Identify TechnologiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Identify Technologies returned the following results.
RSS What is RSS?
Related Categories

 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Virtualization
 •   Enterprise Systems Management
 •   Data Security
 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Technology Planning and Analysis
 •   Data Center Management
 •   Availability, Performance and Problem Management
 •   Disaster Recovery

Related Searches
 •   Audit Identify
 •   Concerns Identify Technologies
 •   Forms Identify Technologies
 •   Identify Technologies Audits
 •   Identify Technologies Company
 •   Identify Technologies New Hampshire
 •   Industry Identify
 •   Review Identify
 •   Solutions Identify
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Monitoring for SAP: High-Risk Financial Transactions in Real Time by Security Weaver

February 2009 - (Free Research)
For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP. 
(WHITE PAPER) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation by Coverity

March 2008 - (Free Research)
This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Deriving value from Big Data for CRM by ComputerWeekly.com

May 2013 - (Free Research)
Kimberly Collins, research vice-president of Gartner highlights the critical steps organisations should to take to integrate big data into Customer Relationship Management (CRM). 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Business Case for Enterprise Disaster Recovery Planning: Calculating the Cost of Downtime by Iron Mountain

September 2008 - (Free Research)
Given the enormous long-term costs and implications of a systems interruption, companies need to carefully define and implement plans to mitigate losses. This paper arms you with how to build a strong business case for a recovery plan. 
(WHITE PAPER) READ ABSTRACT |

Cloud computing: A reality check and guide to risk mitigation by BlueCoat

December 2009 - (Free Research)
This white paper provides a reality check on cloud computing from the perspective of an IT organisation. 
(WHITE PAPER) READ ABSTRACT |

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle by iTKO LISA

October 2010 - (Free Research)
This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Presentation Download: Storage for Virtual Environments Presentation Download by Quantum Corporation

August 2011 - (Free Research)
Jon William Toigo – noted storage expert and industry watchdog – can help you sort it out. In this presentation download, Toigo identifies the big picture trends that are causing storage operations to burst at the seams – and he provides tactical advice on technologies and tactics that will help contain costs and optimize operations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Web Lead Evaluation and Scoring Study by KnowledgeStorm, Inc (E-mail this company)

April 2006 - (Free Research)
KnowledgeStorm and The Artemis Group conducted an in-depth analysis of 15,452 Web leads generated by KnowledgeStorm. The objective of this study was to identify characteristics of Web leads that maximize sales opportunities and to debunk myths around what makes a good sales lead. 
(WHITE PAPER) READ ABSTRACT |

Big Agendas for Big Data Analytics Projects by HP & Intel®

January 2013 - (Free Research)
Access this exclusive resource offering advice on what to consider when it comes to your big data analytics project and how to get started. Discover what questions to consider and identify the technology that will best support you. 
(EGUIDE) READ ABSTRACT |

A Practical Guide to Identifying Slow Code During Development by Micro Focus, Ltd

April 2011 - (Free Research)
Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How to Identify Which Applications are Right for Public Cloud Computing by SearchDataCenter.com

March 2011 - (Free Research)
In this e-guide from SearchCloudComputing.com, gain expert insight into how public cloud computing benefits businesses of all sizes. Discover how to identify which applications are good candidates for cloud computing and which are not. And find out about alternatives to adopting a full public or private cloud computing strategy. 
(EGUIDE) READ ABSTRACT |

An In-Depth Look at Deduplication Technologies by Datalink

August 2008 - (Free Research)
Deduplication can be a confusing topic. Several considerations come into play when organizations assess whether deduplication provides a good fit for their environment. Read this paper to determine if deduplication is right for you. 
(WHITE PAPER) READ ABSTRACT |

Key Insights for Building “Consumerised” End-User Services by ComputerWeekly.com

October 2011 - (Free Research)
This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace. 
(IT BRIEFING) READ ABSTRACT |

Smart  Organisations by ComputerWeekly.com

October 2011 - (Free Research)
Download this report to learn how your organisation can use smart technology to drive innovation and enhance your competitive position, without breaking the bank. 
(WHITE PAPER) READ ABSTRACT |

Business Service Management by ASG Software Solutions

Business Service Management (BSM) solutions can effectively be defined as the fusion of IT and business needs, Successfully employed, they will empower IT with the necessary tools to increase overall business value. 
(SOFTWARE PRODUCT)

Data Protection Report 2008: Best Practices in Data Backup & Recovery by Overland Storage

February 2008 - (Free Research)
This white paper outlines the survey results of over 135 storage professionals to understand the top goals, challenges and trends related to data protection in 2008. Read this white paper to learn what's in store for this year. 
(WHITE PAPER) READ ABSTRACT |

Managing Costs More Effectively by SAP America, Inc.

December 2011 - (Free Research)
This Ventana Research paper identifies the IT components that can be used to identify ways to improve cost management for success in today's recovering yet volatile market. 
(WHITE PAPER) READ ABSTRACT |

Hitting the Moving Target of Operational Excellence: Identifying and Obtaining the Information Needed for Continued Success by SAP America, Inc.

May 2007 - (Free Research)
This white paper presents IDC’s framework for implementing operational excellence (opex) and helps the reader move toward an effective op ex implementation while avoiding potential pitfalls. 
(WHITE PAPER) READ ABSTRACT |

Identify and Leverage Your Existing Service Life Cycles by IBM

December 2010 - (Free Research)
This executive brief will illustrate the progression of service management since the 1990s, illuminate the hidden service life cycles and discuss how, once they are visible, we can start to make them work — to improve services and better align IT with business objectives. 
(WHITE PAPER) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

Get More! From Your Data Center: Rely on Liebert for System Availability and Integrity by Emerson Network Power

July 2009 - (Free Research)
Emerson Network Power and its Liebert power and cooling technologies can help you protect your applications downtime despite power outages or security threats through this step-by-step guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

LogRhythm and NERC CIP Compliance by LogRhythm, Inc.

July 2008 - (Free Research)
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements. 
(WHITE PAPER) READ ABSTRACT |

HP Solution Demo Portal by HP and Intel

October 2013 - (Free Research)
Watch these informative demos to find the answers to questions you may have about HP's latest OneView solution, and better prepare your organization for implementation. 
(VIDEO) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts