Major Applications EventsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Major Applications Events returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Security Policies
 •   Disaster Recovery
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Customer Relationship Management (CRM)
 •   Wireless Technologies and Mobile Computing
 •   Managed Security Services
 •   Virtualization

Related Searches
 •   Lists Major Applications Events
 •   Major Applications Events Guideline
 •   Major Applications Networking
 •   Major Contract
 •   Major Supply
 •   Major Terms
 •   Remote Major Applications Events
 •   Starting Major Applications Events
 •   Storage Major
 •   Types Major
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Find the Best Route to Deliver Application Virtualization by SearchVirtualDesktop.com

February 24, 2014 - (Free Research)
Experts explain what IT professionals need to know about delivering virtualized apps to end-users for anytime, anywhere access. 
(EGUIDE) READ ABSTRACT |

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 04, 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

SAP Supports Applications on VMware Platform: An Industry Milestone by VMware, Inc.

October 2008 - (Free Research)
The partnership with SAP gives VMware the opportunity to address an additional large segment of the enterprise market, and enables SAP to sell its products on the industry-leading virtualization platform. 
(WHITE PAPER) READ ABSTRACT |

Financial services must gain speed and go mobile to satisfy customers by ComputerWeekly.com

January 2011 - (Free Research)
This nine-page Buyer’s Guide to Financial Services IT assesses the implications and challenges facing CIOs and senior IT professionals. 
(WHITE PAPER) READ ABSTRACT |

Strategic Insight for Your SAP Deployment: The Top 3 Techniques for Capacity and Performance Management by HyPerformix

July 2008 - (Free Research)
The emerging best practice of predictive analysis provides accurate predictions of performance and capacity, hands-on real observed results, that allow you to make informed business decisions about IT investments. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 September 2011: Download the latest issue of the UK’s leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at HP's strategic shake-up, and ask what it means for the supplier's customers and the UK IT industry as a whole. We also discuss a major research study into why IT projects go wrong, and start our latest Buyer's Guide, about business intelligence. Download the new issue now. 
(EZINE)

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management by Novell, Inc.

October 2009 - (Free Research)
Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats. 
(WHITE PAPER) READ ABSTRACT |

Application Modernization: Best practices and methods by TechTarget

March 2014 - (Free Research)
As the business landscape continues to grow unabated, you may want to consider a new approach to modernizing your legacy apps. Take this brief survey and gain access to an essential guide that uncovers what you need to know before upgrading your major applications as well as how a service approach can support application modernization. 
(RESOURCE)

Major Grocer Upgrades HR Processes by IBM

December 2010 - (Free Research)
This case study explains how when a major grocer needed to keep pace with hiring needs because of rapid growth and they needed to ensure consistent and timely response to HR events they turned to Lombardi Teamworks® to help them extend their processes out to the local stores and to efficiently manage HR requests. 
(CASE STUDY) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

Responding to Major Power Outages by Emerson Network Power

December 2011 - (Free Research)
Explore this informative whitepaper to learn key steps to help you respond in the event of a major power outage and how you can leverage UPS equipment and other measures to protect your datacenter and network from power outages and power-related problems, ensuring business continuity and 24/7 uptime. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for a Next-Generation SIEM: Delivering Operational Efficiency and Lower Costs Through An Integrated Approach to Network Security Management by Q1 Labs, an IBM Company

October 2010 - (Free Research)
The selection of the most effective IT technology is a major concern for companies of all sizes, across almost every industry. Read this white paper to learn more about how Q1 Labs' next-generation security information and event management solutions can help protect your IT assets at a lower cost to the company. 
(WHITE PAPER) READ ABSTRACT |

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain. 
(WHITE PAPER) READ ABSTRACT |

Better Approaches to Data Protection by HP & Intel®

June 2011 - (Free Research)
In this guide, expert analyst Jeff Boles talks about how to leverage different combinations of data backup technologies to better align data protection with application requirements. Read on to learn how to better protect and restore your data in the event of a threat. 
(EGUIDE) READ ABSTRACT |

Business Continuity Self-Assessment Tool by IBM Software Group

April 2007 - (Free Research)
The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas. 
(WHITE PAPER) READ ABSTRACT |

HP's Get Virtual Guarantee by Hewlett-Packard Company

May 2012 - (Free Research)
HP is putting its money where its mouth is with its new Get Virtual Guarantee program for VMware, and guaranteeing you'll get twice your VM density. Check out this short webcast to learn more. 
(WEBCAST) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

High Availability for Desktop Virtualization by Citrix

October 2009 - (Free Research)
This Implementation Guide shows how to provide high-availability, disaster recovery and business continuity to a XenDesktop environment. The document is divided into the following sections: local availablity, global availability, and disaster recovery/business continuity. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 May 2014: Retail's data challenge by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, we look at how data analytics is driving a new approach to customer relationship management within the retail sector. Customer who shops in multiple channels offer greater value to retailers. We find out how auction site eBay has developed a bespoke data analytics architecture to track every customer interaction. 
(EZINE) READ ABSTRACT |

Enhancing SQL Reporting Services with Double-Take by Double-Take Software

February 2008 - (Free Research)
Information stored on SQL Servers is important, so being able to protect this data at all times is extremely critical. Read this white paper to learn about solutions and strategies that can help protect and recover your critical SQL data no matter what. 
(WHITE PAPER) READ ABSTRACT |

Threat Analysis: Understanding and Combating DDoS Attacks by SecureWorks

May 2011 - (Free Research)
This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations. 
(WHITE PAPER) READ ABSTRACT |

Ten Common Reasons For VM Restore Failure by Dell Software

May 2014 - (Free Research)
In this expert e-guide, learn ten common causes of VM restore failures such as corrupt backup and why these problems occur as well as potential ways to amend them. 
(EGUIDE) READ ABSTRACT |

IBM Smart SOA Global Virtual Forum: How to Get Smarter Business Outcomes by IBM

October 2008 - (Free Research)
Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now! 
(WEBCAST) READ ABSTRACT |

PCI Compliance Made Simple by Alert Logic

February 2008 - (Free Research)
Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts