Hotel AgencyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hotel Agency returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Wireless Technologies and Mobile Computing
 •   Unified Communications / Voice & Data Convergence
 •   Enterprise Information Integration/ Metadata Management
 •   Security Policies
 •   Network Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Vulnerability Assessment

Related Searches
 •   Capture Hotel Agency
 •   Fast Hotel Agency
 •   Hotel Agency Alaska
 •   Hotel Agency History
 •   Hotel Agency Sql
 •   Hotel Agency Vendors
 •   Hotel Organization
 •   Supply Hotel Agency
 •   Survey Hotel
 •   Warehouse Hotel Agency
Advertisement

ALL RESULTS
1 - 25 of 201 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Case Study: Over 1300 Carlson Rezidor Hotels World-wide Rely on Alfresco for Document Management by Alfresco Software

May 09, 2012 - (Free Research)
This paper outlines a case study of the Carlson Rezidor Hotel Group and how it used Alfresco for its document management needs. 
(WHITE PAPER) READ ABSTRACT |

The Malware Report: Hotel Business Center PCs Strike Again by ESET

August 20, 2009 - (Free Research)
Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely. 
(PODCAST) READ ABSTRACT |

Presentation Transcript: Migration from Microsoft Exchange 2007 to Google Apps by Google Apps

January 19, 2011 - (Free Research)
Read this presentation transcript to learn about Delta Hotels and Resorts unique cloud computing strategy encompassing Google Apps and other community-building tools 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Migration from Microsoft Exchange 2007 to Google Apps by Google Apps

November 05, 2010 - (Free Research)
Read this presentation transcript to learn about Delta Hotels and Resorts unique cloud computing strategy encompassing Google Apps and other community-building tools 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Migration from Microsoft Exchange 2007 to Google Apps by Google

March 15, 2010 - (Free Research)
Read this presentation transcript to learn about Delta Hotels and Resorts unique cloud computing strategy encompassing Google Apps and other community-building tools. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Malware Report: Radisson Hotels Exposed by Guest Data Breach by ESET

September 23, 2009 - (Free Research)
Matt Grant talks with Randy Abrams about a data breach at Radison Hotels. Unfortunately, an unknown number of their guests' credit card numbers were exposed to malicious hackers. In this podcast, Randy dishes out some advice on how to prevent this sort of data breach and what to do in the event that it’s already happened. 
(PODCAST) READ ABSTRACT |

Customer story: Hotels Combined by IBM

December 31, 2013 - (Free Research)
HotelsCombined.com chose Softlayer as their laaS provider beacause of SoftLayer's proven track record and mature business processes. Hotelscombined.com was also pleased with the personal care and the amount of control they maintained as well as the cuttng edge technologies like scalable cloud computing and solid-state drives that SoftLayer employs. 
(CASE STUDY) READ ABSTRACT |

Case Study: Eldorado Hotel Casino & Silver Legacy Resort Casino by NEC Corporation

August 05, 2009 - (Free Research)
Read this case study to learn how Eldorado Hotel Casino & Silver Legacy Resort Casino enhanced guest experience, discovered new revenue streams, streamlined employee workflow, and lowered total cost of ownership by implementing UNIVERGE communications framework and servers. 
(CASE STUDY) READ ABSTRACT |

Case Study: Near-Real-Time Data Warehouse Reporting Fuels Starwood's Success by Oracle Corporation

January 24, 2014 - (Free Research)
This case study reveals how the right engineered data warehouse system gave Starwood Hotels & Resorts Worldwide, Inc. the power to quickly and efficiently retrieve critical information, run operating reports, and more. 
(CASE STUDY) READ ABSTRACT |

Hilton Sets the Table for Increases in Catering Revenue with New Database Solution by Microsoft

January 01, 2005 - (Free Research)
Hilton Hotels needed to develop a forecasting system to improve its business analysis process by establishing more accurate pricing and financial planning. 
(CASE STUDY)

Controlling Wireless Costs with any Connection Reporting: Supporting Three Dimensions of Mobile Intelligence by Fiberlink Communications

March 05, 2010 - (Free Research)
In this white paper we will provide a general overview of Any Connection Reporting. We will then look at specific applications of this technology and see how organizations can use it to solve problems 3G, connectivity plans and so much more. 
(WHITE PAPER) READ ABSTRACT |

Home Suite Home by Avaya

September 01, 2011 - (Free Research)
This videocast exemplifies a unified communications system that enables companies to experience real-time business communications solutions that allow them to collaborate in any mode they want—voice, video, email, or IM—on virtually any device they want. 
(VIDEOCAST) READ ABSTRACT |

Infor CRM Epiphany for Hospitality by Infor CRM

July 01, 2009 - (Free Research)
Infor CRM Epiphany for Hospitality provides the integrated marketing, customer service, and analytics capabilities hotels, casinos, and other hospitality companies need to deliver exceptional service at every touch point. 
(BROCHURE) READ ABSTRACT |

Choose a Branding Agency: 5 Social Media Questions You Need to Ask by Oracle Corporation

November 13, 2013 - (Free Research)
The following white paper details 5 key questions to ask when choosing a branding agency. Learn how to read the answers that they give you in order to make an accurate assessment on the agency at hand. 
(WHITE PAPER) READ ABSTRACT |

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye

March 10, 2014 - (Free Research)
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools. 
(WHITE PAPER) READ ABSTRACT |

ExaGrid Helps U.S. Federal Government Agencies Reduce Backup Windows, Improve Data Protection by ExaGrid Systems, Inc.

February 07, 2012 - (Free Research)
Check out this study to learn how ExaGrid solutions enabled several U.S. government agencies to reduce backup windows and improve overall data protection practices. This resource provides an introduction to the specific solutions used as well as their benefits, and explores emerging deduplication and scalability concerns as well. 
(CASE STUDY) READ ABSTRACT |

Case Study: Mandarin Oriental by SDL Web Content Management Solutions Division

April 11, 2011 - (Free Research)
This Video from SDL takes a look at the ways in which up-scale hotel conglomerate, Mandarin Oriental, has implemented SDL web content management solutions to help expand their business around the world. Watch this video today to learn more. 
(VIDEO) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

Maryland Government Agency Case Study: Growing Beyond the Limits by Dell, Inc.

October 2008 - (Free Research)
In this case study, you'll learn how a Maryland government agency responds to user needs faster thanks to a server and storage virtualization solution from Dell. 
(CASE STUDY) READ ABSTRACT |

Cloud Computing—the Path to Increased Efficiencies and Cost Savings for Government Agencies by NetApp

August 2013 - (Free Research)
Discover how NetApp is addressing the challenges of government agencies moving to private, public and hybrid cloud models with a shared storage infrastructure. Read this informative paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Modern Infrastructure – April 2014 by SearchDataCenter.com

April 2014 - (Free Research)
Some enterprises are charging ahead with a cloud-first approach to their workloads—not just test and dev, but production workloads as well. This most recent, April-edition of Modern Infrastructure details several organizations for whom this cloud-first approach has proved very effective. 
(EZINE) READ ABSTRACT |

8 Ways to Better Monitor Network Security Threats in the Age of BYOD by Hewlett-Packard Limited

January 2014 - (Free Research)
This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. 
(WHITE PAPER) READ ABSTRACT |

Hilton Reservations Worldwide Achieves Efficient Staffing by Aspect

September 2013 - (Free Research)
Check out this brief case study to learn how Hilton Reservations Worldwide implemented a workforce management technology that enabled the contact center to plan, manage, and optimize staffing resources, resulting in happier agents and satisfied customers. 
(CASE STUDY) READ ABSTRACT |

Secure Remote Access by RSA, The Security Division of EMC

September 2007 - (Free Research)
This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ... 
(BROCHURE) READ ABSTRACT |

8 Ways to Better Monitor Network Security Threats in the Age of BYOD by Hewlett-Packard Company

January 2014 - (Free Research)
This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 201 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts