Guidelines NationalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Guidelines National returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Virtualization
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Network Security
 •   Disk-based Backup & Storage/ RAID
 •   Application Security

Related Searches
 •   Audit Guidelines
 •   Content Guidelines National
 •   Cost Guidelines National
 •   Firm Guidelines
 •   Guidelines Corporation
 •   Guidelines Latest
 •   Guidelines National Case Studies
 •   Guidelines National Internet
 •   Guidelines National Maintenance
 •   Making Guidelines National
Advertisement

ALL RESULTS
1 - 25 of 344 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Setting standards in IT Industries by DLT Solutions

March 16, 2012 - (Free Research)
Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces. 
(EGUIDE) READ ABSTRACT |

Penn National Insurance: Real-Time Documents Provide Faster Time to Market with a Personal Touch by Exstream Software

April 2008 - (Free Research)
Penn National Insurance wanted to deploy a single, comprehensive infrastructure for its batch and real-time document applications. Exstream Software's Dialogue enterprise personalization solution met this goal, improving time to market ... 
(CASE STUDY) READ ABSTRACT |

National Fibre Strategies by ComputerWeekly.com

June 2013 - (Free Research)
Arthur D Little assess five strategic models for deploying national fibre optic telecommunications networks that have been implemented by countries around the globe. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Designing Next Generation Test Systems by National Instruments

January 2006 - (Free Research)
This guide addresses challenges that pressure engineering teams to reduce the cost and time of testing, provides insight into how test managers and engineers are overcoming these challenges, and offers guidelines on building modular, software-defined... 
(BOOK) READ ABSTRACT |

DNSSEC - Secure DNS For Government by BlueCat

August 2010 - (Free Research)
This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines. 
(WHITE PAPER) READ ABSTRACT |

Whitepaper: Dell Storage Selection Guidelines for Oracle Databases by Dell, Inc.

May 2011 - (Free Research)
Dell strives to simplify IT in order to reduce complexity in data centers and has a broad storage product portfolio to meet database customers' needs. These storage selection guidelines will help administrators choose an appropriate storage technology based on their requirements. 
(WHITE PAPER) READ ABSTRACT |

Global lessons in eHealth implementation by ComputerWeekly.com

April 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

Blackberry Solution Used for Roadside Surveys on Child Seat Safety by BlackBerry

February 2009 - (Free Research)
When researchers from the University of Windsor needed a mobile strategy for conducting a National Child Seat Safety Survey across Canada, they turned to a Blackberry to help gather the data and accurately download the it automatically to an analytical database. 
(CASE STUDY) READ ABSTRACT |

VMworld Europe Case Study: The National Trust by ComputerWeekly.com

November 2012 - (Free Research)
A virtualisation project has allowed the National Trust to reduce its carbon emissions and to drastically cut its IT energy bill. 
(CASE STUDY) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Welcome to Iron Mountain’s National Data Center by Iron Mountain

January 2014 - (Free Research)
This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy. 
(WEBCAST) READ ABSTRACT |

First National Technology Solutions - Service provider expands target market with enhanced cloud infrastructure by EMC Corporation

November 2011 - (Free Research)
In this case study, First National Technology Solutions' outdated infrastructure was modernized for company growth. 
(WHITE PAPER) READ ABSTRACT |

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit by Attachmate Corporation

March 2012 - (Free Research)
This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Five Procurement Guidelines You Can't Afford to Ignore by StarCite

August 2008 - (Free Research)
Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination. 
(WHITE PAPER) READ ABSTRACT |

Best Practice Guidelines for SAP Solutions on VMware® Infrastructure by VMware, Inc.

October 2008 - (Free Research)
This paper provides best practice guidelines for deploying SAP software solutions on VMware Infrastructure 3. 
(WHITE PAPER) READ ABSTRACT |

Best Practice Guidelines for SAP Solutions on VMware® Infrastructure by VMware and Intel

October 2008 - (Free Research)
This paper provides best practice guidelines for deploying SAP software solutions on VMware Infrastructure 3. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Case Study: TORO National Support Network by NEC Corporation

August 2009 - (Free Research)
Read this case study to learn how NEC solutions helped TORO improve contact-center service quality scores, improve staff productivity, improve business operations and enhance system flexibility. 
(CASE STUDY) READ ABSTRACT |

Five Guidelines to Make Backup a Functional, Manageable and Profitable Service Offering by Idera

March 2014 - (Free Research)
This resource gives you the five guidelines to make backup work better. It also highlights a solution that offers backup as a service and gives users the functionality they need to protect the bottom line and even increase it in the process. 
(WHITE PAPER) READ ABSTRACT |

The Role of Data Integration and Quality Management in NIEM by Information Builders

May 2013 - (Free Research)
Check out this paper today to investigate how the National Information Exchange Model (NIEM) has grown. Learn about the challenges it was designed to overcome and of the important role that enterprise integration and data quality management technologies play in the execution of NIEM initiatives. 
(WHITE PAPER) READ ABSTRACT |

Five data protection guidelines for business continuity - Presentation Transcript by Dell, Inc.

September 2012 - (Free Research)
Jon William Toigo covers data protection guidelines, including mirroring, tape backup and WAN-based replication technologies. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-Guide: Implementing Storage Virt: Guidelines & Factors to Consider by Hewlett-Packard Company

August 2011 - (Free Research)
This SearchVirtualStorage.com E-Guide can help clarify by outlining 4 guidelines for implementing storage virtualization and by divulging factors to consider before deploying storage virt into your IT infrastructure. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 344 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts