Government Sub ActivityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Government Sub Activity returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Virtualization
 •   Storage Management
 •   Enterprise Information Integration/ Metadata Management
 •   Data Security
 •   Enterprise Systems Management
 •   Application Management and Maintenance
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Network Security
 •   Storage Security

Related Searches
 •   Files Government
 •   Government Package
 •   Government Sub Activity Best
 •   Government Sub Activity Environment
 •   Government Sub Activity Storage
 •   Government Sub Integration
 •   Government Sub Professional
 •   Internet-Based Government Sub
 •   Techniques Government Sub Activity
 •   Utility Government
Advertisement

ALL RESULTS
1 - 25 of 490 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Risk Management and Product Delivery in Consumer Lending by ILOG, an IBM Company

September 2008 - (Free Research)
Amid the ongoing impact of the sub-prime meltdown and the ensuing credit crunch, lenders are facing a much tougher market than has been seen for some time. Business Rules Management Systems (BRMS) can enhance risk management, lending process streamlining and flexibility. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

California Institute for Telecommunications and Information Technology (Calit2) Uses Kognitio WX2 for CAMERA Project by Kognitio

July 2007 - (Free Research)
In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data. 
(CASE STUDY) READ ABSTRACT |

E-Guide: New Wave of Automated Tiering Software Eases Migration, Adds Control by Dell Compellent

May 2011 - (Free Research)
In this tutorial on automated tiering, we outline the sub-LUN offerings the major storage vendors are promoting alongside their SSD options. We also explore five questions users need to consider as they evaluate sub-LUN tiering options, and more. 
(EGUIDE) READ ABSTRACT |

How to Profit in a Downturn: 4 Customer-centric Strategies for Growth in a Challenging Market by Pivotal CRM, a CDC Software solution

February 2009 - (Free Research)
In this white paper, learn how your organization can use customer-centric strategies and CRM tools to maximize the value and loyalty of your customer base. Gain insight into new areas of opportunity and do more with less in a time of economic uncertainty. 
(WHITE PAPER) READ ABSTRACT |

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

Creating Order from Chaos in Data Centers and Server Rooms by APC by Schneider Electric

February 2009 - (Free Research)
Data center professionals can rid themselves of messy racks, sub-standard under floor air distribution, and cable sprawl with a minimum of heartache and expense. This paper outlines several innovative approaches for dealing with the symptoms of chaos and for eliminating the root causes of disorder. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine by SearchSecurity.com

October 2013 - (Free Research)
Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change. 
(EZINE) READ ABSTRACT |

Beyond VoIP: Enterprise Perspectives on Migrating to Multi-modal Communications and Wireless Mobility by Avaya Inc.

July 2008 - (Free Research)
As per this report the industry providers are already delivering the new piece parts for such convergence, although new standards are still evolving to enable maximum interoperability across converged telecommunication infrastructures. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 8 May 2012: The changing face of retail IT by ComputerWeekly.com

May 2012 - (Free Research)
In this week’s Computer Weekly, we look at the IT challenges facing retailers, as consumers turn increasingly to web and mobile shopping channels. Oracle president Mark Hurd talks about how the supplier intends to simplify IT infrastructures. And new government CIO Andy Nelson discusses how he plans to transform Whitehall IT. Read the issue now. 
(EZINE)

Symantec Internet Security Threat Report by Symantec Corporation

April 2008 - (Free Research)
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats. 
(WHITE PAPER) READ ABSTRACT |

Webinar: IBM IIM for Fraud, Abuse and Waste in Government by IBM

April 2014 - (Free Research)
Tune into the following webinar to explore the challenges and opportunities within the current state of fraud reduction, waste, and abuse in government programs and agencies. Also gain access to technology recommendations and more. 
(WEBCAST) READ ABSTRACT |

Mobility Success Story: Bank Improves Collaboration and Service by AdvizeX Technologies

March 2014 - (Free Research)
A top-25 commercial bank needed to give its mobile workforce secure access to business applications and data: without it, customer service was sub-par and collaboration suffered. In this brief case study, find out how the bank, along with a consulting partner, delivered a strategy that allowed employees to access applications and data in real-time 
(CASE STUDY) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Founding Principles by ComputerWeekly.com

February 2011 - (Free Research)
The overriding goals for Data Centre Consolidation, the G-Cloud and the Applications Store for Government are:Reduce ICT costs;Provide open competition and create a vibrant marketplace enabling the best product at the best price;Create flexibility. 
(WHITE PAPER) READ ABSTRACT |

Sybase IQ , A Competitive Analysis by Sybase, an SAP company

October 2010 - (Free Research)
This paper, intended for both IT and operational management, explores a series of high-level best practices for analytics and data warehousing based on Sybase’s experience with successful implementations. Suggestions are provided in three categories: performance, cost control, and ease-of-deployment with each dimension broken down into sub-topics. 
(WHITE PAPER) READ ABSTRACT |

Special Report: Tiered Data Storage Strategies for Your IT Shop by Dell Compellent

August 2011 - (Free Research)
Check out this SearchStorage.com Special Report to learn everything storage tiering as it outlines four different options including dynamic storage tiering, sub-LUN tiering, data migration in tiering and auto-tiering. 
(EGUIDE) READ ABSTRACT |

ESG: Nexsan’s Flexible Storage System by Nexsan

September 2011 - (Free Research)
Although it’s a commonly used term, "midmarket" has no standard definition; however, it can usefully be given some specific context and parameters if looked at from the perspective of some common attributes that exist within and across its three sub-tiers: the bottom, middle, and top. 
(WHITE PAPER) READ ABSTRACT |

FAQ Guide: Data Deduplication and Compression on Primary Storage Can Reduce Data Footprint by CommVault Systems, Inc.

August 2011 - (Free Research)
Dave Russell, a research vice president at Gartner, discusses the current techniques for data reduction on primary storage, from standard compression to file- and sub-file deduplication, to a combination of deduplication and compression. He also outlines the emerging approaches that users may find more prevalent in the future. 
(EGUIDE) READ ABSTRACT |

The IBM Data Governance Unified Process: Driving Business Value with IBM Software and Best Practices Book (Sunil Soares) by IBM

March 2011 - (Free Research)
This 150 page book by Sunil Soares provides a practical set of detailed steps and sub-steps to implement an Information Governance program, as well as the associated automation provided by IBM Software. 
(BOOK) READ ABSTRACT |

Consolidating Applications with Oracle Solaris Containers by Oracle Corporation

May 2010 - (Free Research)
Oracle Solaris Containers implement OS virtualization using containers that are designed to provide a complete, isolated, secure runtime environment for applications—and in situations where resources can be managed with sub-CPU granularity. 
(WHITE PAPER) READ ABSTRACT |

Avaya IP Office Release 6: Small Office Deployment & TCO vs. ShoreTel IP Phone System by Avaya

September 2011 - (Free Research)
Read this white paper for a comparison of Avaya's IP Office and ShoreTel’s IP Phone System. Then discover how Avaya IP Office uses a scalable system that minimizes power consumption and avoids the need for a dedicated Windows server system in sub-20 person offices. 
(WHITE PAPER) READ ABSTRACT |

Can Your Data Center Infrastructure Handle the Heat of High Density by CyrusOne

August 2008 - (Free Research)
High density computing is today's standard in best-in-class performance and availability, and those that fail to keep pace or fall behind will find themselves no longer competitive in today's markets. 
(ANALYST REPORT) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 490 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts