Maintain PublicWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Maintain Public returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Virtualization
 •   Storage Management
 •   Enterprise Systems Management
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Technology Planning and Analysis
 •   Network Security
 •   Storage Security

Related Searches
 •   Corporation Maintain
 •   Designer Maintain
 •   Maintain Public Features
 •   Maintain Public Strategic
 •   Maintain Top
 •   Policy Maintain Public
 •   Pro Maintain Public
 •   Schedules Maintain
 •   Standards Maintain Public
 •   User Maintain
Advertisement

ALL RESULTS
1 - 25 of 452 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 01, 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

Linear Architecture for Municipal Wireless Video Surveillance Solutions by Motorola, Inc.

August 20, 2009 - (Free Research)
Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 02, 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues by ComputerWeekly.com

September 13, 2011 - (Free Research)
In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games. 
(EZINE)

An Open Hybrid Cloud Architecture by Red Hat

September 04, 2013 - (Free Research)
IT organizations have struggled to maintain compliance, governance, and control over businesses critical assets in the public cloud. Consumer expectations of what IT organization should provide have dramatically increased. Check out this blog post today to learn about all of the benefits an open hybrid cloud model can provide for your organization. 
(RESOURCE) READ ABSTRACT |

Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap by XO Communications

January 21, 2014 - (Free Research)
In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed. 
(EGUIDE) READ ABSTRACT |

How can I Adopt Cloud Computing While Maintaining Strong Security? by CA Technologies.

September 01, 2010 - (Free Research)
Whether an organization is looking to provide or consume private, public, hybrid or community cloud services, security and control requirements must be addressed. Read this executive brief to learn how to secure your business in the cloud by using identity and access management. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Maximizing the Value of Economic Stimulus Funds by SAP America, Inc.

June 05, 2009 - (Free Research)
The American Recovery and Reinvestment Act (ARRA) was a dramatic action designed to quickly stimulate an economic recovery in the United States. This SAP Executive Insight examines some of the major challenges agencies face with respect to this stimulus plan. It describes how governments can transform their organization to devote more resources.. 
(WHITE PAPER) READ ABSTRACT |

German public transport provider thrives with flash storage by IBM

October 30, 2013 - (Free Research)
Access this white paper to learn how Stuttgarter StraBenbahnen AG (SSB) was able manage growing quantities of data and provide fast access to vital information, extending its existing storage environment – based on IBM system storage SAN volume Controller – with high-performance IBM flash storage system technology. 
(CASE STUDY) READ ABSTRACT |

Maximize your Strategic Flexibility by Building an Open Hybrid Cloud by Red Hat

November 21, 2013 - (Free Research)
This whitepaper covers the importance of building a private cloud correctly and using the hybrid cloud to get the most out of the technology. 
(WHITE PAPER) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 15 May 2012: Overhauling banking IT by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital? 
(EZINE) READ ABSTRACT |

Seamless Design and GIS Integration by Autodesk

July 2008 - (Free Research)
With Autodesk Map 3D and Oracle Spatial forming the core of its GIS, Tacoma's efforts have met with spectacular-and award-winning-success. 
(CASE STUDY) READ ABSTRACT |

The Impact of Carrier Ethernet on Service Providers by Dorado Software

September 2009 - (Free Research)
Mobile internet access and the explosive demand for high bandwidth services on mobile devices have created a pivotal point for service providers. Those providers that can meet the new demands while increasing efficiency will be able to increase their market share, while those that are not will lose ground. Read on to learn how to keep up. 
(WHITE PAPER) READ ABSTRACT |

Cisco Unified Computing System: Meet the Challenges of Virtualization with Microsoft Hyper-V by Cisco Systems, Inc.

January 2012 - (Free Research)
This white paper describes a recommended approach to help you optimize your virtual infrastructure and position your business to take advantage of public and private cloud services. 
(WHITE PAPER) READ ABSTRACT |

WebSphere Cloudburst Appliance and PowerVM by IBM

July 2011 - (Free Research)
Cloud computing is the pooling of computing resources to provide a single source of computing power to multiple users. Find out how a cloud manager provides a self-service portal that maintains permissions and information about cloud objects such as virtual images, patterns, and resources. 
(WHITE PAPER) READ ABSTRACT |

Intel® Cloud Builders Guide: Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services by Intel

February 2012 - (Free Research)
A cloud environment can be hard to secure, but certain technology can mitigate your risks.This essential white paper focuses on establishing a robust foundation for the deployment of secure multi-tenancy operations. Learn about a set of hardware components that can help you build and maintain a chain of trust to protect your sensitive information. 
(WHITE PAPER)

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information by Iron Mountain

December 2013 - (Free Research)
Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

The Application Deluge and Visibility Imperative by Riverbed Technology, Inc.

January 2014 - (Free Research)
In this whitepaper from ESG, you’ll discover how to ensure network performance for your business-critical applications by learning about network challenges in modern environments, what tools and technologies forward-thinking organizations are investing in, and more. 
(WHITE PAPER) READ ABSTRACT |

Immersion Into the Cloud: What You Need to Know by Zenith Infotech

December 2010 - (Free Research)
This E-Guide discusses the firsthand tops from industry experts on just how to select the cloud offerings and service that is right for you while maintaining security and reliability standards. 
(EGUIDE) READ ABSTRACT |

Identity and Access Management for the Cloud by Dell Software

September 2013 - (Free Research)
This white paper explains the access management challenge, especially as it relates to clouds, and offers best practices for overcoming the challenges involved with managing your users in both public and private clouds. 
(WHITE PAPER) READ ABSTRACT |

ENTERPRISE APPLICATION ARCHIVING: Unified Protection and Management for Enterprise Application Output by EMC Corporation

March 2008 - (Free Research)
Today easy management of and access to archives is more than compliance and governance, it is also about improving service, repurposing content, creating new revenue streams, protecting public safety and more. 
(WHITE PAPER) READ ABSTRACT |

Large School District Weighs TCO of Microsoft by Microsoft

June 2009 - (Free Research)
In response to deepening budget challenges, Orange County Public Schools (OCPS) sought to reduce IT related expenses. OCPS conducted a study to compare the total cost of ownership (TCO) of different productivity suite software alternatives, in particular the 2007 Microsoft® Office system and open source software (OSS) alternatives.. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 452 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts