Measures List ProfessionalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measures List Professional returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Virtualization
 •   Mobile Device Management
 •   Application Security
 •   Business Intelligence Solutions
 •   Application Management and Maintenance
 •   Data Center Management
 •   Social Networks and Community Management
 •   Wireless Security

Related Searches
 •   Measures List Communication
 •   Measures List Firm
 •   Measures List Louisiana
 •   Measures List North Carolina
 •   Reports Measures
 •   Reseller Measures List Professional
 •   Risks Measures
 •   Server Measures List
 •   Standard Measures
 •   White Paper Measures
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Big Data and Content Analytics: measuring the ROI by ComputerWeekly.com

December 19, 2013 - (Free Research)
Early adopters of big data analytics are achieving good results that are helping to drive decision making in the business, this independent research by AIIM reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 27 November 2012: Announcing the most influential people in UK IT by ComputerWeekly.com

November 27, 2012 - (Free Research)
In this week's Computer Weekly, we reveal our annual UKtech50 list of the 50 most influential people in UK IT, and interview the winner, Warren East, CEO of chip design firm ARM. Also in this issue, we conclude our buyer's guide to infrastructure as a service with an in-depth analysis of Microsoft's Azure cloud platform. Read the issue now. 
(EZINE) READ ABSTRACT |

IBM's Approach to Advanced Persistent Threats by IBM

August 02, 2012 - (Free Research)
Access this video to learn more about advanced persistent threats (APTs) and how to address them. Topics covered the nature of APTs, preventative measures to take, and how professionals are addressing this challenge. 
(VIDEO) READ ABSTRACT |

The EMA All-Stars in Enterprise Systems Management for 2008 by CA Technologies.

March 2008 - (Free Research)
Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines. 
(WHITE PAPER) READ ABSTRACT |

How to measure successful internal talent mobility by Oracle Corporation

October 2013 - (Free Research)
This resource reveals everything HR professionals, IT professionals, and business leaders need to know about internal talent mobility. With a strong internal mobility program, you can leverage your existing employee base to achieve corporate goals, shifting resources where they're best suited while keeping your employees engaged and content. 
(WHITE PAPER) READ ABSTRACT |

MarketScope for E-Discovery Software Product Vendors by Clearwell Systems

December 2009 - (Free Research)
Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs. 
(WHITE PAPER) READ ABSTRACT |

Test Management: Measuring Quality in the Agile Enterprise by Micro Focus

July 2012 - (Free Research)
The methods of measuring software quality in an agile environment are drastically different from tactics used in traditional IT landscapes. Discover why the "plan the work, then work the plan" technique doesn't work with agile IT, the 10 agile metrics you should be tracking, 3 questions to help determine when to start tracking defects, and more. 
(EBOOK)

The Eight Truths of Social Learning. Now. by SkillSoft Corporation

June 2011 - (Free Research)
This paper seeks to uncover the fundamental requirements for a successful social learning program. Based on early experience with our own social learning tool, this list of eight “truths” has been compiled to provide a foundation for learning professionals who are launching social learning in their organizations. 
(WHITE PAPER) READ ABSTRACT |

Exploring Business and IT Friction: Myths and Realities by BMC Software, Inc.

April 2013 - (Free Research)
This whitepaper explores the sources of friction between business users and IT and offers up recommendations on how to adjust your strategy to minimize these problems. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance by Skybox Security

October 2009 - (Free Research)
PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

Technology, innovation and change: the IT department's view by ComputerWeekly.com

November 2013 - (Free Research)
This exclusive report, based on a survey of UK IT professionals, assesses how CIOs and IT departments are adapting to the challenges of innovation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

IBM Social Analytics: The science behind social media marketing by IBM

December 2011 - (Free Research)
Access this white paper to learn how savvy marketing professionals are using new technologies to learn about their customers' attitudes, preferences and buying habits from what they say publically, available on social media and through the full range of interactions that can be recorded, measured, and analyzed. 
(WHITE PAPER) READ ABSTRACT |

10 Hot Skills for 2009 by Global Knowledge

May 2009 - (Free Research)
With spending on cost-saving technologies such as virtualization rising, and the maintenance of networking and enterprise Microsoft software keeping IT professionals constantly in demand, here's our top 10 hot skills that will take us from a down economy and beyond. 
(WHITE PAPER) READ ABSTRACT |

Safe, Realistic Test Data: The Case for RowGen by Innovative Routines International, Inc.

March 2008 - (Free Research)
RowGen provides a cost-effective alternative to the practice of production data replication. This is accomplished by providing data content that requires no additional security measures. 
(WHITE PAPER) READ ABSTRACT |

Sales 2.0: Tap Into Social Media to Drive Enterprise Sales Results by InsideView

August 2009 - (Free Research)
Read this paper to learn how Sales 2.0 technology helps sales identify the right opportunities at the right time and determine the right people to contact. Also learn how this unique approach enables sales and marketing collaboration to drive productivity and close more deals in this increasingly connected world. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Strategy Group (ESG) Report: Today's Information Access Requirements Outpace Open Source Search Options by Attivio, Inc.

March 2010 - (Free Research)
This paper examines the new information access functionality and administrative requirements - including enterprise concerns for scalability, high availability, and fault tolerance - while measuring the ability of current open source alternatives to meet these demands. This report also explores the financial aspects of open source search adoption. 
(ANALYST REPORT) READ ABSTRACT |

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by Sophos, Inc.

June 2009 - (Free Research)
Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption. 
(WHITE PAPER) READ ABSTRACT |

DDoS Mitigation and DNS Availability: Key Components of Your Resiliency Strategy by Verisign, Inc.

December 2013 - (Free Research)
This white paper provides enterprises with a list of recommendations for ensuring resiliency and minimizing risk in the event of a DDoS or DNS attack. 
(WHITE PAPER) READ ABSTRACT |

Survey insights: Marketing's impact on the customer experience by IBM

August 2013 - (Free Research)
To understand the impact of marketing management on business outcomes, IBM surveyed more than 500 professionals across fifteen industries. In this paper, explore insights from the IBM State of Marketing 2013 survey to better understand how to measure the correlation between marketing sophistication and financial performance. 
(WHITE PAPER) READ ABSTRACT |

Migrate From Unix To Linux In Six Steps by Red Hat and JBoss

August 2009 - (Free Research)
CIOs are increasingly aware that the Linux® platform offers a low-risk, robust, and value-for-money alternative to traditional UNIX® platforms. This whitepaper will list and describe a simple, six-step process for migrating from UNIX to Linux. 
(WHITE PAPER) READ ABSTRACT |

Storage Budget Picture Brightens by IBM

December 2012 - (Free Research)
This expert E-Guide provides a thorough analysis of the latest statistics concerning storage spending and use of technologies including SSD, cloud computing, archiving, and more. Read now to find out which storage efficiency tools are gaining the most traction and discover the top products your peers are putting on their wish lists. 
(EGUIDE) READ ABSTRACT |

How iPads Enter the Workforce by Citrix

February 2011 - (Free Research)
Who could have imagined that a tablet would capture the imagination of employees and IT alike? But the iPad did, and it’s kicked off an arms race for smart mobile devices. This report introduces a simple framework to guide content and collaboration professionals through employee-fueled tablet scenarios and IT-led tablet projects. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts