Management What IsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Management What Is returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Security Policies
 •   Network Security
 •   Workflow Automation
 •   Storage Security
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Managed Security Services
 •   Virtualization
 •   Wireless Security

Related Searches
 •   Automated Management What
 •   Based Management What
 •   Capacities Management
 •   Corporation Management
 •   Definition Of Management What
 •   Directories Management What Is
 •   Graphs Management What Is
 •   Management Disk
 •   Management What Is Audits
 •   Management What Is Claims
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The State of Requirement Management - 2011 by Jama Software

August 18, 2011 - (Free Research)
If you're involved in the planning and development of products, software applications or systems, this report is for you. Learn the results of a recent industry survey - get insight on the latest trends, challenges and solutions and learn what development teams are doing to successfully plan and develop new products in a customer-driven economy. 
(WHITE PAPER) READ ABSTRACT |

Trends in Converged Infrastructure Management by CA Technologies.

May 19, 2014 - (Free Research)
This exclusive webcast covers the results of a survey of top IT decision makers that reveals the emerging priorities of IT, the challenges facing IT and much more. 
(WEBCAST) READ ABSTRACT |

McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution by McAfee, Inc.

August 18, 2011 - (Free Research)
This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more. 
(WHITE PAPER) READ ABSTRACT |

Performance Management: What the Mid-Market Can Learn from Large Enterprises by SAP America, Inc.

January 27, 2012 - (Free Research)
This white paper features results from a study by Aberdeen Group on mid-sized (or mid-market) organization on performance management. 
(ANALYST REPORT) READ ABSTRACT |

Securing Data Stored on Tape with Encryption by Quantum Corporation

April 30, 2010 - (Free Research)
Considering company data needs to be stored for longer periods of time and the high cost of a data breach; the need to encrypt data stored on tape is becoming increasingly important. Read this paper now to learn about why companies are moving in this direction, and what technologies are out there to help. 
(IT BRIEFING) READ ABSTRACT |

Get More Out of Your SAP Workflow Application by SearchSAP

February 25, 2013 - (Free Research)
Let this E-Book be your guide to expanding business possibilities with SAP Workflow add-ons. Discover how add-ons can help your business process management, what add-ons exist for SAP mobile, seven questions to ask when evaluating add-ons, and more. 
(EBOOK) READ ABSTRACT |

Identity-Aware Networking by Extreme Networks (E-mail this company)

December 02, 2010 - (Free Research)
When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. 
(WHITE PAPER) READ ABSTRACT |

Protect Your Brand By Improving Quality And Compliance by Apriso Corporation

May 13, 2011 - (Free Research)
Today's businesses need to make their brand unique-- but with all the challenges they face regarding supply chain management, what is the solution? 
(WHITE PAPER) READ ABSTRACT |

Taking a Proactive Approach to Linux Server Patch Management by SearchDataCenter.com

December 18, 2012 - (Free Research)
In this white paper, discover how to take a proactive approach to Linux server patch management. Learn more about overcoming common challenges for Linux server patch management, what to patch and when, patch management in the cloud and more. 
(WHITE PAPER) READ ABSTRACT |

What does the future hold for SaaS? by SearchSecurity.com

August 23, 2013 - (Free Research)
This expert e-guide from SearchNetworking.com discusses what IT really needs for efficient, reliable SaaS monitoring. View now to learn what SaaS monitoring nirvana would entail and uncover best practices for achieving it. 
(EGUIDE) READ ABSTRACT |

What’s in Store for the Cloud in 2014 by Citrix

February 06, 2014 - (Free Research)
This expert E-guide highlights what you can do differently in a hybrid cloud, SDN's role, top challenges and best practices for tackling them. 
(EGUIDE) READ ABSTRACT |

Debunking APT myths: What it really means and what you can do about it by SearchSecurity.com

July 29, 2011 - (Free Research)
This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats. 
(EGUIDE) READ ABSTRACT |

Unified communications etiquette guide: What to know, what to avoid by SearchSecurity.com

September 06, 2011 - (Free Research)
This e-guide takes a close look at UC etiquette: what you should know and what you need to avoid. Uncover the different types of strategies, applications, platforms and models you’ll need to help your organization streamline business processes with collaborative communications. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Platform-as-a-Service Changes Everything, Again! Visual PaaS is Here! by SearchDataCenter.com

September 21, 2011 - (Free Research)
Sophisticated Visual PaaS offerings provide a unified environment that empowers both "hard-core programmers" as well as “citizen developers” to develop business applications. CIOs are seeing PaaS as a viable option to embrace "citizen developers" and make the transition from Information Technology to Business Technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

What Converged Infrastructure Brings to a Private Cloud by SearchDataCenter.com

December 07, 2012 - (Free Research)
This expert e-guide explores how a private cloud can act as an enabler of converged infrastructure. Read on to learn why converged infrastructure has quickly become one of the industry's hottest topics. 
(EGUIDE) READ ABSTRACT |

6 Questions to Ask About Your Data Storage-Emily Wojcik byline for ILTA Peer to Peer Magazine by CommVault Systems, Inc.

December 31, 2013 - (Free Research)
In this quick 1-page article, 6 questions are provided to help hash out what data is necessary to store, and what will only add clutter. Read on to discover how your organization can reduce long-term storage costs and improve records management by simply asking the right questions. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization Planning Guide by Intel

June 23, 2011 - (Free Research)
Desktop virtualization, what is it and what does it mean for your organization and IT shop? This exclusive white paper provides an in-depth review of what it is, what it is not and steps for planning a desktop virtualization deployment. Begin to understand what desktop virtualization is and what it can mean to your organization and IT shop. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Three IT Questions for the Small Business Owner, Part 2 - What is a Network and Why Should I Care? by Dell, Inc. and Microsoft

December 18, 2009 - (Free Research)
In this presentation transcript you'll hear expert Greg Shields discuss what a network is as well as why a network can act as a backbone for running a business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Coaching Techniques for Dealing with Underperformers by Global Knowledge Network, Inc.

May 2004 - (Free Research)
People do not perform at their job for one of two reasons: either they can't or they won't. The second type of employee is the one we will address in this paper- the employee who chooses not to do his or her job for whatever reason. 
(WHITE PAPER) READ ABSTRACT |

Deduplication -- Sorting through the Hype by LEGACY - DO NOT USE - Datalink.

August 2008 - (Free Research)
Attend this webcast, led by seasoned Datalink storage experts, to learn exactly what deduplication can do for you-what's real and what's hype. 
(WEBCAST) READ ABSTRACT |

Why CRM Implementations Fail….And What To Do About It by Scribe Software Corporation

March 2011 - (Free Research)
Companies are scrambling to implement CRM systems, but they might not be getting what they bargained for if they're not careful. Up to 80% are reporting they're not getting what they were promised. Read this paper and learn how to avoid pitfalls, develop a strategy for your CRM system, and much more. 
(WHITE PAPER) READ ABSTRACT |

Customer Cloud Adoption: From Development to the Data Center by Dell, Inc.

April 2013 - (Free Research)
This whitepaper details the results of a study commissioned by Dell to answer some major questions about how organizations are interacting with the cloud. 
(WHITE PAPER) READ ABSTRACT |

A Candid Examination of Data Deduplication by Symantec Corporation

August 2009 - (Free Research)
Read this white paper for an in-depth discussion of what data deduplication is, how it works, what problems it solves, and what options are available. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing by IBM

January 2011 - (Free Research)
Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

DevOps definition: Best explained by what it's not by CA Technologies.

September 2013 - (Free Research)
Much has been written about what DevOps is, but in this tip guide, explore how software professionals describe DeOps by what it is not. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts