Issues StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Issues Study returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Storage Security
 •   Data Security
 •   Endpoint Security
 •   Security Policies
 •   Technology ROI Tools
 •   Storage Management

Related Searches
 •   Designs Issues Study
 •   Integration Issues Study
 •   Introduction Of Issues Study
 •   Issues Formats
 •   Issues Study Own
 •   Issues Study Vendors
 •   Issues Study Workflow
 •   Issues Study Wyoming
 •   Market Issues Study
 •   Profile Issues
Advertisement

ALL RESULTS
1 - 25 of 429 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Connecting Through Content, Issue Two by KnowledgeStorm, Inc (E-mail this company)

May 21, 2007 - (Free Research)
Connecting Through Content, Issue Two examines how technology buyers search for content and how marketers deliver content to them. Content distribution channels, user search techniques, content registration behavior and other aspects of content distribution and syndication are evaluated. 
(ANALYST REPORT) READ ABSTRACT |

Podcast--Connecting Through Content Issue One: How Technology Marketers Meet Buyers' Appetite For Content by KnowledgeStorm, Inc (E-mail this company)

May 2007 - (Free Research)
This report discusses content strategies and preferences from the unique perspectives of both the B2B technology buyers and marketers. 
(PODCAST) READ ABSTRACT |

Connecting Through Content: Issue One by KnowledgeStorm, Inc (E-mail this company)

March 2007 - (Free Research)
This report, Issue One: How Technology Marketers Meet Buyers' Appetite for Content is the first in the Connecting Through Content series, which explores content creation, distribution and lead nurturing through the dual marketers' and technology buyers' perspectives. 
(ANALYST REPORT) READ ABSTRACT |

Connecting Through Content Issue Three Podcast by KnowledgeStorm, Inc (E-mail this company)

August 2007 - (Free Research)
This is a podcast of the overview and key findings from the final study in the Connecting Through Content series. 
(PODCAST) READ ABSTRACT |

Connecting Through Content, Issue Three: Putting It All Together -- Driving Content Marketing Success by KnowledgeStorm, Inc (E-mail this company)

August 2007 - (Free Research)
In the previous two Connecting Through Content studies, B2B marketers and business and technology buyers weighed in on content distribution, lead follow-up and more. This final study in the series examines what happens once that registration has been submitted — the critical point of the program’s success or failure. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: Global Law Firm Solves Privilege Management Issues with User Virtualization by AppSense

July 2013 - (Free Research)
In this case-study, you’ll discover how a global, highly regulated law firm was able to eliminate end-user management issues with a people-centric user virtualization solution. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly 6 September 2011: Download the latest issue of the UK’s leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at HP's strategic shake-up, and ask what it means for the supplier's customers and the UK IT industry as a whole. We also discuss a major research study into why IT projects go wrong, and start our latest Buyer's Guide, about business intelligence. Download the new issue now. 
(EZINE)

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

VDI Customer Case Study: U.S. Army by Xangati

December 2013 - (Free Research)
This whitepaper explains how the U.S. Army used VDI in order to eliminate time-consuming login times faced by doctors attempting to access patient records. 
(CASE STUDY) READ ABSTRACT |

VDI Customer Case Study: Euclid Insurance by Xangati

December 2013 - (Free Research)
This whitepaper explains how one organization was able to leverage a performance management solution to monitor their virtual environment, locate problem-causing elements and prevent them from causing further issues for IT and users. 
(WHITE PAPER) READ ABSTRACT |

VDI Customer Case Study: Athabasca University by Xangati

December 2013 - (Free Research)
This case study explores how Athabasca University was able to use a VDI performance management tool to get detailed metrics and visibility into their servers and desktops in order to detect and remedy performance problems quickly and effectively. 
(CASE STUDY) READ ABSTRACT |

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study by Sybase, an SAP company

November 2010 - (Free Research)
This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 25 February 2014: Banking with dinosaurs – the legacy IT crisis in financial services by ComputerWeekly.com

February 2014 - (Free Research)
In this week's Computer Weekly, we examine the IT problems at high-street banks, and learn how outsourcing led to the loss of key legacy IT skills. We ask what role wearable technology could have in enterprise IT. And we take an in-depth look at the tools for using Microsoft Azure for building hybrid clouds. Read the issue now. 
(EZINE) READ ABSTRACT |

Amplifying the Signal in the Noise of IT Monitoring by Zenoss, Inc.

October 2013 - (Free Research)
This case study details the value of moving past the traditional, fragmented approach to IT monitoring. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of WANdisco SVN MultiSite by WANdisco (E-mail this company)

July 2013 - (Free Research)
This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 19 March 2013: Delivering software development success by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now. 
(EZINE) READ ABSTRACT |

2010 Endpoint Risk Assessment: Internal Vulnerabilities by Promisec

May 2011 - (Free Research)
This study will show you the most common security issues that were found and how they were dealt with by the various organizations. 
(WHITE PAPER) READ ABSTRACT |

Thomas Concrete Constructs a World-Class IT Platform with Nimble Storage by Nimble Storage

July 2013 - (Free Research)
This short case study reveals how one organisation easily and affordably deployed a storage solution that integrates flash-optimised storage and data protection. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 11 March 2014: Making data flow freely by ComputerWeekly.com

March 2014 - (Free Research)
In this week's Computer Weekly, our latest buyer's guide looks at open data and how it can improve public services – and even help prevent a repeat of the recent floods. We report from Cloud Expo on the reasons why public cloud is yet to be embraced by enterprise IT. And we look at the key issues for buying HR software in 2014. Read the issue now. 
(EZINE) READ ABSTRACT |

CW Buyer’s Guide: Virtual desktops in the enterprise by ComputerWeekly.com

June 2012 - (Free Research)
This Computer Weekly buyer’s guide to virtual desktops gives you the key facts on thin clients, the economics of cloud, and Citrix. 
(ESSENTIAL GUIDE) READ ABSTRACT |

2010 Information Security & Compliance Trend Study by nCircle

August 2010 - (Free Research)
This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises. 
(WHITE PAPER) READ ABSTRACT |

Ponemon Global Study on Mobility Risks by Websense, Inc.

February 2012 - (Free Research)
With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them. 
(WHITE PAPER) READ ABSTRACT |

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention by Trend Micro, Inc.

July 2010 - (Free Research)
When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it. 
(CASE STUDY) READ ABSTRACT |

About T-Mobile USA by Jive Software

June 2013 - (Free Research)
Find out in this case study how a social business platform enabled T-mobile to consolidate and centralize information about products, services, pricing, policies and troubleshooting, enabling sales reps to better utilize their time. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 429 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts