sophos, Inc.

October 06, 2010 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

Modern Cyber Threats and Government Agencies by M86 Security

November 18, 2011 - (Free Research)
View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more. 
(WHITE PAPER) READ ABSTRACT |

Overhauling a Legacy Contact Center: Starting Steps by Five9

May 10, 2013 - (Free Research)
Overhauling legacy contact center technology is often costly and time-consuming, but it doesn't have to be. This expert e-guide offers advice on deciding when it's time to upgrade your contact center, making the business case for an overhaul, and important change management considerations. 
(EGUIDE) READ ABSTRACT |

HP StorageWorks SAN Virtualization Services Platform by HP StorageWorks Division India

May 01, 2009 - (Free Research)
This paper provides a general overview of virtualization technology and explains in more detail the value of storage virtualization in modern IT infrastructures. It presents a number of common use cases and describes more specifically the benefits of the SVSP in those scenarios. 
(WHITE PAPER) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 11, 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

Implementing Highly Available Data Protection with Veritas NetBackup by Symantec Corporation

February 2008 - (Free Research)
This paper looks at the components of a data protection system based on NetBackup and outlines a number of different configurations and solutions aimed at both reducing the risk of failure within a particular site and recovering from the loss of the site. 
(WHITE PAPER) READ ABSTRACT |

Court Case Management from IBM by IBM

March 2011 - (Free Research)
Read this paper to learn how advanced case management solutions from IBM can help assist organizations in a wide array of case management scenarios. 
(WHITE PAPER) READ ABSTRACT |

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Email As Part Of A Business Continuity Strategy: Why Always-On-Business Requires Always-On-Email by Mimecast

August 2009 - (Free Research)
The modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event. Maintaining access to email while upholding risk mitigation and compliance is a challenging endeavor. 
(WHITE PAPER) READ ABSTRACT |

e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks by Sophos, Inc.

June 2011 - (Free Research)
Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them. 
(EGUIDE) READ ABSTRACT |

Bell Rings in Improved Customer Address Information by DataFlux Corporation

February 2011 - (Free Research)
Canada's largest communications company used Modern Analytics and DataFlux technology to de-duplicate records and gain an accurate view of domestic dwellings. 
(CASE STUDY) READ ABSTRACT |

The Importance of Continuity in Office 365 Environments by Mimecast

April 2013 - (Free Research)
Email downtime can translate to big losses for your business, especially in Microsoft Office 365 environments. This valuable report explains how implementing a continuity strategy can enable your users to continue working even when service is unavailable. 
(WHITE PAPER) READ ABSTRACT |

Using Classification to Manage Email Policy for the Enterprise by TITUS

May 2008 - (Free Research)
Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email. 
(WHITE PAPER) READ ABSTRACT |

Go beyond the surface: User Experience Design At A Glance by Hewlett-Packard Company

June 2013 - (Free Research)
This brief resource explains how User Experience Design services can deliver strategic business value by enabling your organization to increase sales and conversions, improve customer retention, build brand trust, and more. 
(WHITE PAPER) READ ABSTRACT |

Social Customer Service: The Pivotal Driver of the Social Enterprise by LiveOps

July 2012 - (Free Research)
Read this paper to see how you can maximize your customer relationship management efforts through social customer service and foster brand loyalty, higher customer lifetime value, enhanced customer experience, and higher revenues. 
(WHITE PAPER) READ ABSTRACT |

Making the IVR Work for You and Your Customers with Self Service Differentiation by inContact

August 2011 - (Free Research)
This webcast covers the potential of interactive voice recognition (IVR) technology to power service differentiation and improve customer relations. 
(VIDEO) READ ABSTRACT |

Unleash the business opportunity of modern apps – 9 business challenges and modern app scenarios by Intel

December 2012 - (Free Research)
Access this paper today to learn about the four of the biggest trends influencing modern apps and find nine business scenarios that cover three important aspects of modern apps. Also inside, discover your own business opportunities using modern apps. 
(WHITE PAPER) READ ABSTRACT |

Empowering Modern Finance by Oracle Corporation

April 2014 - (Free Research)
Modern financial organizations are no longer satisfied with simply containing costs -- they are committed to improving operations, leveraging analytics, and producing data-driven insight. In this report, discover what C-suite and line-of-business execs had to say about the goals of modern finance organizations and the role of technology. 
(WHITE PAPER) READ ABSTRACT |

Planning for the Redeployment of Technical Personnel in the Modern Data Center by Global Knowledge

April 2014 - (Free Research)
This whitepaper provides a comprehensive training strategy for planning for the redeployment of technical personnel in today’s modern datacenters. 
(WHITE PAPER) READ ABSTRACT |

Benefits of Migration to Modern Middleware Services by Red Hat

June 2013 - (Free Research)
Aging and inflexible middleware can be hindering your organization in more ways than one, especially when it comes to change management. In this white paper, learn the key characteristics of a modern middleware platform and discover how you can benefit by migrating from a legacy middleware infrastructure to a more flexible, modular environment. 
(WHITE PAPER) READ ABSTRACT |

Modern Infrastructure: March 2013 by SearchDataCenter.com

March 2013 - (Free Research)
The March issue of the Modern Infrastructure E-Zine addresses the continued breakdown of both (1) IT silos and (2) any remaining divisions between IT and the business. Download your copy today for tips, advice, and news analysis on supporting the business and delivering superior services to users. 
(EZINE) READ ABSTRACT |

Modern Infrastructure July 2013 by SearchDataCenter.com

July 2013 - (Free Research)
The July issue of Modern Infrastructure covers the challenges of private cloud adoption, along with endpoint management and top-notch server and network design. 
(EZINE) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts