Manufacturer What YouWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Manufacturer What You returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Resource Planning (ERP)
 •   Virtualization
 •   Manufacturing Solutions (Integrated)
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Intelligence Solutions
 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Lean Manufacturing
 •   Data Security

Related Searches
 •   Functions Manufacturer What You
 •   Information About Manufacturer What You
 •   Manufacturer Creation
 •   Manufacturer Function
 •   Manufacturer What Check
 •   Manufacturer What Plan
 •   Manufacturer What Screen
 •   Migration Manufacturer What
 •   Open Manufacturer
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 19, 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 11, 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

What You Need to Know about Cloud Backup: 10 FAQs Answered by Asigra

June 12, 2013 - (Free Research)
This white paper discusses the ten most common questions that companies are asking about cloud backup. 
(WHITE PAPER) READ ABSTRACT |

The ABCs of CDP: What you need to know by FalconStor Software

June 17, 2011 - (Free Research)
The Storage Networking Industry Association (SNIA) defines CDP as "a class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time." In part two of this tutorial on continuous data protection backup, learn how CDP is being used today, and about the latest CDP products. 
(EGUIDE) READ ABSTRACT |

What You Need to Know Now About CEP and BAM by SearchSOA.com

July 18, 2013 - (Free Research)
Complex event processing (CEP) and business activity monitoring (BAM) are popular tools for managing information that moves faster -- and in higher volumes -- than ever before. 
(EGUIDE) READ ABSTRACT |

SAP predictive analysis: What you need to know by HP

August 27, 2013 - (Free Research)
Read on to find details about SAPs BusinessObjects Predictive Analysis, including how the NBA used HANA to help cater to stat-hungry fans. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Unified Approach to Managing the Virtual Environment by Forsythe

December 04, 2009 - (Free Research)
In this presentation transcript, learn about a unified approach to IT management. Discover how to decrease complexity introduced by virtualization and cloud computing to ensure optimal performance of your virtual and physical environments. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Look Before You Leap: SharePoint Planning and Training Tips by Dell, Inc. and Intel®

December 09, 2013 - (Free Research)
Consult this expert e-guide to uncover what you need to know before making the upgrade to the newest version of SharePoint. Discover how to prepare and what it is exactly that you need to plan out before implementation. 
(WHITE PAPER) READ ABSTRACT |

Seven Things That You Can Do If You Want to Embrace the Consumerization of IT by Good Technology

March 14, 2012 - (Free Research)
Discover what you can do to embrace the consumerization of IT, letting your employees pick devices and applications of their choice while maintaining the security your organization needs. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 31, 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Best practices for building a cloud computing infrastructure by SAVVIS

September 12, 2011 - (Free Research)
This e-guide takes a close look at what you need to know about building a cloud computing infrastructure to serve dual purposes and top recommendations to get started. Uncover the key to successful cloud computing infrastructure, best practices to build a private cloud and things you should know about the cloud before you begin. 
(EGUIDE) READ ABSTRACT |

Buying Guide: Virtualization Management Tools by SearchServerVirtualization

January 10, 2012 - (Free Research)
Virtualization management has evolved significantly as products mature and IT shops become more savvy. This expert buying guide explores third-party tools in five key areas of virtualization management. Gain insights on what you should consider, whether you're a first-time purchaser or looking to upgrade. 
(EGUIDE) READ ABSTRACT |

Expert guide: Understanding cloud types and benefits by SAVVIS

September 09, 2011 - (Free Research)
This e-guide provides the answers to the most pressing questions in regards to cloud computing. Uncover what you need to know about cloud computing services, the different types of clouds available, top benefits and how to take full advantage and more. 
(EGUIDE) READ ABSTRACT |

How Are DDoS Attacks Evolving? by Neustar®

May 05, 2014 - (Free Research)
This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against. 
(WHITE PAPER) READ ABSTRACT |

7 Secrets to Desktop Virtualization Project Success by SearchDataCenter.com

August 17, 2011 - (Free Research)
In this video, industry experts Brian Madden and Gabe Knuth detail the 'secrets' you need to keep in mind when planning a desktop virtualization project. 
(VIDEO) READ ABSTRACT |

Five Reasons to Make the Move to a Converged Infrastructure by Dell, Inc. and Intel®

September 04, 2012 - (Free Research)
This white paper presents five reasons why you can't wait to make the move to a converged infrastructure in your data center. 
(WHITE PAPER) READ ABSTRACT |

How to Get Lean with Automated Process Discovery - Live demonstration and case study presentation by Fujitsu America, Inc.

March 23, 2010 - (Free Research)
The biggest challenge to improving the efficiency of your business processes often lies in knowing how these processes really work in your organization. This webcast will teach you how to visualize and analyze your business processes from historical data, expose process waste and apply lean initiatives to achieve significant value. 
(WEBCAST) READ ABSTRACT |

Securely Outsourcing to the Cloud: Five Key Questions to Ask by CA Technologies.

July 31, 2012 - (Free Research)
This informative white paper outlines your security options when adopting cloud services. Discover how Identity and Access Management (IAM) can help you foster a secure cloud environment and learn how you can choose the right third-party outsourcer by clicking through to learn more. 
(WHITE PAPER) READ ABSTRACT |

BC/DR for Virtualized Environments by SearchServerVirtualization

April 02, 2013 - (Free Research)
This expert handbook presents key tips for putting the pieces together to develop a strategy to make the most out of next-generation virtualization technology. 
(EBOOK) READ ABSTRACT |

Bringing virtualized storage intelligence to converged infrastructure by Dell, Inc. and Intel®

November 30, 0002 - (Free Research)
Access this exclusive source to learn what your business needs to get the full benefits out of bringing virtualized storage intelligence to converged infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Speech Recognition for EHR Meaningful Use by Nuance

March 10, 2014 - (Free Research)
This brief video shows how one medical organization was able to utilize a solution that blends point-and-click together with a review of systems, physical exams, reason for visit, and more to get the most out of their electronic health records. 
(VIDEO) READ ABSTRACT |

Presentation Transcript: Why VDI projects fail. A conversation between Brian Madden & Steve O'Donnell by GreenBytes

May 20, 2013 - (Free Research)
In this informative transcript, virtualization expert Brian Madden examines the reasons why so many desktop virtualization projects end up failing, discussing the common mistakes made and the key factors that can ensure success. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Why, When and How of IT Convergence by Dell, Inc. and Intel®

October 01, 2012 - (Free Research)
Access this exclusive source to learn why and how IT convergence can benefit your business. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-guide: Best Practices to Get Started with Desktop Virtualization by Dell, Inc. and Intel®

June 06, 2013 - (Free Research)
This expert guide from SearchVirtualDesktop.com examines the 4 most common desktop virtualization use cases and details what you can expect from each case so that you have a better idea of what direction your project should go in. 
(EGUIDE) READ ABSTRACT |

What's New with Dell PowerEdge 12th Generation Servers? by Dell, Inc. and Intel®

May 31, 2012 - (Free Research)
Take a look at this in-depth resource to find out what you need to know about the next generation servers and how you can successfully transition to this latest technology. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts