History TechnicalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: History Technical returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Enterprise Systems Management
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Storage Management
 •   Data Security
 •   Mobile Device Management
 •   Application Security
 •   Security Policies

Related Searches
 •   Active History
 •   Diagrams History Technical
 •   History Corporation
 •   History Flow
 •   History Technical Controls
 •   History Technical Reviews
 •   History Technical Value
 •   History Technical Video
 •   Latest History Technical
 •   Templates History
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

ROC Maestro for Open Systems by ROC Software

ROC Maestro for Open Systems, a key component of the ROC Enterprise Suite™, provides a very easy method for scheduling and managing workloads, processes, dependencies and events across complex, heterogeneous IT environments. 
(SOFTWARE PRODUCT)

H.264 High Profile: The Next Big Thing in Visual Communications by Polycom, Inc.

August 10, 2010 - (Free Research)
With the first and only H.264 High Profile implementation for real-time video, customers can immediately begin saving on bandwidth costs—up to 50%! Read a technical overview of the H.264 High Profile standard, including the history of H.264 and the recent advancements to and benefits of the technology. 
(WHITE PAPER) READ ABSTRACT |

Focus Solution Profile Microsoft Hyper-V System & Center Virtual Machine Manager by Microsoft Corporation India Pvt Ltd

March 28, 2008 - (Free Research)
This Focus profile describes Microsoft Hyper-V and VMM. It discusses Microsoft's server virtualization history, the origins of the Microsoft virtual server technologies and solutions, and the architecture of those solutions. 
(WHITE PAPER) READ ABSTRACT |

Focus Solution Profile: Microsoft Hyper-V and System Center Virtual Machine Manager by Microsoft Corporation India Pvt Ltd

March 28, 2008 - (Free Research)
This Focus profile describes Microsoft Hyper-V and VMM. It discusses Microsoft's server virtualization history, the origins of the Microsoft virtual server technologies and solutions, and the architecture of those solutions. 
(WHITE PAPER) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 01, 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

451 Group Impact Report - Attivio Adds to its Search Story and Gets Sentimental by Attivio, Inc.

March 24, 2010 - (Free Research)
This report delves into the history of Attivio, which was founded in 2007 by a cadre of former FAST executives, and provides an in-depth look at their product, Active Intelligence Engine (AIE), and its new release.  
(ANALYST REPORT) READ ABSTRACT |

Case History of Data Center Ground Fault Protection Optimization by Schneider Electric

January 28, 2011 - (Free Research)
Read this case history of data center ground fault protection optimization to learn how to build the ideal ground fault protection system with easy to follow instructions and diagrams. Read on for more information on electrical power distribution and control. 
(WHITE PAPER) READ ABSTRACT |

Elementool Bug Tracking Keeps Software Fixes on Course by Elementool, Inc.

January 2008 - (Free Research)
Can you list all the issues your software team is working on? Can you sort them by severity, priority, features affected, and other criteria? Can you show the histories of all related actions? This article details how Elementool Bug Tracking can help. 
(ARTICLE) READ ABSTRACT |

Case Study: Rochford District Council Secures 25 Years' of History with Acronis by Acronis NEMEA

May 2011 - (Free Research)
Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Tip Guide: Case History: How DCM helped one global company improve customer service everywhere by IBM

December 2011 - (Free Research)
This tip guide continues ebizQ.com's exploration of best practices in architecture and other aspects of case management. Inside, learn how one global institution built a dynamic case management (DCM) architecture to better serve its customers all over the world. 
(EGUIDE) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Four Keys to Successfully Managing a Multigenerational Workforce by SAP America, Inc.

January 2014 - (Free Research)
Today's workplace is unlike that in any other period of history in that it's not unusual to see up to four generations working together. Learn how your organization can bridge that age gap. 
(WHITE PAPER)

DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry by FireEye

May 2014 - (Free Research)
This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security. 
(WHITE PAPER) READ ABSTRACT |

CIOs: Transform Tomorrow's Business With Flash Storage by Dell, Inc.

April 2014 - (Free Research)
Smart CIOs today are using flash storage technology to transform their businesses – but why? Find out in this fascinating white paper, which provides a brief history of flash and details recent advances in software that make flash easier to manage and protect. 
(WHITE PAPER) READ ABSTRACT |

PCI Council issues mobile application rules for software developers by SearchSecurity.com

April 2013 - (Free Research)
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments. 
(EGUIDE) READ ABSTRACT |

To Pump up Data Volume, Connect Customer Channels by SearchCRM

December 2013 - (Free Research)
In this chapter of our e-book series Improving the Customer Experience Through Technology, CRM professionals explain what it takes to maintain a single view of a customer's history and contact information, how multichannel organizations keep all that data in order -- and how they keep it from falling into the wrong hands. 
(EGUIDE) READ ABSTRACT |

Optimize Virtualization Deployments with Dell EqualLogic Virtualized Storage and VMware vSphere 5 by Dell, Inc. and Intel®

October 2011 - (Free Research)
VMware offers market leading solutions that help businesses address their virtualization needs. Dell and VMware have a long history of collaboration. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

ESG Market Report: The EVAS Market - The Evolution of NAC by ForeScout Technologies, Inc.

July 2013 - (Free Research)
For many businesses, network access control is essential for their network security since the days of Ethernet and IP. This guide outlines the history of network access control and how you can implement more effective policies to secure your network. 
(WHITE PAPER) READ ABSTRACT |

Putting Content to Work - ECM UserNet 2011 by IBM

May 2011 - (Free Research)
ECM UserNet 2011 is the premier Enterprise Content Management event for generating better business decisions. Backed by 25 years of user group history, this event promises to be the biggest IBM ECM knowledge exchange yet and one you won't want to miss. 
(EVENT) READ ABSTRACT |

Tube Lines Takes Stock of Its Assets with IBM Maximo Asset Management by IBM

December 2010 - (Free Research)
Integrating asset maintenance activity and equipment history in IBM Maximo with financial and planning systems is helping Tube Lines meet its financial targets, plan for long-range capital investments and improve the rail infrastructure. Read this case study now to learn more. 
(CASE STUDY) READ ABSTRACT |

IPv6 Timeline: The Road to a New Protocol by Hewlett-Packard Company

January 2013 - (Free Research)
This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today. 
(EGUIDE) READ ABSTRACT |

Cybercrime and warfare: All that matters by ComputerWeekly.com

December 2013 - (Free Research)
Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters. 
(BOOK) READ ABSTRACT |

Personal Telepresence: The Next Generation of Video Communication by Vidyo, Inc.

November 2009 - (Free Research)
This whitepaper presents a brief history of the evolution of video conferencing and introduces a new solution for video conferencing that provides high quality visual communication with low latency, point and click simplicity on portable personal devices, and low cost access that requires only a general purpose IP network. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Best practices for adopting a private cloud computing strategy by Intel

August 2011 - (Free Research)
Cloud computing is, perhaps, the largest paradigm shift in organizational computing in recent history, offering an unprecedented level of flexibility and scalability.Take a look at this e-guide from the experts at SearchCloudComputing.com for a comprehensive overview of the private cloud infrastructure. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts