Measured ComputingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measured Computing returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Wireless Technologies and Mobile Computing
 •   Virtualization
 •   Mobile Device Management
 •   Security Monitoring
 •   Network Security
 •   Application Security
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Application Management and Maintenance

Related Searches
 •   Communication Measured Computing
 •   Conferencing Measured Computing
 •   Conversion Measured
 •   Measured Computing Configurations
 •   Measured Computing National
 •   Measured Computing Template
 •   Procedures Measured Computing
 •   Strategy Measured Computing
 •   Summary Measured
 •   Us Measured Computing
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Security - Three Necessary Security Measures to Empower Data Center Transformation by Cisco Systems, Inc.

July 12, 2013 - (Free Research)
Access this informative white paper that presents three must-have security measures to empower data center transformation to virtualization and the cloud. 
(WHITE PAPER) READ ABSTRACT |

Security in Public and Private Cloud Infrastructures by Joyent

August 12, 2010 - (Free Research)
This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques. 
(WHITE PAPER) READ ABSTRACT |

Reduce the Cost and Complexity of Multi-sourced IT Environments by Hewlett-Packard Company

May 09, 2012 - (Free Research)
Public, private and hybrid cloud services have made it increasingly difficult for IT organizations to govern and manage IT services— at the same time that businesses are demanding greater agility and faster delivery from IT. View this webcast to learn how to rein in this supplier sprawl to improve service quality and reduce costs and risks. 
(WEBCAST) READ ABSTRACT |

CW+: How to build, secure, manage and measure IT workloads by ComputerWeekly.com

January 05, 2011 - (Free Research)
Computing infrastructure today is highly versatile and this has many benefits for businesses. Unfortunately, it also has downsides; use that infrastructure unintelligently and costs can get out of control. 
(WHITE PAPER) READ ABSTRACT |

Retail’s Mobility Imperative: A Measured Approach to the Emerging Channel by BlackBerry

July 27, 2010 - (Free Research)
This study examines what's driving retailers' mobile strategies, where they're focusing their time and money, and how they plan to measure their performance. In addition, view results of an exclusive survey of more than 300 executives at top U.S. retailers. Continue reading to learn more! 
(ANALYST REPORT) READ ABSTRACT |

Optimizing Virtualization Success with Facts and Transparency by BDNA

April 2008 - (Free Research)
Virtualization initiatives can struggle without transparency into the complex IT environment. By establishing a trusted fact base of IT assets, both physical and virtual, IT can measure and manage virtualization initiatives. 
(WHITE PAPER) READ ABSTRACT |

Tackling Today's Data Center Energy Efficiency Challenges - A Software-Oriented Approach by Square D Critical Power Competency Center

May 2007 - (Free Research)
Get an overview of a software-based approach to effectively measuring, monitoring and managing data center energy consumption. 
(WHITE PAPER) READ ABSTRACT |

Three Must-Have Security Measures to Empower Data Centre Transformation by Cisco (E-mail this company)

July 2013 - (Free Research)
As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning. 
(WHITE PAPER)

Using the iPad in health care: How does it measure up? by Aerohive Networks

June 2011 - (Free Research)
Many organizations would like to incorporate the Apple iPad into business processes, but is it a good idea for healthcare environments? Inside this expert e-guide, learn about the pros and cons of the iPad and whether or not hospital networks can support it. 
(EGUIDE) READ ABSTRACT |

Virtual Data Center E-Zine:Volume 32: Public vs. Private: Comparing Cloud Architectures by Thawte Inc.

February 2012 - (Free Research)
In this e-zine, compare the trade-offs of private and public cloud computing. Find out how you can measure, monitor and optimize the performance of applications in the cloud. Plus, learn how you can develop a solid plan for virtualizing your applications. 
(EZINE)

MDM features vs. native mobile security by Websense, Inc.

April 2012 - (Free Research)
When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each. 
(EGUIDE) READ ABSTRACT |

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption by Aladdin Knowledge Systems

August 2008 - (Free Research)
Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualized Environments and Accelerating Cloud Computing by CA Technologies.

June 2010 - (Free Research)
There is no question that virtualization offers compelling tangible benefits for an IT organization. Virtualization is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualization security, the CA Technologies Access Control (AC) solution, and how to accelerate cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions by Hewlett-Packard Company

January 2014 - (Free Research)
This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Technology, innovation and change: the IT department's view by ComputerWeekly.com

November 2013 - (Free Research)
This exclusive report, based on a survey of UK IT professionals, assesses how CIOs and IT departments are adapting to the challenges of innovation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Securing Virtualised Environments and Accelerating Cloud Computing by CA Technologies

May 2010 - (Free Research)
There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Business in the Cloud: Will Your Internet Connectivity Provide a Positive ROI? by Internap Network Services

April 2010 - (Free Research)
Using a simple Return on Investment (ROI) approach, enterprises can quantify the value of best-in-class connectivity. What are the tangible financial drawbacks when you experience outages or latency? How do you measure your risk and then mitigate it? This paper addresses all the factors associated with being able to calculate your own ROI. 
(WHITE PAPER) READ ABSTRACT |

End-user Experience Monitoring by Nimsoft, Inc.

February 2012 - (Free Research)
What exactly is End-user Monitoring (EUM) and why should businesses care? In this resource, discover why it's increasingly important to assess system performance from the end-user perspective in the age of IT as a service, and how you can effectively measure and quantify end-user experiences. 
(WHITE PAPER) READ ABSTRACT |

Secure Smartphone Apps: The Next Generation by BlackBerry

April 2010 - (Free Research)
The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take. 
(WHITE PAPER) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms by Intel

May 2011 - (Free Research)
Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Enterprise Linux: The Original Cloud Operating System by Red Hat

September 2013 - (Free Research)
This whitepaper will help you understand how Linux, unlike competing OSes, is the natural fit for cloud computing. 
(WHITE PAPER) READ ABSTRACT |

SANS Analyst Report: The Risks with Mobility and BYOD by Hewlett-Packard Limited

March 2012 - (Free Research)
Businesses are migrating to a more mobile environment. Individuals use mobile apps and devices are used for both personal and business reasons. With today's workforce relying on mobility and apps, they can create a riskier environment for valuable information. 
(WHITE PAPER) READ ABSTRACT |

Measuring Community Health with Indicee Analytics by Indicee

March 2014 - (Free Research)
The e-book provides examples of what to measure to ensure healthy, engaged communities, and how to measure it using analytics. Also included is a re-cap of the location for the full framework. 
(EBOOK) READ ABSTRACT |

Inside Data Center Power by SearchDataCenter.com

July 2013 - (Free Research)
The world of IT may be changing rapidly, but every data center still needs power. Improve your data center's energy efficiency with updates to power usage measurement, cooling and electrical design. 
(EBOOK) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts