List Contractor SubWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: List Contractor Sub returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Information Integration/ Metadata Management
 •   Virtualization
 •   Storage Management
 •   Enterprise Systems Management
 •   Data Center Management
 •   Data Security
 •   Endpoint Security
 •   Disk-based Backup & Storage/ RAID
 •   Application Management and Maintenance
 •   Business Process Management (BPM)

Related Searches
 •   Canadian List Contractor Sub
 •   Format List Contractor Sub
 •   List Contractor Cases
 •   List Contractor Secure
 •   List Contractor Sub White Paper
 •   List Contractor Web Casts
 •   List Project
 •   List Wisconsin
 •   Maintenance List Contractor Sub
 •   Supply List Contractor Sub
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: New Wave of Automated Tiering Software Eases Migration, Adds Control by Dell Compellent

May 2011 - (Free Research)
In this tutorial on automated tiering, we outline the sub-LUN offerings the major storage vendors are promoting alongside their SSD options. We also explore five questions users need to consider as they evaluate sub-LUN tiering options, and more. 
(EGUIDE) READ ABSTRACT |

Securing Network Access for Guests and Contractors by Bradford Networks

December 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

California Institute for Telecommunications and Information Technology (Calit2) Uses Kognitio WX2 for CAMERA Project by Kognitio

July 2007 - (Free Research)
In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data. 
(CASE STUDY) READ ABSTRACT |

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine by SearchSecurity.com

October 2013 - (Free Research)
Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change. 
(EZINE) READ ABSTRACT |

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm by AVG Technologies USA, Inc.

March 2010 - (Free Research)
R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges. 
(CASE STUDY) READ ABSTRACT |

Faster HP server firmware updates and system fixes for defense contractor by Hewlett-Packard Company

January 2014 - (Free Research)
Read through this concise case study to find out what HP recommended their customer to solve a hardware issue. 
(CASE STUDY) READ ABSTRACT |

How to Profit in a Downturn: 4 Customer-centric Strategies for Growth in a Challenging Market by Pivotal CRM, a CDC Software solution

February 2009 - (Free Research)
In this white paper, learn how your organization can use customer-centric strategies and CRM tools to maximize the value and loyalty of your customer base. Gain insight into new areas of opportunity and do more with less in a time of economic uncertainty. 
(WHITE PAPER) READ ABSTRACT |

Customer Success Story: ECSEC - ‘Hell’s Kitchen’ Contractor Goes to Heaven with Symantec by Symantec Corporation

July 2010 - (Free Research)
By partnering with Symantec and Vitality Consulting Services, ECSEC implemented an integrated Symantec data protection and messaging security solution giving ECSEC the confidence that its network is now operating correctly, confidence that data is now properly secured and backed up. Download this Customer Reference to read the whole story. 
(WHITE PAPER) READ ABSTRACT |

What can go wrong with firmware updates : What unauthorized support providers don’t tell you -Defense Contractor customer by Hewlett-Packard Company

November 2013 - (Free Research)
Read through this concise case study to find out what HP recommended their customer to solve a hardware issue. 
(CASE STUDY) READ ABSTRACT |

Mobility Success Story: Bank Improves Collaboration and Service by AdvizeX Technologies

March 2014 - (Free Research)
A top-25 commercial bank needed to give its mobile workforce secure access to business applications and data: without it, customer service was sub-par and collaboration suffered. In this brief case study, find out how the bank, along with a consulting partner, delivered a strategy that allowed employees to access applications and data in real-time 
(CASE STUDY) READ ABSTRACT |

Sybase IQ , A Competitive Analysis by Sybase, an SAP company

October 2010 - (Free Research)
This paper, intended for both IT and operational management, explores a series of high-level best practices for analytics and data warehousing based on Sybase’s experience with successful implementations. Suggestions are provided in three categories: performance, cost control, and ease-of-deployment with each dimension broken down into sub-topics. 
(WHITE PAPER) READ ABSTRACT |

Special Report: Tiered Data Storage Strategies for Your IT Shop by Dell Compellent

August 2011 - (Free Research)
Check out this SearchStorage.com Special Report to learn everything storage tiering as it outlines four different options including dynamic storage tiering, sub-LUN tiering, data migration in tiering and auto-tiering. 
(EGUIDE) READ ABSTRACT |

Risk Management and Product Delivery in Consumer Lending by ILOG, an IBM Company

September 2008 - (Free Research)
Amid the ongoing impact of the sub-prime meltdown and the ensuing credit crunch, lenders are facing a much tougher market than has been seen for some time. Business Rules Management Systems (BRMS) can enhance risk management, lending process streamlining and flexibility. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

eBook: Techfocus - Data Center Construction by APC by Schneider Electric

November 2009 - (Free Research)
The chapters in this Techfocus eBook will discuss the importance of site selection and planning, data center conceptualization and cost analysis, and negotiating with contractors. 
(EBOOK) READ ABSTRACT |

Creating Order from Chaos in Data Centers and Server Rooms by APC by Schneider Electric

February 2009 - (Free Research)
Data center professionals can rid themselves of messy racks, sub-standard under floor air distribution, and cable sprawl with a minimum of heartache and expense. This paper outlines several innovative approaches for dealing with the symptoms of chaos and for eliminating the root causes of disorder. 
(WHITE PAPER) READ ABSTRACT |

ESG: Nexsan’s Flexible Storage System by Nexsan

September 2011 - (Free Research)
Although it’s a commonly used term, "midmarket" has no standard definition; however, it can usefully be given some specific context and parameters if looked at from the perspective of some common attributes that exist within and across its three sub-tiers: the bottom, middle, and top. 
(WHITE PAPER) READ ABSTRACT |

FAQ Guide: Data Deduplication and Compression on Primary Storage Can Reduce Data Footprint by CommVault Systems, Inc.

August 2011 - (Free Research)
Dave Russell, a research vice president at Gartner, discusses the current techniques for data reduction on primary storage, from standard compression to file- and sub-file deduplication, to a combination of deduplication and compression. He also outlines the emerging approaches that users may find more prevalent in the future. 
(EGUIDE) READ ABSTRACT |

The IBM Data Governance Unified Process: Driving Business Value with IBM Software and Best Practices Book (Sunil Soares) by IBM

March 2011 - (Free Research)
This 150 page book by Sunil Soares provides a practical set of detailed steps and sub-steps to implement an Information Governance program, as well as the associated automation provided by IBM Software. 
(BOOK) READ ABSTRACT |

Consolidating Applications with Oracle Solaris Containers by Oracle Corporation

May 2010 - (Free Research)
Oracle Solaris Containers implement OS virtualization using containers that are designed to provide a complete, isolated, secure runtime environment for applications—and in situations where resources can be managed with sub-CPU granularity. 
(WHITE PAPER) READ ABSTRACT |

Avaya IP Office Release 6: Small Office Deployment & TCO vs. ShoreTel IP Phone System by Avaya

September 2011 - (Free Research)
Read this white paper for a comparison of Avaya's IP Office and ShoreTel’s IP Phone System. Then discover how Avaya IP Office uses a scalable system that minimizes power consumption and avoids the need for a dedicated Windows server system in sub-20 person offices. 
(WHITE PAPER) READ ABSTRACT |

SmartDL 4.0, Dynamic Group Management by Imanami

August 2006 - (Free Research)
Distribution list changes happen frequently and often slip through the cracks decreasing your control over network access rights. This free trial IT download increases the accuracy of distribution lists and security groups with an automated solution. 
(TRIAL SOFTWARE)

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts