Government BasicWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Government Basic returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Business Process Management (BPM)
 •   Routers
 •   Data Center Management
 •   Data Security
 •   Virtualization
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Testing and Analysis
 •   Enterprise Resource Planning (ERP)

Related Searches
 •   Automated Government Basic
 •   Batch Government
 •   Government Basic Conference
 •   Government Basic Implementation
 •   Government Basic Kansas
 •   Government On-Line
 •   Government Risk
 •   Issues On Government Basic
 •   Operating Government Basic
 •   System Government Basic
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco 2800 Series by Cisco Systems, Inc..
The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speed up to multiple T1/E1/xDSL connections. more...
>> Discover more offerings from Cisco Systems, Inc..

Router Essentials by Global Knowledge

October 2008 - (Free Research)
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Constituent Perceptions with CRM for Public Sector: Advancing Beyond Efficiency and Service Improvements by SAP America, Inc.

September 2010 - (Free Research)
By using a CRM strategy with software solutions, government agencies can achieve a host of benefits when it comes to streamlining business processes and analytical capabilities. Read on to learn how By enabling such CRM processes, governments can build communication campaigns that help shape the public’s perceptions and advance the value delivered. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 March 2012: The open data revolution by ComputerWeekly.com

March 2012 - (Free Research)
In this week’s Computer Weekly, Cabinet Office minister Francis Maude talks about releasing government datasets to the public and why open data will drive the next industrial revolution. We also review the latest test version of Windows 8 and see how it shapes up for tablet computers and business users and much more. 
(EZINE)

Introduction to the IP Multimedia Subsystem (IMS): IMS Basic Concepts and Terminology by F5 Networks

August 2007 - (Free Research)
IMS is a whole new way to deliver multimedia regardless of the device or the access medium. This paper will change the way you relate to an increasingly digital world. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a PeopleSoft Archiving Project: Seven Basic Principles for Archiving PeopleSoft Enterprise Data by IBM

March 2008 - (Free Research)
Only Princeton Softech Optim™ provides proven, full-lifecycle capabilities for archiving and managing PeopleSoft Enterprise application data, with the broadest range of implementation options to ensure your success. 
(WHITE PAPER)

Sedona Conference® Commentary On Legal Holds: The Trigger & The Process by ZANTAZ

January 2008 - (Free Research)
This Article, intended to provide guidance on those issues, is divided into two parts: The "trigger" and the "legal hold." 
(WHITE PAPER) READ ABSTRACT |

How to tie learning to business impact by ComputerWeekly.com

December 2010 - (Free Research)
Many organisations implement “learning engagements,” or training programmes, to increase employee satisfaction, realise better team performance, and improve communication. 
(WHITE PAPER) READ ABSTRACT |

Managing Paper Patient Records In a Clinical Practice by Nuance

October 2011 - (Free Research)
Read this study conducted by Nuance Communications to better understand the bottlenecks and issues that arise from using paper documents in the health care field and how electronic document management can greatly eliminate these issues. 
(WHITE PAPER) READ ABSTRACT |

Elementool Bug Tracking Keeps Software Fixes on Course by Elementool, Inc.

January 2008 - (Free Research)
Can you list all the issues your software team is working on? Can you sort them by severity, priority, features affected, and other criteria? Can you show the histories of all related actions? This article details how Elementool Bug Tracking can help. 
(ARTICLE) READ ABSTRACT |

z Cisco Catalyst 2950 Series Switches with Standard Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

The Top 9 Ways to Improve Customer Loyalty and Engagement by Allegiance

January 2008 - (Free Research)
Customer loyalty is a critical way to retain more of your customers and grow your business faster. Explore these nine principles to foster a culture of greater loyalty and engagement and you will see immediate profits. 
(WHITE PAPER) READ ABSTRACT |

PCI Basics: What it Takes to Be Compliant by Tripwire, Inc.

February 2011 - (Free Research)
This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply. 
(WHITE PAPER) READ ABSTRACT |

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

Advanced RFID Measurements: Basic Theory to Protocol Conformance Test by National Instruments

January 2006 - (Free Research)
As RFID adoption continues to grow, engineers are faced with an increasing need to validate tags both for interoperability with products from other vendors and for conformance with the specified protocol. 
(WHITE PAPER) READ ABSTRACT |

Part 1: Basic Storage and Networking Terms by EqualLogic, Inc.

February 2008 - (Free Research)
Greg begins with an introduction to storage and networking terminology, which helps to demystify complicating acronyms and other jargon used by storage and networking specialists. 
(VIDEOCAST) READ ABSTRACT |

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime by ArcSight, an HP Company

December 2010 - (Free Research)
When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft. 
(EGUIDE) READ ABSTRACT |

Service-Oriented Architecture - A New Alternative to Traditional Technology Integration by Information Builders

January 2005 - (Free Research)
This paper will examine the basic premises underlying SOAs and describe how universal technology and service adapters, such as those from iWay Software, can help organizations realize the benefits of SOAs. 
(WHITE PAPER) READ ABSTRACT |

What Technology Buyers Want You to Know About Online Content by KnowledgeStorm, Inc (E-mail this company)

December 2005 - (Free Research)
A new study, Define What's Valued Online, confirms what many technology marketers have instinctively suspected all along: Buyers of technology products consider Internet research essential to their ability to do their jobs. Learn about basic changes you can make to improve your online content. 
(WHITE PAPER) READ ABSTRACT |

Being Agile in a non agile world by Ivar Jacobson Consulting

March 2008 - (Free Research)
Learn how to effectively combine agile development techniques with traditional SDLC and other software engineering techniques. Explore the basic concepts behind agile thinking and the three perspectives associated with this process. 
(WEBCAST) READ ABSTRACT |

Highly Distributed Computing Is Key to Quality on the HD Web by Akamai Technologies

March 2008 - (Free Research)
This paper outlines the basic requirements for delivering high-definition (HD) video via broadband and describes how Akamai, through highly distributed computing, is uniquely able to extend the Internet's capacity. 
(WHITE PAPER) READ ABSTRACT |

Closed Loop Lifecycle Planning©: Optimizing for Energy Efficiency in the Upcoming Technology Refresh Cycle by Hewlett-Packard Company

October 2008 - (Free Research)
This paper encourages all businesses, regardless of size and complexities, to consider a more formal "green" strategy in regards to client computing and the technology refresh cycle. 
(WHITE PAPER) READ ABSTRACT |

The Foundation of High-Value Business Intelligence: A Description of the WebFOCUS 7.1 Architecture by Information Builders

June 2006 - (Free Research)
Good architecture for information systems is as important as good engineering is for automobiles and with good architecture, applications can be scaled up with less hardware. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts