Manuals Research Criteria ForWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Manuals Research Criteria For returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Data Security
 •   Application Security
 •   Enterprise Systems Management
 •   Storage Management
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Network Security

Related Searches
 •   B2B Manuals Research Criteria
 •   Developments Manuals Research Criteria
 •   Manuals Manager
 •   Manuals Research Consulting
 •   Manuals Research Criteria Webcasts
 •   Manuals Vermont
 •   Package Manuals Research
 •   Starting Manuals Research Criteria
 •   Using Manuals Research Criteria
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

ERP Software Selection Criteria for Midsized Businesses by Sage Software

July 24, 2013 - (Free Research)
In this E-Guide, you will gain practical advice and best practices for choosing an ERP system from Jim Shepherd, senior vice president of research for AMR Research. 
(EGUIDE) READ ABSTRACT |

Protection for Every Enterprise: How BlackBerry Security Works by BlackBerry

July 18, 2014 - (Free Research)
This guide explores BlackBerry 10 and their mobile security methods, as well as their criteria for having the most secure mobile operating system. 
(WHITE PAPER) READ ABSTRACT |

Roadmap for Effective Performance Monitoring at a Reduced Cost by Neustar®

February 11, 2010 - (Free Research)
This document provides a roadmap for web delivery teams to reduce operational expenditures, and shows how to improve the effectiveness of critical information required for decision-making for Internet services. 
(WHITE PAPER) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

4G mobile phone (LTE) revenue opportunities for business by ComputerWeekly.com

November 2010 - (Free Research)
This  Whitepaper is based on Juniper Research’s  November 2010 report entitled:  “4G LTE Revenue Opportunities: Business Models, Scenarios and Operator Strategies 2010-2015”. 
(WHITE PAPER) READ ABSTRACT |

All Qualified Security Assessors Are Not Created Equal by AT&T Corp

August 2010 - (Free Research)
The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment 
(WHITE PAPER)

DataFlux Positioned in Leaders Quadrant of the 2010 Magic Quadrant for Data Quality Tools by DataFlux Corporation

July 2010 - (Free Research)
DataFlux was recently positioned by Gartner, Inc. in the Leaders Quadrant of its 2010 “Magic Quadrant for Data Quality Tools” report. Gartner’s Magic Quadrants evaluate vendors within a particular technology market based on their completeness of vision and ability to execute. Use this Magic Quadrant to understand the data quality tools market. 
(ANALYST REPORT) READ ABSTRACT |

The EMA All-Stars in Enterprise Systems Management for 2008 by CA Technologies.

March 2008 - (Free Research)
Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant: WLAN Infrastructure by Aruba Networks

February 2010 - (Free Research)
The ratification of the 802.11n standard provides higher-speed wireless options and a replacement for access connectivity that has traditionally been wired. Learn about Gartner's assessment of vendors for controller-based WLAN systems. 
(ANALYST REPORT) READ ABSTRACT |

Nucleus Research Report: Extend the Value of SAP to Labor Management by Kronos Incorporated

March 2010 - (Free Research)
See what Nucleus Research says on how you can get up and running faster, gain real-time access to labor data, and save valuable time by adopting a time and attendance solution from Kronos. Read this paper and learn why real time access to time and attendance data and other Kronos advantages reduce payroll inflation, manual processes and more. 
(ANALYST REPORT) READ ABSTRACT |

Master Data Management Projects in Practice - An Information Difference Research Study by Talend

December 2009 - (Free Research)
Organizations are often turning to Master Data Management as a key enabler in improving the timeliness, quality and reliability of BI with the ultimate goal of improving business performance. This survey report presents recommendations on the "do and don't" of MDM as well as some findings on the use of open source and manual coding in MDM projects. 
(WHITE PAPER) READ ABSTRACT |

Databases at Risk: Current State of Database Security (Enterprise Strategy Group) by IBM

September 2009 - (Free Research)
This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise. 
(ANALYST BRIEF) READ ABSTRACT |

Hybrid Integration Analyst Report by Red Hat

February 2014 - (Free Research)
In this report from Forrester Research, compare the top 14 hybrid integration vendors including Dell, IBM, Red Hat, and others against 51 criteria. 
(ANALYST REPORT) READ ABSTRACT |

Smart Process Applications Evaluation, Q2 2013 by OpenText

April 2013 - (Free Research)
This Forrester Wave report aims to help CIOs find the right smart process app vendor partners for improving this full spectrum of human-based processes. Read today to explore Forrester's key takeaways after conducting a 15-criteria evaluation of twelve software vendors. 
(WHITE PAPER) READ ABSTRACT |

Frost & Sullivan – 2013 Global VC Technology Leadership Award by Vidyo, Inc.

December 2012 - (Free Research)
This Frost & Sullivan research paper details why Vidyo was awarded their Technology Leadership award in the videoconferencing market and how the solution meets today's top VC benchmarks. 
(WHITE PAPER) READ ABSTRACT |

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints by Sunbelt Software

July 2009 - (Free Research)
Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution. 
(WHITE PAPER) READ ABSTRACT |

IT Handbook: Energy Efficient Cooling by SearchDataCenter.com

August 2011 - (Free Research)
This expert handbook explains how to set up a data center cooling monitoring system, looks at how increasing server inlet temperatures can optimize cooling efficiency and outlines methods for building hot-aisle/cold-aisle containment systems. 
(EBOOK) READ ABSTRACT |

Not Small Change: World-class Financial Automation Delivers Dramatic Benefits (BusinessWeek Research Services) by SAP America, Inc.

March 2009 - (Free Research)
This white paper by BusinessWeek and SAP discusses how replacing manual and disjointed financial processes with an enterprise wide system cuts costs and improves operational performance. Automated financial value chains can reduce costs by up to 45 percent and improve productivity by up to 50 percent. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions by Sunbelt Software

August 2009 - (Free Research)
In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Energy Efficient Cooling: IT Handbook by APC by Schneider Electric

April 2010 - (Free Research)
In this e-book, you'll learn about setting up a cooling monitoring system, optimizing data center cooling efficiency, using hot aisle/ cold aisle containment systems, and economizer selection and implementation. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Mission Critical Computing In NextGen Data Centers by PC Connection in partnership with HP ThinClient

November 2009 - (Free Research)
Read this transcript of the "Mission Critical Computing" webcast to learn about changing trends in the data center infrastructure. Discover tools to ensure high availability at a low cost to improve IT performance and find out more about innovations to data center operations to help you remain competitive. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Monash University Video Testimonial by Concur Technologies (E-mail this company)

June 2014 - (Free Research)
Check out the following webcast to see just how Monash University was able to gain substantial benefits by revamping their records management solution. 
(VIDEO) READ ABSTRACT |

The Forrester Wave: Requirements Management, Q2 2008 by Hewlett-Packard Company

March 2009 - (Free Research)
In Forrester's 79-criteria evaluation of requirements management tools vendors, five standalone requirements management tools and four application life-cycle management (ALM) solutions that include requirements management capabilities went head-to-head. Read this research paper to see how each one fared. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts