Impact AdWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Impact Ad returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Reporting and End-User Query Tools
 •   Data Security
 •   Security Policies
 •   Enterprise Systems Management
 •   Network Security
 •   Application Security
 •   Web Content Management and Publishing
 •   Storage Security
 •   Enterprise Dashboards

Related Searches
 •   Electronic Impact Ad
 •   Firm Impact
 •   Formats Impact
 •   Impact Activities
 •   Impact Ad Alaska
 •   Impact Ad Cycle
 •   Impact Ad Small
 •   Impact Ad Utah
 •   Impact Conversion
 •   Practices Impact
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Cognitive Match Drives Up Relevance and Conversion Results With Calpont InfiniDB by Calpont

March 11, 2011 - (Free Research)
The need to respond to click through and check out processes can require reaction times of a second or less. With exploding amounts of data, Cognitive Match was able to meet these demands with the Calpont InfiniDB columnar database. In this session you will learn about how to meet the demands of analytic data use. 
(WEBCAST) READ ABSTRACT |

Query Offloading for Improved Performance and Better Resource Utilization by Oracle Corporation

January 04, 2010 - (Free Research)
This white paper focuses on the use of a log-based, real-time change data capture (CDC) solution to enable real-time reporting using a low overhead solution that minimizes the impact on IT infrastructure. 
(WHITE PAPER) READ ABSTRACT |

NetAcuity IP Intelligence Technology by Digital Element

NetAcuity IP Intelligence provides the most comprehensive set of IP data available for targeted online advertising, content localization, geographic rights management, local search optimization, local ad serving, and enhanced analytics. 
(SOFTWARE PRODUCT)

Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies by Sun Microsystems, Inc.

April 16, 2009 - (Free Research)
Social technologies, commonly called Web 2.0, were originally used to describe consumer technologies that enable groups to organize and share information and media. But enterprises quickly caught on to the value of these easy-to-use tools for capturing and sharing ad hoc information that may otherwise not be documented. 
(WHITE PAPER) READ ABSTRACT |

Monitor and Protect Critical Web Applications with a Web Application Firewall by Imperva

February 19, 2014 - (Free Research)
While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection. 
(WEBCAST) READ ABSTRACT |

The Great Debate: One Integrated Business System VS. Siloed Applications by NetSuite

December 31, 2013 - (Free Research)
This resource explores the challenges of siloed software applications, and describes how an integrated business system can give you the power to conquer operational inefficiency and support business growth. 
(WHITE PAPER) READ ABSTRACT |

How Business Intelligence Should Work by Information Builders

August 01, 2012 - (Free Research)
Although business intelligence (BI) has been around for years, many organizations still struggle to effectively utilize the myriad of BI tools. Read on to learn how to successfully leverage BI tools with the 3 "levels" of BI and gain insight into common BI challenges and ways to avoid them. 
(WHITE PAPER) READ ABSTRACT |

The Human Energy Crisis: Technology's Role In Supporting Field Workforce, Hourly And High-Volume Hiring Needs by Taleo

December 2008 - (Free Research)
For all the advances in the technology over the last 20 years, the process of hiring hourly workers has remained fairly static. 
(WHITE PAPER) READ ABSTRACT |

CW+: Quocirca report: Effective public sector citizen communication by ComputerWeekly.com

August 2010 - (Free Research)
The UK public sector is in the midst of a period of transformation and improving citizen engagement will be key to the success of this change. 
(WHITE PAPER) READ ABSTRACT |

CW+ Quocirca report: Privileged user management by ComputerWeekly.com

October 2010 - (Free Research)
IT managers everywhere feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant themselves and/or their colleagues in order to do their jobs. 
(WHITE PAPER) READ ABSTRACT |

Daily Active Directory Administration: Simplified, Streamlined - and Successful by Dell Software

October 2009 - (Free Research)
In this Quest white paper, learn how automating AD improves your efficiency and reduces mistakes, helping you to break free from the headaches and the daily AD grind. Read this white paper today. 
(TECHNICAL ARTICLE) READ ABSTRACT |

12 Questions to Ask When Choosing an AD Bridge Solution by Dell Software

May 2012 - (Free Research)
Find out the best ways to evaluate AD bridge solutions to help ensure maximum security, compliance and productivity. 
(WHITE PAPER) READ ABSTRACT |

Facebook’s Best Kept Secret: Building Conversions and Revenue with Ads for Fans by WebTrends (E-mail this company)

April 2013 - (Free Research)
With over 800 million Facebook users to potentially see your message, you need to capitalize on the marketing opportunity that Facebook ads presents. Read this white paper to better understand targeted ads for fans, and for advice on creating a strategy for successfully driving traffic, tracking campaign activity, and increasing conversions. 
(WHITE PAPER) READ ABSTRACT |

Total cost of ownership: How much are you really spending to host your ad server? by OpenX

February 2011 - (Free Research)
OpenX has calculated all the 'hidden' costs of hosting your own ad server. Read this white paper and understand the full range of costs such as technical infrastructure, soft-costs such as staff time, and risks associated with self-hosting. 
(WHITE PAPER) READ ABSTRACT |

Study Pinpoints Areas of Growth for After-Market Maintenance/Repair/Overhaul Intiaitives by SAP AG

January 2009 - (Free Research)
This study talks about top three trends such as outsourcing MRO, aging aircraft and lean impacting the MRO segment. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You by Dell Software

August 2012 - (Free Research)
Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more. 
(WHITE PAPER) READ ABSTRACT |

Integrating Unix and Linux Systems with Active Directory by Dell Software

October 2009 - (Free Research)
Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap. 
(TECHNICAL ARTICLE) READ ABSTRACT |

7 Tips for Achieving Active Directory Compliance by Dell Software

April 2012 - (Free Research)
Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource. 
(WHITE PAPER) READ ABSTRACT |

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment by Dell Software

October 2009 - (Free Research)
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs. 
(WHITE PAPER) READ ABSTRACT |

Active Administrator™, Version 5.6.1 by ScriptLogic Corporation

December 2010 - (Free Research)
Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights. 
(TRIAL SOFTWARE) READ ABSTRACT |

Managing Risk in an Active Directory Integrated Virtualized Environment by Dell Software

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in an Active Directory Integrated Virtualized Environment by Imperva

February 2014 - (Free Research)
Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization. 
(WHITE PAPER) READ ABSTRACT |

Ensuring High Availability for Active Directory by Dell Software

March 2012 - (Free Research)
This Quest Software webcast explains the symptoms of a failing or failed domain or forest. It also discusses how you can best prepare for this failure, and compares manual forest recovery procedures with a powerful automated solution. 
(WEBCAST) READ ABSTRACT |

Thinking through Uncertainty: CFOs Scrutinize Non-Financial Risk by IBM Line of Business

June 2008 - (Free Research)
Risks can impact the top and bottom line and eventually every risk is expressed in the company's share price. 
(WHITE PAPER)

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts