Internet-Based Design CaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Internet-Based Design Case returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Enterprise Systems Management
 •   Virtualization
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Backup Systems and Services
 •   Network Security
 •   Data Security
 •   Endpoint Security
 •   Enterprise Content Management (ECM)

Related Searches
 •   Article About Internet-Based Design
 •   Database Internet-Based Design
 •   Graphics Internet-Based Design
 •   Impacts Of Internet-Based
 •   Internet-Based Capacity
 •   Internet-Based Design Contracts
 •   Internet-Based Design Integration
 •   Internet-Based Design Repair
 •   Internet-Based Design Requirement
 •   Mapping Internet-Based
Advertisement

ALL RESULTS
1 - 25 of 442 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers by Red Hat and HP

April 10, 2013 - (Free Research)
Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity. 
(WHITE PAPER) READ ABSTRACT |

Controlling Web 2.0 Applications in the Enterprise by Fortinet, Inc.

July 29, 2011 - (Free Research)
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats. 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 18, 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

E911 VoIP Essentials for Enterprise Deployments by XO Communications

December 02, 2010 - (Free Research)
Deploying VoIP across multiple business locations is a great way to simplify and streamline your distributed network and reduce costs, but how does a business provide E911 effectively across the enterprise and what are the legal requirements? 
(WHITE PAPER) READ ABSTRACT |

NueMD®'s Practice Management Solution Helps New Orleans Opthalmologist Weather the Storm by NueMD

June 2008 - (Free Research)
When Eye-Care 20/20 needed a new practice management system to address various computer and management concerns, they selected NueMD, an Internet-based solution which provide them with immediate results. 
(CASE STUDY) READ ABSTRACT |

Try Office 365 for free for 30 days by Microsoft

December 2011 - (Free Research)
Receive a 30 day no-risk trial of Office 365, a suite of Internet-based services devised to help meet your needs for robust security, 24/7 reliability, and user productivity. 
(TRIAL SOFTWARE)

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints by Sunbelt Software

July 2009 - (Free Research)
Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution. 
(WHITE PAPER) READ ABSTRACT |

Retail Opportunities in a World of Extremes: Understanding Today's Teens and Boomers by IBM

May 2008 - (Free Research)
This IBM study focused on two groups – teens and boomers. It explores their lifestyles, values, and particular preferences and attitudes toward shopping. Read this paper to learn how retailers can better meet the needs of these two segments. 
(WHITE PAPER)

Online IT Training Company Deploys Web Conferencing Service, Saves Time and Money by Microsoft

October 2007 - (Free Research)
Intelliem provides customized solutions that help companies improve their IT environments and that train workers to use software productively. Intelliem needed a cost-effective Web conferencing service to replace meetings, training sessions, and presentations requiring travel to on-site locations. Microsoft® Office Live Meeting was adopted. 
(CASE STUDY) READ ABSTRACT |

Expanding Web Single Sign-On to Cloud and Mobile by CA Technologies.

December 2012 - (Free Research)
This informative white paper explores security solutions that were built to strike the right balance between data security and user access convenience. 
(WHITE PAPER) READ ABSTRACT |

Herding Geese: The Retail Supply Chain by ComputerWeekly.com

April 2013 - (Free Research)
Steven Keifer draws on the pioneering work of US retailer, Walmart, to explain the essentials of EDI in the retail supply chain. 
(BOOK) READ ABSTRACT |

Analyst's take: Surety's AbsoluteProof protects data integrity by ComputerWeekly.com

February 2011 - (Free Research)
Surety’s AbsoluteProof provides organizations with a means to ensure the veracity and integrity of electronic records, files, and other digital content over time, strengthening intellectual property protection while reducing risk. 
(WHITE PAPER) READ ABSTRACT |

What IT Managers Need to Know About IP Surveillance by D-Link

June 2010 - (Free Research)
The video surveillance market is in the throes of transition. IP surveillance is rapidly taking over from traditional analog CCTV. Within the next three years more than half the surveillance cameras used in North America will be IP cameras, according to the research firm Frost & Sullivan. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Provide Better Visibility and Manageability across Network Security Tools by WatchGuard Technologies, Inc.

September 2013 - (Free Research)
Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment. 
(ANALYST REPORT) READ ABSTRACT |

Internet-Scale Identity Systems:An Overview and Comparison by Ping Identity Corporation

March 2014 - (Free Research)
This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of the Enterprise…And Enterprise Security by Fortinet, Inc.

March 2014 - (Free Research)
This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve. 
(WHITE PAPER) READ ABSTRACT |

Designing a DCM architecture for enhanced decision-making and collaboration by IBM

November 2011 - (Free Research)
Designing a case management architecture is more of an art—really, a balancing act—than a science. In this expert e-guide, readers will learn to build "bridges" to extend case management activity across the enterprise, and enable more effective collaboration and decision-making. 
(EGUIDE) READ ABSTRACT |

eGuide: Strategies for building the best advanced case management architecture, Part I by IBM

November 2011 - (Free Research)
Designing a case management architecture is more of an art—really, a balancing act—than a science. In this e-guide, readers will learn to address key considerations involved in designing an effective case management architecture that extends across the enterprise to enable better collaboration and decision-making. 
(EGUIDE) READ ABSTRACT |

Best Practices White Paper: How to Plan and Design for Case Management Projects with Documentum xCP by EMC Corporation

May 2011 - (Free Research)
This white paper outlines best practice design phases for organizations planning case-based application development. Learn about the EMC Documentum xCelerated Composition Platform and its value to organizations that want to increase process efficiency with automated solutions that employ composition rather than custom coding. 
(WHITE PAPER) READ ABSTRACT |

Crafting a DCM architecture: Principles, priorities and components to consider by IBM

November 2011 - (Free Research)
Designing a dynamic case management (DCM) architecture is more of an art—really, a balancing act—than a science. In this expert e-guide, readers will learn to address key principles and considerations involved in designing an effective DCM architecture, and incorporate organizational values and priorities into such an architecture. 
(EGUIDE) READ ABSTRACT |

Article: Design Patterns for Case Management by EMC Corporation

August 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

Air-Cooled High-Performance Data Centers: Case Studies and Best Methods by Intel Corporation

November 2006 - (Free Research)
Combining innovations and best-known methods for air-cooled data center design helps provide new approaches for power and cooling. This white paper discusses real world examples of how to lower costs and improve performance within the IT infras... 
(WHITE PAPER)

Gaining a Competitive Design Advantage in the New Telecom/Datacom Marketplace by Telelogic, An IBM Company

June 2008 - (Free Research)
Embedded Market Forecasters, in this paper, present the case for using Model Driven Development (MDD). MDD is a preferred model because it allows for the development of software applications that are delivered on-time and meet pre-design expectations while also providing for the reuse of said software when the current hardware is replaced. 
(ANALYST REPORT) READ ABSTRACT |

Designing Secure Multi-Tenancy into Virtualized Data Centers by Continental Resources

April 2010 - (Free Research)
Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture. 
(WHITE PAPER) READ ABSTRACT |

Manage Your Data Centre the Smart Way: A Case Study by Emerson Network Power

December 2012 - (Free Research)
Explore this informative case study to discover how Microsoft Research Cambridge gained greater levels of data centre insight, control, and automation with Avocent DCIM tools and enjoyed greater business benefits. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 442 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts