Information ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Business Intelligence Solutions
 •   Operational BI
 •   Endpoint Security
 •   Enterprise Dashboards
 •   Virtualization
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Business Process Management (BPM)
 •   Information Lifecycle Management
 •   Workforce Management

Related Searches
 •   Decisions Information
 •   Download Information Applications
 •   Information Applications Control
 •   Information Applications Designer
 •   Information Applications Security
 •   Information Applications South Dakota
 •   Information Prices
 •   Information Procedure
 •   Information Survey
 •   Secure Information
Advertisement

ALL RESULTS
1 - 25 of 491 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Presentation Transcript: Engaging the New Breed of BI Users with Customizable Dashboards and Analytics by Actuate

March 30, 2011 - (Free Research)
BI users need a positive and unified experience with their information applications to help them make critical, data-driven business decisions. In this webcast transcript, Shaku Atre, founder and managing partner of the Atre Group, discusses strategies to encourage BI user engagement with customizable dashboards and analytics. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Actuate Rich Information Applications Platform Tour by Actuate

January 03, 2008 - (Free Research)
Discover how Actuate enables organizations to make interactions and service a better, more convenient experience for their customers. 
(DEMO) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Enhancing SQL Reporting Services with Double-Take by Double-Take Software

February 2008 - (Free Research)
Information stored on SQL Servers is important, so being able to protect this data at all times is extremely critical. Read this white paper to learn about solutions and strategies that can help protect and recover your critical SQL data no matter what. 
(WHITE PAPER) READ ABSTRACT |

Protecting and Enhancing SQL Server With Double-Take Availability by Double-Take Software

October 2009 - (Free Research)
Double-Take Software provides organizations with a solution that offers distinct recovery and protection advantages over manual Microsoft SQL built-in replication capabilities: Double-Take Availability saves more data real-time and restores that data in a much faster manner. 
(WHITE PAPER) READ ABSTRACT |

IBM Flexible IT Work Environment by IBM

February 2009 - (Free Research)
The global nature of today's workplace makes it imperative that employees have access to critical business information and applications. Providing this without sacrificing productivity or security is a major concern. This white paper details IBM's solution to these challenges - The IBM Flexible IT Work Environment. 
(WHITE PAPER) READ ABSTRACT |

Turn Data into Actionable Information by Red Hat

September 2013 - (Free Research)
All businesses need timely access to critical information, in order to make real-time, more informed decisions. To create an IT infrastructure that allows you easy access to data, you should consider your middleware options. 
(WHITE PAPER) READ ABSTRACT |

Optimizing Storage for Oracle PeopleSoft Applications by Oracle Corporation

June 2011 - (Free Research)
This white paper explains how by partitioning databases based on the lifecycles of the information and compressing historical data, IT departments can reduce their dependency on high-end storage, reduce their incremental storage costs, keep more data online for longer periods, and improve the performance of applications. 
(WHITE PAPER) READ ABSTRACT |

WebFOCUS Business Intelligence Application Development & Deployment by Information Builders Inc. (E-mail this company)

WebFOCUS development and deployment solutions provide easy-to-use Web-based applications for unlimited numbers of users, tailored to their skill level and preferences regardless of location, as well as flexible and intuitive development tools for building applications. 
(SOFTWARE PRODUCT)

Integrating Data in the Information System, an Open Source Approach by Talend

July 2009 - (Free Research)
This White Paper describes a number of real-life applications and databases interoperability scenarios and explains how an Open Source approach helps in solving interoperability challenges. Read this paper to learn more about successfully connecting new technology deployments with existing infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization: A Foundation for your Information Security Initiatives by Citrix

November 2011 - (Free Research)
IT managers are facing an increasingly complex and costly battle to control and protect enterprise applications and data. In this paper, CSO explores why desktop virtualization should be the foundation of your approach to information security. 
(WHITE PAPER) READ ABSTRACT |

IFS Enterprise Asset Management - EAM / CMMS by IFS

IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit. 
(SOFTWARE PRODUCT)

EMC information infrastructure helps university deploy its largest IT initiative while reducing the IT management burden by VMware, Inc.

November 2010 - (Free Research)
University or Arizona (UA) required better enterprise planning and new business intelligence (BI) tools to make better information available to the administration for data-driven decisions and offer new agility in meeting student needs. Read this case study to learn how EMC information infrastructure helped deploy its largest IT initiative. 
(CASE STUDY) READ ABSTRACT |

Transitioning to an Information Infrastructure by EMC Corporation

August 2008 - (Free Research)
EMC helps IT focus on the importance of information and effectively manage it in the face of exponential growth, a dynamic regulatory environment and constantly changing business requirements on increasing revenue and profit. 
(WHITE PAPER) READ ABSTRACT |

SearchDataManagement.com Tip-Guide: Avoiding data chaos Part 1: Creating an effective enterprise information management program by IBM

August 2011 - (Free Research)
This SearchDataManagement.com eBook provides practices advice on creating enterprise-wide data management strategies that can help unleash the full potential of corporate information. 
(EBOOK) READ ABSTRACT |

Information Governance: Orchestrate people, processes and technology for success by IBM

March 2011 - (Free Research)
Not every business has a material supply chain, but all organizations have an information supply chain. It runs through applications, databases and servers, and it ends in an array of ever-changing products that are critical to the health of the organization. Read this white paper to learn more today. 
(WHITE PAPER) READ ABSTRACT |

How to Beat the Cost of Compliance by Optimizing your Data Across its Lifecycle with IBM System z® by IBM

March 2011 - (Free Research)
In this webcast you’ll learn how to lower costs through optimizing your organization’s data, thereby improving the efficiency of your business processes and applications. With intelligent archiving and thorough backup-and-restore strategies, you can further reduce costs and risks to your business. 
(WEBCAST)

Delivering Trusted Information with IBM InfoSphere Foundation Tools by IBM

November 2010 - (Free Research)
This paper discusses challenges with trusted data in enterprises and recommends solutions through a data warehousing implementation scenario. The paper also discusses the capabilities of InfoSphere Foundation Tools and provides proof points through customer scenarios on the productivity, acceleration and risk reduction benefits. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Optimizing Storage for Oracle Siebel Applications by Oracle Corporation

February 2011 - (Free Research)
This white paper offers a cost-effective information management solution that optimizes storage infrastructures while also maintaining the performance and scalability that businesses require. 
(WHITE PAPER) READ ABSTRACT |

How Can Security Management Technologies Help Me with PCI Compliance? by CA Technologies.

August 2009 - (Free Research)
Read this paper to learn how CA Security Management provides comprehensive and proven solutions to help achieve PCI compliance by ensuring the privacy of all confidential cardholder information, and detecting and correcting areas of potential exposure. 
(WHITE PAPER) READ ABSTRACT |

Monitoring Trading Partner Agreements - Using Business Intelligence to Enhance BAM Activities by Information Builders

June 2008 - (Free Research)
This white paper will explain what to look for in a complete integration platform and how to use BI technology in conjunction with BAM tools to achieve zero information latency and self-correcting processes. 
(WHITE PAPER) READ ABSTRACT |

Navigating your Future within an SOA information manufacturing system by ComputerWeekly.com

August 2013 - (Free Research)
As the IT industry reaches maturity, IT departments should think of themselves not as data centres but as manufacturing centres for information. Terry Keene argues in this short e-book. 
(BOOK) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Strategy Group (ESG) Report: Today's Information Access Requirements Outpace Open Source Search Options by Attivio, Inc.

March 2010 - (Free Research)
This paper examines the new information access functionality and administrative requirements - including enterprise concerns for scalability, high availability, and fault tolerance - while measuring the ability of current open source alternatives to meet these demands. This report also explores the financial aspects of open source search adoption. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 491 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts