Intellectual RequestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Intellectual Request returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Business Intelligence Solutions
 •   Storage Security
 •   Endpoint Security
 •   Business Process Management (BPM)
 •   Network Management
 •   Backup Systems and Services

Related Searches
 •   Full Intellectual Request
 •   Intellectual Request Best
 •   Intellectual Request Device
 •   Intellectual Request Office
 •   Intellectual Request Requirement
 •   Intellectual Request Solution Software
 •   Intellectual Request Wireless
 •   Intellectual Search
 •   Linux-Based Intellectual
 •   Proposals Intellectual Request
Advertisement

ALL RESULTS
1 - 25 of 430 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

IT Cost Savings with Information Governance - Gartner Research by IBM

April 17, 2012 - (Free Research)
In this Gartner analysis, find out how Cisco transitioned from an underperforming records management system to an information governance strategy. Discover the benefits they experienced from this switch, and best practices to help you make your own move to information governance. 
(WHITE PAPER) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 24, 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration by IntraLinks, Inc

April 17, 2014 - (Free Research)
This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data. 
(WHITE PAPER) READ ABSTRACT |

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

Dell ProSupport Certified Data Destruction by Dell, Inc.

January 09, 2009 - (Free Research)
The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands. 
(DATA SHEET) READ ABSTRACT |

Seven Best Practices for Managing Software Intellectual Property in an Open Source World by Black Duck Software

October 07, 2009 - (Free Research)
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software. This report describes a set of seven best practices whose objective is to encourage development based on component re-use and software assembly. 
(WHITE PAPER) READ ABSTRACT |

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

Best Practices for Managing Software Intellectual Property by Black Duck Software

July 2008 - (Free Research)
This paper describes the approaches for managing intellectual property during component-based software development, detailing the seven best practices an organization should adhere by to facilitate the successful management of software IP. 
(WHITE PAPER) READ ABSTRACT |

Riverbed Stingray Traffic Manager VA Performance on vSphere 4 by Riverbed Technology, Inc.

January 2012 - (Free Research)
Cloud infrastructure platforms like VMware vSphere 4.0 can benefit from load balancers that connect users to the most suitable datacenter. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance compared to a Linux install. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Intellectual Property: It Starts with a Single Click by TITUS

August 2013 - (Free Research)
Download Aberdeen's latest report to discover how you can protect your intellectual property with a single click. 
(WHITE PAPER) READ ABSTRACT |

Constellation Energy Group by EMC Corporation

June 2008 - (Free Research)
In its quest to fully leverage the new technologies, Constellation energy realized it needed to integrate them to one another, as well as integrate them with other business processes and applications. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Service Request Manager White Paper by IBM

January 2010 - (Free Research)
This IBM white paper will show you how you can help your organization manage incidents and problems, restore critical services, and minimize service desk calls in this white paper. 
(WHITE PAPER) READ ABSTRACT |

New Insider Threat Emerges in the New Economy by Lumension

February 2009 - (Free Research)
Learn how employees and partners are engaging with IT assets and intellectual property. 
(WHITE PAPER) READ ABSTRACT |

6 Steps to Protect Your Intellectual Property by Websense

December 2013 - (Free Research)
In this report, find out what data you must protect and why, uncover six steps for deploying data security controls, and learn more about the concept of data loss prevention (DLP) as a defense. 
(WHITE PAPER) READ ABSTRACT |

Get a Handle in Your Intellectual Property (No Matter Where it's Been) by Iron Mountain

September 2013 - (Free Research)
View this resource to learn how to resolve your questions about data backup and recovery. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Beyond Big Data – The New Information Economy by ComputerWeekly.com

April 2013 - (Free Research)
How information is managed is more important than 'big data', say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Stopping data leakage: Making the most of your security budget by Sophos UK

March 2009 - (Free Research)
This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks by Ixia

November 2013 - (Free Research)
Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests. 
(WHITE PAPER) READ ABSTRACT |

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media by PGP Corporation

February 2010 - (Free Research)
PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security. 
(WHITE PAPER) READ ABSTRACT |

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn by Symantec Corporation

December 2010 - (Free Research)
Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Top Benefits of Symantec Protection Suite by Symantec Corporation

June 2009 - (Free Research)
Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization. 
(WHITE PAPER) READ ABSTRACT |

Convert IBM Cloud image parameters into Java using JAXB: JAXB and Plain Old Java Objects morph XML cloud image parameters in usable Java code by IBM

July 2011 - (Free Research)
Get under the hood:  This technical note describes how to transform XML response into a Java™-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes. 
(WHITE PAPER) READ ABSTRACT |

Efficient Management of Legal and Compliance Requests on D2D Storage by Index Engines

December 2011 - (Free Research)
This white paper features today's best practices regarding efficient data management and provides you with the information you need to optimize your existing storage infrastructure and increase efficiency throughout your data center. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 430 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts