Government TechnicalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Government Technical returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Data Security
 •   Disaster Recovery
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Disk-based Backup & Storage/ RAID
 •   Business Process Management (BPM)
 •   Service Oriented Architecture (SOA)
 •   Storage Management
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Articles About Government Technical
 •   Crm Government Technical
 •   Government Automation
 •   Government Technical Designing
 •   Government Technical Import
 •   Government Technical Product
 •   Government Technical Related
 •   Scheduling Government Technical
 •   Tools Government Technical
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Technical Guide on Government Security by SearchSecurity.com

May 23, 2011 - (Free Research)
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats. 
(EGUIDE) READ ABSTRACT |

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report by ComputerWeekly.com

February 07, 2011 - (Free Research)
This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud by IBM

August 17, 2010 - (Free Research)
This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more. 
(TECHNICAL ARTICLE)

Protecting Your Business: Services and Time Critical Applications in and Cost-effective Way by Alcatel-Lucent

January 2008 - (Free Research)
Ensuring that business operations continue regardless of any circumstance is big business. Whether disruptions come as a result of natural disasters; sabotage (malware); technical failures in data storage or networking components. 
(ARTICLE) READ ABSTRACT |

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

Focus Research Series: Desktop and Application Delivery Landscape Report with All Profiles by Focus

April 2008 - (Free Research)
This excerpt of the Focus Landscape Research Series covers the drivers, trends, technical approaches and available solutions involved in evaluating and implementing desktop and application virtualization and delivery alternatives. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 29 January 2013: The end of the PC refresh cycle? by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now. 
(EZINE) READ ABSTRACT |

7 Measures of Scalability for your Next-Generation Firewall (Gov) by Dell Software

August 2013 - (Free Research)
Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls. 
(WHITE PAPER) READ ABSTRACT |

Successful Business Guide for Data Migration: Re-engineering Data for Optimized Value by Datanomic

April 2008 - (Free Research)
Up to 75% of new systems fail to meet expectations, often because flaws in the migration process result in invalid data. With an understanding of the challenges, managing the migration as part of the investment is much more likely to... 
(WHITE PAPER) READ ABSTRACT |

EMC Documentum Information Rights Management by EMC Corporation

December 2006 - (Free Research)
This White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients. 
(WHITE PAPER) READ ABSTRACT |

BusinessObjects Edge Series - Technical White Paper by Business Objects

June 2008 - (Free Research)
This paper provides a technical overview of BusinessObject Edge Series-the end-to-end business intelligence (BI) solution for growing organizations. Learn how to take advantage of extensive BI capabilities to empower your end users and decision-makers 
(WHITE PAPER) READ ABSTRACT |

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management by eEye Digital Security

July 2010 - (Free Research)
In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

CW+: Quocirca report: Communications technology – be prepared to be flexible by ComputerWeekly.com

August 2010 - (Free Research)
Communications needs for many organisations are changing rapidly. Internally, there are always new technologies appearing and changes in working styles to deal with but there is now, increasingly, the influence of more social and consumer choices affecting the officially deployed systems. 
(WHITE PAPER) READ ABSTRACT |

Business Rules Management: Meeting Evolving Business Requirements by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper discusses a set of tools for effective business rule management. Learn how to author, deploy and manage critical business rules with greater speed and efficiency. 
(WHITE PAPER) READ ABSTRACT |

Backup Express and Novell Open Enterprise Server: A Business Continuity Model for OES Migration by Syncsort

March 2008 - (Free Research)
An operating system migration might complicate backup and recovery if you are not cautious. This white paper offers guidelines to assess whether your business-critical data and applications are protected and available during a migration project. 
(WHITE PAPER) READ ABSTRACT |

Technical Comparison of On-line Vs. Line-interactive UPS Designs by APC by Schneider Electric

January 2004 - (Free Research)
This paper describes the advantages and disadvantages of each topology and addresses some common misconceptions about real-world application requirements. 
(WHITE PAPER) READ ABSTRACT |

Network Appliance and VMware Virtual Infrastructure 3 Storage Best Practices by Arrow Electronics, Inc.

January 2008 - (Free Research)
This technical report reviews the best practices for implementing VMware Virtual Infrastructures on Network Appliance fabric-attached storage (FAS) systems. 
(WHITE PAPER) READ ABSTRACT |

CUSTOMER DATA INTEGRATION (CDI) by Wipro Technologies

February 2008 - (Free Research)
Customer Data Integration technologies can help to create a single, informative, accurate and timely view of the customer across the enterprise which can be used intelligently to achieve the banks objectives. 
(WHITE PAPER) READ ABSTRACT |

PCI Basics: What it Takes to Be Compliant by Tripwire, Inc.

February 2011 - (Free Research)
This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply. 
(WHITE PAPER) READ ABSTRACT |

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements. 
(PODCAST) READ ABSTRACT |

Rational Asset Manager Made Practical by IBM

November 2008 - (Free Research)
The eKit includes demos on how Rational Asset Manager tracks and audits your assets in order to utilize them for reuse. 
(WHITE PAPER) READ ABSTRACT |

BlackBerry Enterprise Server for IBM Lotus Domino Version 4.1: Feature and Technical Overview by BlackBerry

February 2006 - (Free Research)
Learn about the next step in wireless networking, the BlackBerry Enterprise Server. This paper provides an in-depth look at its architecture, components and key technical features. 
(WHITE PAPER) READ ABSTRACT |

The Role of Technical Computing in IT and Big Data by IBM

November 2013 - (Free Research)
This on-demand webcast examines how technical computing strategies can help you process, manage, and analyze growing data volumes and varieties. Tune in today to uncover the role of technical computing in IT and big data. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts