Guides Profile SharedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Guides Profile Shared returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Data Center Management
 •   Network Security
 •   Storage Security
 •   Endpoint Security
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Documents Guides Profile
 •   Guides Demonstrations
 •   Guides Profile Calendar
 •   Guides Profile Shared Articles
 •   Guides Profile Shared Florida
 •   Guides Profile Shared Policy
 •   Guides Profile Softwares
 •   Net Based Guides Profile Shared
 •   Service Guides
 •   Standard Guides
Advertisement

ALL RESULTS
1 - 25 of 453 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

E-Guide: Nasuni Filer Adds SLA, Hardware Option for NAS Cloud Gateway by Nasuni Corporation

September 02, 2011 - (Free Research)
This SearchCloudStorage.com E-Guide profiles startup cloud vendor, Nasuni Corp., and offers insight into what they are doing to ease customer concerns about cloud storage – and guarantee uptime in cloud environments. Read on to find out about more Nasuni’s new product offerings and service-level agreements! 
(EGUIDE) READ ABSTRACT |

Computer Weekly 2 August 2011: We examine the calls for radical reform in the relationship between Whitehall and its IT suppliers by ComputerWeekly.com

August 01, 2011 - (Free Research)
With the release of a scathing report on government IT, we examine calls for radical reform in the relationship between Whitehall and its IT suppliers. Also this week, the first part of our Buyer’s Guide to Big Data, and a case study on how Carphone Warehouse improved customer satisfaction by 38% using business process management (BPM) software. 
(EZINE) READ ABSTRACT |

Computer Weekly – 4 March 2014: How IT brings aid to refugees by ComputerWeekly.com

March 04, 2014 - (Free Research)
In this week's Computer Weekly, we talk to the CIO at the UN High Commission for Refugees about the vital role that technology plays in supporting its aid programmes. We hear from IT leaders who are ditching BlackBerry – but moving to Windows Phone instead. And we look at how to choose the best hybrid cloud provider. Read the issue now. 
(EZINE) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 01, 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

IDC Vendor Profile: CommVault Gains Market Share and Continues to Outperform Storage Software Markets by CommVault Systems, Inc.

February 23, 2010 - (Free Research)
Over the past five years, the storage software industry has faced consolidation. Large incumbents have acquired innovative technology from start-ups and emerging companies. CommVault Systems (CVLT) is a data and information management software provider challenging traditional incumbents. 
(ANALYST REPORT)

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Market Share Analysis: Data Center Hardware Integrated Systems , 1Q11 - 2Q12 by VCE (E-mail this company)

November 30, 2012 - (Free Research)
The market for integrated systems is a key growth area for data center hardware infrastructure. This report sizes the market and profiles early leaders in this important and emerging area. 
(WHITE PAPER) READ ABSTRACT |

Evaluating The Performance Of Shared WAN Links For Data Center Backup And Disaster Recovery by Silver Peak

September 08, 2010 - (Free Research)
Backup and disaster recovery are perennially among the top three IT challenges, and they’re rated by 62% of enterprises as a high or critical priority. What exactly are these enterprises doing? Building multiple data centers. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Data Systems Object Storage Solutions by Hitachi Data Systems

April 30, 2013 - (Free Research)
This solution profile explores the innovation of object storage designed to address the challenges of fast growing file data, and integrate many key technologies in a single storage platform. Find out how this approach provides a path to short-term return on investment and significant long-term efficiency improvements. 
(WHITE PAPER) READ ABSTRACT |

10 tips to integrate mobile and social marketing by IBM

November 30, 2013 - (Free Research)
In this white paper, get 10 tips to help break through the silos and integrate social and mobile marketing with traditional channels. 
(WHITE PAPER) READ ABSTRACT |

AppSense User Virtualisation Platform by AppSense

June 08, 2011 - (Free Research)
Immense changes are taking place throughout the IT infrastructure, especially in the area traditionally referred to as the "desktop." With mobile devices, laptops, netbooks and fixed desktops allowing simultaneous and varied computing experiences, user virtualisation creates one centralised control that manages users across multiple devices. 
(PRODUCT REVIEW) READ ABSTRACT |

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How to Determine if VDI is Right for your Company and Ways to Overcome Common Annoyances by SearchDataCenter.com

May 2011 - (Free Research)
Even though the thought of virtual desktops has caught everyone's attention, the actual number of installations remains small. This expert e-guide from SearchVirtualDesktop.com explains how organizations can determine whether this technology is right for them by calculating the return on investment from VDI. 
(EGUIDE) READ ABSTRACT |

Cloud App Success Means End-User Identity Management by VMware, Inc.

July 2013 - (Free Research)
This e-guide takes a deeper look at whether roaming profiles can increase the use and mobility of a cloud app among providers and discusses the impacts of end-user identity management on the success of your cloud apps. 
(EGUIDE) READ ABSTRACT |

SearchSecurity.com E-Guide: Defining an acceptable level of risk for the organization by IBM

August 2011 - (Free Research)
Defining an acceptable level of risk for the organization is no easy task. Learn how threat profiles and business drivers can be used to determine an appropriate level of risk for the organization in this expert tip. In addition, find out how to perform an accurate enterprise security risk analysis. 
(EGUIDE) READ ABSTRACT |

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk by IBM Line of Business

June 2008 - (Free Research)
Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price. 
(WHITE PAPER)

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Data Loss Prevention Requirements Roadmap by CA Technologies.

April 2009 - (Free Research)
The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data. 
(WHITE PAPER) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly 18 October 2011: Download the latest issue of the UK's leading technology publication, where we analyse the latest news in IT and what it means for IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we talk to the CIO of the London 2012 Olympics about progress on the UK's highest-profile IT implementation. We ask customers about Oracle’s long-awaited Fusion Applications; review the latest version of Windows Server; and find out how the Blackberry outage affected corporate customers. Download the new issue now. 
(EZINE) READ ABSTRACT |

Top Ten Ways To Get More From Your SharePoint Deployment by Radiant Logic, Inc.

February 2011 - (Free Research)
Check out this white paper to see how identity and context virtualization delivers integrated identity, a richer security profile, and contextual search across all your data. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions eZine: April 2014 – Prescriptive Analytics – Conquer the Next Business Frontier by SearchCIO.com

April 2014 - (Free Research)
Prescriptive analysis could do some of big data thinking for us -- if only we'd let it. This CIO Decisions e-zine explores the growing analytics field and the strategies at work. 
(EZINE) READ ABSTRACT |

Big Data in Motion by SearchCIO.com

March 2014 - (Free Research)
When large information sets are in transit, bottlenecks inevitably occur. CIOs must overcome these obstacles in order to extract real value from their data. In this SearchCIO handbook, we confront the obstacles posed by big data in motion. 
(EBOOK) READ ABSTRACT |

Improving Customer Satisfaction through More Effective ICT Strategies by Alcatel-Lucent

January 2008 - (Free Research)
Companies that want to maintain a competitive edge, both now and in the future, are realizing that reactive customer interaction services must be replaced by a more proactive approach that recognizes the growing user-centricity of consumer ... 
(ARTICLE) READ ABSTRACT |

E-Guide: Exploring Configuration Changes to Reduce Attacks by Tripwire, Inc.

September 2011 - (Free Research)
Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 453 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts