Great Technical ExamplesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Great Technical Examples returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Data Center Management
 •   Storage Management
 •   Enterprise Resource Planning (ERP)
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management
 •   Data Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   WAN/ LAN Solutions
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Conferences Great Technical
 •   Contracts Great Technical
 •   Firms Great Technical
 •   Flowchart Great Technical
 •   Great Technical Examples Web Cast
 •   Great Technical Features
 •   Great Technical Markets
 •   Great Technical Need
 •   Script Great Technical
 •   Template Great Technical Examples
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

Course: Insecure Temporary Files (CWE-377) by Klocwork

November 13, 2013 - (Free Research)
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377. 
(WEBCAST) READ ABSTRACT |

Course: Improper Validation of Array Index (CWE-129) by Klocwork

November 13, 2013 - (Free Research)
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: The Power of Universal Patterns and Models for Master Data Management by Embarcadero Technologies, Inc.

October 19, 2009 - (Free Research)
In this presentation transcript featuring best-selling author, Len Silverston, learn how to implement universal patterns for data modeling to improve management flexibility. Gain insight into various modeling choices to meet your organization's needs. Discover how to improve quality and reduce management costs by re-using patterns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Enabling The Business Governance Of Data by ASG Software Solutions

February 05, 2010 - (Free Research)
In this presentation transcript, Scott McCurdy, SVP of Business Solutions at ASG and featured guest Rob Karel, Principal Analyst at Forrester Research, discuss how enterprises are linking technical metadata to the formal management of business terms to achieve true enterprise data governance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Move Toward IT Service Management (ITSM) Mobilization by BlackBerry

February 17, 2010 - (Free Research)
IDG Research Services recently surveyed more than 200 CIOs and senior IT and business executives at companies of all sizes to examine the benefits of giving employees mobile access to strategic business applications, including ITSM applications. This analyst report discusses the benefits of ITSM mobilization and key findings from the IDG survey. 
(ANALYST REPORT) READ ABSTRACT |

Inspiring disruption: Tech Trends 2014 by ComputerWeekly.com

February 26, 2014 - (Free Research)
This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Blackberry Enterprise Solution: Security Technical Overview by BlackBerry

December 2008 - (Free Research)
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Red Flag Rules Compliance by Gemalto

September 2010 - (Free Research)
SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims. 
(EBOOK) READ ABSTRACT |

Cloud Computing for Developers by IBM

September 2010 - (Free Research)
Join us for the Cloud computing for developers virtual events in October and learn how to solve business and technical challenges in the cloud. Through real-world examples of specific challenges and solutions, as well as live demos of techniques and products, you can learn more about leveraging the cloud. Read on for details. 
(EVENT)

Tiered Storage Takes Center Stage (Horison) by Oracle Corporation

December 2010 - (Free Research)
This paper describes how tiered storage, as a storage initiative, has been proven to significantly reduce acquisition and operating costs for medium and large scale storage enterprises. Read this paper to learn more about how tiered storage is taking center stage. 
(WHITE PAPER) READ ABSTRACT |

Elavon Achieves Greater Business Agility with CA Data Center Automation by CA Technologies.

October 2008 - (Free Research)
Learn about a real-life example of how an automation architecture design that consolidates redundant, underperforming assets enabled one organization to meet the demands of an aggressive growth strategy while delivering high levels of service quality. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges by Panaya, Inc.

April 2010 - (Free Research)
This presentation transcript of the webcast “Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges” explores the top challenges of an SAP ERP 6.0 upgrade and provides must-know advice, real-world examples, technical tips and other tricks to help you solve them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Session Initiated Protocol (SIP): A Five-Function Control Protocol by F5 Networks

August 2007 - (Free Research)
The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications. 
(WHITE PAPER) READ ABSTRACT |

Alteryx PT by Alteryx, Inc.

December 2011 - (Free Research)
In this BeyeNETWORK transcript of a webcast, industry expert and author Cindi Howson details the current state of business intelligence (BI) adoption, the business impact and offers BI best practices from both organizational and technical perspectives. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Adaptive Packet Filtering by Gigamon

December 2013 - (Free Research)
This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Has Your QSA Thrown You Under a Bus? by Dell SecureWorks UK

August 2011 - (Free Research)
After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

XML Threat Model for REST, SOA and Web 2.0 by Intel

September 2011 - (Free Research)
This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL]. 
(WHITE PAPER) READ ABSTRACT |

Managing Your Data Assets by Pitney Bowes Business Insight

March 2009 - (Free Research)
Are you aware your people, your customer relationships and your corporate data provide far greater value and competitive advantage than traditional assets such as stock portfolio or desktop printers? This white paper explains how executives are turning their eyes toward what could be their most valuable asset of all: information! 
(WHITE PAPER) READ ABSTRACT |

SSL VPN for Secure Wireless LAN Access by F5 Networks

October 2007 - (Free Research)
For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell... 
(WHITE PAPER) READ ABSTRACT |

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497) by Klocwork

November 2013 - (Free Research)
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security. 
(WEBCAST) READ ABSTRACT |

Address performance and capacity issues by deploying a virtual infrastructure for SAP by VMware, Inc.

March 2009 - (Free Research)
This white paper describes technical and business considerations for deploying a virtual infrastructure for SAP landscapes with EMC and VMware technologies. The white paper addresses a variety of key considerations for deploying such an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Getting Your Wireless Together to Save Time, Improve Reception by Cisco Systems, Inc.

January 2011 - (Free Research)
When you “cluster” standalone wireless access points, you can improve reception and roaming, strengthen security, and save many hours of technical labor—all without the expense of a wireless controller. Continue reading to learn more about clustering improvement. 
(WHITE PAPER) READ ABSTRACT |

BusinessObjects Edge Series - Technical White Paper by Business Objects

June 2008 - (Free Research)
This paper provides a technical overview of BusinessObject Edge Series-the end-to-end business intelligence (BI) solution for growing organizations. Learn how to take advantage of extensive BI capabilities to empower your end users and decision-makers 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts