General WhatWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: General What returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   E-Mail Management
 •   Anti-Spam
 •   Customer Service (General)
 •   Customer Relationship Management (CRM)
 •   Network Security
 •   Email Archiving
 •   Anti-Virus Solutions
 •   Storage Management
 •   Security Monitoring

Related Searches
 •   General Computers
 •   General Manufacturers
 •   General Server
 •   General What Fact
 •   General What Finds
 •   General What Planning
 •   General What Sample
 •   General What Strategic
 •   Manufacturers General
 •   Organizational General What
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Comparing Email Archiving Software with General Archiving Software by Symantec Corporation

November 20, 2012 - (Free Research)
Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task. 
(EGUIDE) READ ABSTRACT |

Data Encryption 101: A Pragmatic Approach to PCI Compliance by Prime Factors, Inc.

September 09, 2010 - (Free Research)
The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Comparing email archiving software with general archiving software by Hewlett-Packard Company

May 02, 2013 - (Free Research)
This expert E-Guide from SearchDataBackup.com differentiates between email-specific and general archiving solutions and explores features and benefits unique to each. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Legal Discovery and Your Messaging Environments - What's Important and Why! by Daegis

December 02, 2009 - (Free Research)
In this presentation transcript, learn how Lotus Notes Administrators play an important role in legal discovery. Find out how archiving systems can help meet compliance standards and gain an understanding of business requirements around e-discovery. Discover how to make sure your company’s information is properly archived. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Three IT Questions for the Small Business Owner, Part 3 - What is IT Management and Why Should I Care? by Dell, Inc. and Microsoft

December 18, 2009 - (Free Research)
In the third presentation transcript of this three-part Q&A series with expert Greg Shields, learn what IT Management is and why, as a small business, you need to understand and care about IT Management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 20, 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

Network Virtualization Technology: What can it do for Your Network Today by Dell, Inc.

December 05, 2013 - (Free Research)
This expert guide from SeachSDN.com discusses what network virtualization technology can do for your network and outlines critical considerations for a successful hybrid environment. 
(EGUIDE) READ ABSTRACT |

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses by Cisco Systems, Inc.

February 13, 2009 - (Free Research)
Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software. 
(CASE STUDY) READ ABSTRACT |

Going Green While Reducing Operational Costs by IBM

January 16, 2009 - (Free Research)
Review this document based on an IBM/TechTarget Webcast entitled "Going Green While Reducing Operational Costs" to learn what experienced analyst Joe Clabby has to say about data centers and facilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Elephant in the Room - Cloud Security and what Vendors and Customers Need to do to Stay Secure by Rackspace Hosting

May 31, 2011 - (Free Research)
Both vendors and customers share the responsibility of cloud security, and each have their own part to play. This white paper highlights a non-profit organization's findings on the most typical security practices across the cloud computing industry. 
(WHITE PAPER) READ ABSTRACT |

Virtualization for Dummies eBook by SearchDataCenter.com

May 18, 2011 - (Free Research)
Virtualization doesn't have to break your back or your business's bank account.  Virtualization for Dummies explores the ins and outs of enterprise virtualization as well as the basics of general virtualization applications, migrations, and best practices. Get informed, no matter what virtualization solution you choose. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 19, 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 11, 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Why CRM Implementations Fail….And What To Do About It by Scribe Software Corporation

March 01, 2011 - (Free Research)
Companies are scrambling to implement CRM systems, but they might not be getting what they bargained for if they're not careful. Up to 80% are reporting they're not getting what they were promised. Read this paper and learn how to avoid pitfalls, develop a strategy for your CRM system, and much more. 
(WHITE PAPER) READ ABSTRACT |

Gone in 30 Days: Exchange, Retention, and Regulatory Compliance by Sherpa Software

September 10, 2009 - (Free Research)
In this white paper, we will discuss how to discover, manage, and archive information within your Exchange enterprise to successfully limit your legal exposure and protect your corporate information. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Picking the Right Thin Client by Pano Logic, Inc

December 16, 2009 - (Free Research)
This presentation transcript, featuring Brian Madden and Gabe Knuth, provides expert advice to help you select the right thin client for your environment. Learn which features are important and how to manage thin clients effectively. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Strategies for Profitable Growth - Aerospace & Defense Manufacturing by SAP AG

January 01, 2005 - (Free Research)
Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business. 
(WHITE PAPER) READ ABSTRACT |

Spam, Spammers, and Spam Control by Trend Micro GmbH

March 06, 2009 - (Free Research)
This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam. 
(WHITE PAPER) READ ABSTRACT |

Identity-Aware Networking by Extreme Networks (E-mail this company)

December 02, 2010 - (Free Research)
When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 24, 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

The Platinum Rule of Service by Mindshare Technologies

March 04, 2008 - (Free Research)
The Platinum Rule builds on the Golden Rule for our more individualistic society by recognizing that we have very different preferences than those around us. 
(WHITE PAPER) READ ABSTRACT |

Virtualizing your Exchange Server: Fact vs. fiction by SearchDataCenter.com

December 14, 2011 - (Free Research)
Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Deployment by Google Apps

January 19, 2011 - (Free Research)
Read this transcript to geek out with Jim Copeland, Dan Kennedy and Marcello Pedersen, Google Apps deployment specialists, on why a "big bang" approach is earning customers accolades within their organizations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Deployment by Google Apps

June 11, 2010 - (Free Research)
Read this transcript to geek out with Jim Copeland, Dan Kennedy and Marcello Pedersen, Google Apps deployment specialists, on why a "big bang" approach is earning customers accolades within their organizations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

What if? Unleashing the Potential of Digital Signage by Insight

December 21, 2012 - (Free Research)
In this presentation transcript, Principle Analyst Zeus Kerravala of ZK Research reveals the secrets of utilizing digital signage to its fullest potential. Learn the transformations this technology has gone through, where it's going, and how businesses have successfully leveraged its power. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts