IT ReviewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: IT Review returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Enterprise Systems Management
 •   Network Security
 •   Data Security
 •   Virtualization
 •   SSL VPN
 •   Security Policies
 •   Email Archiving
 •   Business Intelligence Solutions
 •   Database Planning and Implementation

Related Searches
 •   Distributions IT Review
 •   IT Electronic
 •   IT Review Comparison
 •   IT Review Cost
 •   IT Review Evaluation
 •   IT Review Introduction
 •   IT Review Operate
 •   Problem IT
 •   Reporting IT Review
 •   Scripts IT
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Shedding Light on Dark Data-David Hill of Mesabi Group for Pund-IT Review by CommVault Systems, Inc.

November 06, 2013 - (Free Research)
This informative article sheds light on "dark data" and illustrates a way to harness metadata and address the growing problem of dealing with unwanted, useless data. 
(WHITE PAPER) READ ABSTRACT |

Key Insights for Managing an Effective Business Intelligence Strategy by Information Builders

May 28, 2013 - (Free Research)
Including business users in each part of a business intelligence initiative is essential to the success of a BI project. View this expert E-guide to learn more about key BI management best practices. It discusses common myths and prejudices that hinder the success of BI efforts in companies. 
(EGUIDE) READ ABSTRACT |

Jericho Forum: Data Protection by ComputerWeekly.com

January 18, 2013 - (Free Research)
Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Breaking the Disk Barrier with In-Memory DBMS Technology: Sybase Adds a Big Performance Boost for ASE 15.5 by Sybase, an SAP company

June 15, 2010 - (Free Research)
This paper discusses the growing need for high-performance database management, without disrupting applications and the operations of the datacenter. It discusses issues of performance versus durability and how an in-memory database strategy can be used to provide better high-speed, high-volume data management without sacrificing data integrity. 
(ANALYST REPORT) READ ABSTRACT |

The Evolving Threat Landscape by Juniper Networks, Inc.

September 02, 2011 - (Free Research)
This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective. 
(WHITE PAPER) READ ABSTRACT |

Expert ways to maximize security in Exchange by SearchDataCenter.com

May 02, 2012 - (Free Research)
This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities. 
(EGUIDE) READ ABSTRACT |

A Manager’s Guide to Perfecting Performance Management: How to Transform Your Employee Review Process by Ultimate Software

April 30, 2013 - (Free Research)
Experts agree that traditional, once-a-year employee reviews are holding back business performance. This resource counts down six simple steps that will help you perfect employee performance management at your organization. 
(WHITE PAPER) READ ABSTRACT |

Entitlement Reviews: A Practitioner's Guide by Varonis

July 30, 2009 - (Free Research)
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data. 
(WHITE PAPER) READ ABSTRACT |

The Review Center Playbook: A how-to guide to using the Review Center within Contour by Jama Software

September 21, 2010 - (Free Research)
Review Center is a module within Contour that provides a fast and agile way to collaborate on requirements. It enables teams to discuss, review and approve requirements with stakeholders and customers in real-time. It can also cut requirements approval cycles from weeks to days. This playbook provides a step-by-step guide on how to use it. 
(WHITE PAPER) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

September 14, 2010 - (Free Research)
This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time. 
(WHITE PAPER) READ ABSTRACT |

Pocket E-Guide Review: Dell Latitude XT2 Review by Dell, Inc. and Intel®

December 16, 2009 - (Free Research)
The Dell Latitude XT2 is a business-grade convertible notebook, offering multi-touch finger and digitized pen controls. Read this full NotebookReview.com review for a features and performance analysis of the Dell Latitude XT2. 
(EGUIDE) READ ABSTRACT |

11 Best Practices for Peer Code Review by SmartBear Software

August 28, 2012 - (Free Research)
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Virtualizing IBM Lotus Domino 8.5.1 on VMware vSphere 4 - Testing Performance, Functionality and Benefits by VMware, Inc.

June 06, 2011 - (Free Research)
It is important to remain competitive in the IT industry. This presentation transcript highlights why now is the best time to evaluate virtualization for Lotus Domino for VMware. Review the latest testing done to validate performance and functionality for running IBM Lotus Domino™ 8.5.1 running on virtual machines using VMware vSphere™ 4.0. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Can I Really Roll-out a Code Review Process That Doesn’t Suck? by SmartBear Software

August 27, 2012 - (Free Research)
This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more. 
(WEBCAST) READ ABSTRACT |

Best Kept Secrets of Peer Code Review: Modern Approach Practical Advice by SmartBear Software

August 22, 2012 - (Free Research)
This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier. 
(EBOOK) READ ABSTRACT |

Meeting Compliance Objectives in SharePoint® by AvePoint, Inc.

February 01, 2009 - (Free Research)
This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs. 
(WHITE PAPER) READ ABSTRACT |

Software Agitation: Your Own Personal Code Reviewer by Agitar Software

March 10, 2011 - (Free Research)
Agitator helps you debug your code while you write it - a benefit that no other existing Java Testing tool can claim. Agitator can also be extremely beneficial when run on legacy code - even code that has been reviewed by other developers and deemed to be “sufficient” and “properly written.” Learn how Agitar can be your own personal code reviewer. 
(WHITE PAPER) READ ABSTRACT |

Pocket eGuide Review: Dell Latitude E6400 XFR by Dell, Inc. and Intel®

December 16, 2009 - (Free Research)
In this review we put the Dell Latitude E6400 XFR through a battery of tests, to see how well it stands up against other fully-rugged notebooks. 
(EGUIDE) READ ABSTRACT |

How to Thwart Privilege Creep with Access Reviews by SearchSecurity.com

April 10, 2013 - (Free Research)
In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success. 
(EGUIDE) READ ABSTRACT |

Exchange Server: E-mail Archiving and Security by SearchSecurity.com

March 12, 2013 - (Free Research)
Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for. 
(WHITE PAPER) READ ABSTRACT |

ESG Lab Reviews Dell Integrated Data Protection: DR4100 with NetVault by Dell, Inc.

September 30, 2013 - (Free Research)
IT teams are faced with swelling data volumes and expanding virtualization, both of which complicate your backup and recovery strategies. The DR4100 appliance, combined with NetVault, protects both physical and virtual servers, increases backup speed and provides recovery assurance for data and applications. Learn more in this ESG Lab review. 
(PRODUCT REVIEW) READ ABSTRACT |

Sentinel Log Manager Review by Novell, Inc.

July 28, 2010 - (Free Research)
This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities. 
(WHITE PAPER) READ ABSTRACT |

CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam by Global Knowledge

October 2008 - (Free Research)
This paper helps students understand the types of information required to pass the new 640-802 CCNA composite exam by providing a convenient review of the exam's critical concepts. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts