Lists What Is TheWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Lists What Is The returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Center Management
 •   Storage Management
 •   Application Management and Maintenance
 •   Backup Systems and Services
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Intelligence Solutions

Related Searches
 •   Cycles Lists What Is
 •   Lists Graphics
 •   Lists Organization
 •   Lists Solutions
 •   Lists Speed
 •   Lists What Administration
 •   Lists What Secure
 •   Purchasing Lists What Is
 •   Supply Lists What Is
 •   White Paper Lists
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

What is the Value of Unified Communications? by SearchSecurity.com

November 16, 2011 - (Free Research)
The benefits of unified communications are apparent to network managers, but how can you figure out the value it will add to your organization? 
(EGUIDE) READ ABSTRACT |

Building a digital government based on user needs by ComputerWeekly.com

December 09, 2013 - (Free Research)
Liam Maxwell the government’s first chief technology officer talks about his strategy to deliver the technology that the user needs. 
(PRESENTATION) READ ABSTRACT |

Improving Healthcare and Enabling EHR Adoption with Mission Critical Technology by HP & Intel®

April 15, 2010 - (Free Research)
Read this presentation transcript to better understand the best ways to approach and prioritize these needs. Learn how to sell users on the benefits of EHR technology for productivity and patient care. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Best Practices for Open Source and the Cloud by Red Hat

September 18, 2013 - (Free Research)
This whitepaper takes a careful look at two of today's most popular topics: open source application software and moving to the cloud. 
(WHITE PAPER) READ ABSTRACT |

Justifying Your Technology Investments Through ROI by KnowledgeStorm Webinars (E-mail this company)

April 27, 2004 - (Free Research)
As budgets stay tight and finance professionals become more involved in technology buying decisions, be better prepared to defend your business case through the use of financial metrics and Return on Investment (ROI) calculators. 
(WEBCAST) READ ABSTRACT |

Connecting Virtual Desktop and Disaster Recovery by Forsythe

November 20, 2009 - (Free Research)
Connecting virtual desktop technology with the disaster recovery process has probably not been a major focus for organizations; however, integrating a disaster recovery plan for the virtual desktop is moving up organizational priority lists for a multitude of reasons. 
(WHITE PAPER) READ ABSTRACT |

What are the Real Benefits of Virtual Desktops? by VMware, Inc.

January 24, 2013 - (Free Research)
Access this expert e-guide for a helpful list of the major benefits that VDI can bring to your organization presented in a way so that both IT and non-IT decision makers can easily see the value. 
(EGUIDE) READ ABSTRACT |

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by IBM

June 2008 - (Free Research)
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed. 
(WHITE PAPER)

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Best Practices in Selecting a SAP Managed Hosting Provider by Freudenberg IT

June 2009 - (Free Research)
In this presentation transcript, Michael Dortch, Founder and Lead Analyst of DortchOnIT.com, explains what to look for in an SAP managed hosting provider including how to determine your organization's requirements and how to evaluate potential providers. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Success with Hosted SAP Applications by Freudenberg IT

April 2009 - (Free Research)
In this presentation transcript, Michael Dortch, Founder and Lead Analyst of DortchOnIT.com, explains what to look for in an SAP managed hosting provider including how to determine your organization's requirements and how to evaluate potential providers. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

2013 Cyber Risk Report Executive Summary by Hewlett-Packard Company

February 2014 - (Free Research)
This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014. 
(WHITE PAPER) READ ABSTRACT |

Lowering the Cost of Business Intelligence With Open Source: A Comparison of Open Source and Traditional Vendor Costs by Pentaho Corporation

June 2010 - (Free Research)
Many of the top reasons given for the use of open source BI software is "lower costs." The question is whether commercial open source actually matters when it comes to lowering license and support costs. Read this analyst report for comparison of the software and support costs of traditional BI vendors versus commercial open source BI from Pentaho. 
(ANALYST REPORT) READ ABSTRACT |

Cloud Computing - Latest Buzzword or a Glimpse of the Future? by Google

February 2009 - (Free Research)
This paper provides a snapshot of what is happening in the arena of cloud computing. What are the benefits? Why are businesses embracing it? What does it mean to a business owner or executive? How does it affect the workplace? What are the payoffs and the pitfalls? Is it really ready for "prime time"? 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Platform-as-a-Service Changes Everything, Again! Visual PaaS is Here! by SearchDataCenter.com

September 2011 - (Free Research)
Sophisticated Visual PaaS offerings provide a unified environment that empowers both "hard-core programmers" as well as “citizen developers” to develop business applications. CIOs are seeing PaaS as a viable option to embrace "citizen developers" and make the transition from Information Technology to Business Technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation

January 2009 - (Free Research)
Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol. 
(WHITE PAPER) READ ABSTRACT |

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality by TippingPoint

August 2009 - (Free Research)
This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Selecting the Right Hosting Provider Insider Secrets That Every IT and Business Executive Should Know by Verio

December 2007 - (Free Research)
How can you identify the hosting company that's right for you? What are the business risks? What questions should you ask? Get the facts in this interview with Phil Shih, a research analyst at Tier1 Research, who covers consumer... 
(WHITE PAPER) READ ABSTRACT |

Ensuring Successful Manufacturing Execution in the Fabless Semiconductor Model by SAP AG

September 2008 - (Free Research)
The number of semiconductor companies adopting a fabless manufacturing model continues to increase. And to thrive in this highly competitive market, the fabless company must produce the best product designs for its intended market. This SAP Executive Insight examines the growing trend toward the fabless manufacturing model. 
(WHITE PAPER) READ ABSTRACT |

Private Cloud Computing E-Zine Vol. 2: Building Blocks and Roadblocks by SearchCloudComputing.com

May 2011 - (Free Research)
As public clouds have gain popularity among the IT industry, private cloud has begun to catch the eyes of IT pros, particularly those who want greater self-service and automation but worry about data security. However, many still remain apprehensive about what this platform has to offer. Gain insight on private cloud challenges and overcoming them. 
(EZINE)

Storage Hypervisors: Common Themes and Subtle Variations by DataCore Software Corporation

January 2013 - (Free Research)
This e-guide discusses the meaning of the industry term "storage hypervisor" and outlines differences between types of such products available in the marketplace today. The guide is formatted as an interview with storage expert Mark Peters. 
(EGUIDE) READ ABSTRACT |

FAQ Guide: The Changing Face of Scale Out Network-Attached Storage by Dell, Inc.

November 2012 - (Free Research)
This expert E-Guide features an interview transcript with Enterprise Strategy Group senior analyst Terri McClure. Read now to learn her predictions about scale-out NAS over the next few years. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts