In The CasesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: In The Cases returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Virtualization
 •   Mobile Device Management
 •   Network Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   In Monitoring
 •   In The Cases Example
 •   In The Cases Guideline
 •   In The Controls
 •   In The Monitor
 •   Marketing In The Cases
 •   Projects In The Cases
 •   Seminars In The Cases
 •   Utility In
 •   Wireless In The
Advertisement

ALL RESULTS
1 - 25 of 449 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Healthcare sector to shed pounds with mobile health applications by ComputerWeekly.com

November 26, 2010 - (Free Research)
If the worldwide health system is not in crisis, it is under intense pressure and cost cutting trends in the light of the global downturn are only set to continue. For most hospitals and medical establishments budget allocations for IT were expected to be smaller in 2009 than in 2008. 
(WHITE PAPER) READ ABSTRACT |

Create Supported SQL Server 2008 Virtual Machines -- Rely on Server Virtualization to run SQL Server 2008 by Dell, Inc. and Intel®

September 01, 2008 - (Free Research)
The support team for Microsoft SQL Server has published guidelines for virtualizing this database engine. Read this paper to learn how to move forward with the process and create supported SQL Server virtual machines (VMs) that can be hosted on Dell PowerEdge servers. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions E-Zine: Turning ‘Dirty Data’ into Business Insights for your Customers by SearchCIO.com

June 05, 2013 - (Free Research)
In this issue of CIO Decisions e-zine, we examine how CIOs can lead the way in turning dirty data into business insights for their customers. 
(EZINE) READ ABSTRACT |

TrendLabs: Global Threat Trends 1H 2010 by Trend Micro, Inc.

October 22, 2010 - (Free Research)
In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world. 
(WHITE PAPER) READ ABSTRACT |

Research: Moving to the cloud cuts energy consumption by 91% by ComputerWeekly.com

November 30, 2010 - (Free Research)
Cloud computing uses 91 percent less energy than traditional on-premise applications. Nucleus evaluated Salesforce.com's customer base and found that cloud computing drives more than just significant financial savings: the effective sharing of resources also generates a substantial green benefit. 
(WHITE PAPER) READ ABSTRACT |

Eguide: Avoiding a patient data breach – and how to handle one if it does occur by CDW Healthcare

October 21, 2011 - (Free Research)
In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur. 
(EGUIDE) READ ABSTRACT |

Enterprise Mobile Device Security Best Practices by SearchSecurity.com

September 17, 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen. 
(EGUIDE) READ ABSTRACT |

Consumerization 101: Defining & Enforcing a Successful BYOD Policy by SearchSecurity.com

January 21, 2013 - (Free Research)
This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft. 
(EGUIDE) READ ABSTRACT |

Log Analytics: Simplifying Complex IT Environments by VMware, Inc.

October 17, 2013 - (Free Research)
Access this white paper for interviews with IT operations teams looking for better ways to effectively collect, analyze, and harness key information from logs in today's complex IT environment. 
(WHITE PAPER) READ ABSTRACT |

Disaster Recovery with the HP StorageWorks Enterprise File Services Clustered Gateway Linux Version and HP StorageWorks XP Continuous Access by Hewlett-Packard Company

December 2007 - (Free Research)
This white paper reviews proof points and best practices for file sharing disaster recovery. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? by Information Security Magazine

April 2009 - (Free Research)
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology. 
(EZINE)

Cisco 2800 Series by Cisco Systems, Inc.

The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speed up to multiple T1/E1/xDSL connections. 
(HARDWARE PRODUCT)

Case Management: Transformational Process Management in Government by IBM

March 2008 - (Free Research)
IBM FileNet Business Process Framework is a framework that gives governments the ability to rapidly build a case management system. 
(WHITE PAPER)

Business rules automation offers greater efficiency for case management by IBM

November 2011 - (Free Research)
Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, discover what business needs are driving the adoption of this combination, and how business rules technology is being put to use in case management and other areas. 
(EGUIDE) READ ABSTRACT |

eGuide: Strategies for building the best advanced case management architecture, Part I by IBM

November 2011 - (Free Research)
Designing a case management architecture is more of an art—really, a balancing act—than a science. In this e-guide, readers will learn to address key considerations involved in designing an effective case management architecture that extends across the enterprise to enable better collaboration and decision-making. 
(EGUIDE) READ ABSTRACT |

eGuide: Applying business rules for more effective advanced case management by IBM

November 2011 - (Free Research)
Read this expert e-guide to learn what business needs are driving the adoption of both business rules and case management technologies, how business rules technology is being put to use in case management and other areas, how to prepare for and implement rules in case management, and where business rules and case management trends are heading. 
(EGUIDE) READ ABSTRACT |

Making the business case for dynamic case management by IBM

November 2011 - (Free Research)
To reap long-term, widespread benefits from dynamic case management (DCM), it’s important to understand the business benefits and challenges. This e-book takes a look at these facets of DCM and provides expert advice on making the business case for it. 
(EBOOK)

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Finance for IT decision makers: Making business cases by ComputerWeekly.com

January 2013 - (Free Research)
This extract from Michael Blackstaff's book, Finance for IT decision makers, teaches you how to make effective business and financial cases for IT projects. 
(BOOK) READ ABSTRACT |

Global lessons in eHealth implementation by ComputerWeekly.com

April 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

E-Book: Unix-to-Linux Migration: A step-by-step approach for data center managers that covers everything from making the business case to getting the best training by Red Hat & IBM

December 2010 - (Free Research)
When migrating from  Unix to Linux, the most important case you will need to make is not a technical case but a business case. It’s all about the bottom line. How will the business benefit by moving over? What is the total cost of ownership and return on investment for the migration? Read on to learn more! 
(EBOOK)

Case Management: Combining Knowledge with Process by Singularity

March 2009 - (Free Research)
Case Management is critical to the work of many organizations but is often paper-driven and plagued by delay and poor visibility. In this white paper we define case management in more detail and show how a Business Process Management approach with support for knowledge intensive processes provides the most appropriate solution to Case Management. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Appleby Simplifies Global Disaster Recovery with Fluid Data Technology by Dell Compellent

May 2011 - (Free Research)
Because Appleby operates data centers in several geographic regions, replication for disaster recovery purposes is one of the company’s top concerns. The company’s decentralized storage infrastructure seemed to make multi-site replication prohibitively costly and complex. Check out this case study to learn about the solution Appleby found. 
(CASE STUDY) READ ABSTRACT |

The 7 Key Components for an Effective Case Management Methodology by ASG Software Solutions

May 2010 - (Free Research)
Case management is a care delivery framework with the potential to relieve three of the most significant pressures facing hospital leaders. The purpose of this paper is to illustrate a number of ways in which hospital case management can and does produce clinical, operational, and financial benefits for the organizations that employ them. 
(WHITE PAPER) READ ABSTRACT |

A 15-Minute Guide to Collaborative Case Management by EMC Corporation

April 2008 - (Free Research)
In about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 449 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts