Methods Government SubWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Methods Government Sub returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Enterprise Information Integration/ Metadata Management
 •   Data Center Management
 •   Enterprise Systems Management
 •   Application Management and Maintenance
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Storage Security
 •   Data Security
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Codes Methods
 •   Forms Methods Government
 •   Info Methods Government Sub
 •   Methods Automation
 •   Methods Government Device
 •   Methods Government Product
 •   Methods Government Sub Spreadsheet
 •   Methods Java
 •   Methods Sheets
 •   Methods Technologies
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Object Persistence and Agile Software Development by Versant Corp.

December 01, 2009 - (Free Research)
Agile Software Development is one of the most effective methodologies to develop application software. This paper examines and compares RDBMS with several object persistence methods within the context of Agile Software Development by quantifying the impact of these methods on the velocity and success of an agile application development project. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

California Institute for Telecommunications and Information Technology (Calit2) Uses Kognitio WX2 for CAMERA Project by Kognitio

July 2007 - (Free Research)
In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data. 
(CASE STUDY) READ ABSTRACT |

Updating Rules for COBOL Generated Code to Use CICS Channels and Containers by IBM

December 2010 - (Free Research)
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM Redpaper™ publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: New Wave of Automated Tiering Software Eases Migration, Adds Control by Dell Compellent

May 2011 - (Free Research)
In this tutorial on automated tiering, we outline the sub-LUN offerings the major storage vendors are promoting alongside their SSD options. We also explore five questions users need to consider as they evaluate sub-LUN tiering options, and more. 
(EGUIDE) READ ABSTRACT |

How to Profit in a Downturn: 4 Customer-centric Strategies for Growth in a Challenging Market by Pivotal CRM, a CDC Software solution

February 2009 - (Free Research)
In this white paper, learn how your organization can use customer-centric strategies and CRM tools to maximize the value and loyalty of your customer base. Gain insight into new areas of opportunity and do more with less in a time of economic uncertainty. 
(WHITE PAPER) READ ABSTRACT |

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

Creating Order from Chaos in Data Centers and Server Rooms by Schneider Electric

October 2011 - (Free Research)
This white paper details effective methods for eliminating data center clutter to ease management. 
(WHITE PAPER) READ ABSTRACT |

Risk Management and Product Delivery in Consumer Lending by ILOG, an IBM Company

September 2008 - (Free Research)
Amid the ongoing impact of the sub-prime meltdown and the ensuing credit crunch, lenders are facing a much tougher market than has been seen for some time. Business Rules Management Systems (BRMS) can enhance risk management, lending process streamlining and flexibility. 
(WHITE PAPER) READ ABSTRACT |

Creating Order from Chaos in Data Centers and Server Rooms by APC by Schneider Electric

February 2009 - (Free Research)
Data center professionals can rid themselves of messy racks, sub-standard under floor air distribution, and cable sprawl with a minimum of heartache and expense. This paper outlines several innovative approaches for dealing with the symptoms of chaos and for eliminating the root causes of disorder. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine by SearchSecurity.com

October 2013 - (Free Research)
Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change. 
(EZINE) READ ABSTRACT |

Beyond VoIP: Enterprise Perspectives on Migrating to Multi-modal Communications and Wireless Mobility by Avaya Inc.

July 2008 - (Free Research)
As per this report the industry providers are already delivering the new piece parts for such convergence, although new standards are still evolving to enable maximum interoperability across converged telecommunication infrastructures. 
(WHITE PAPER) READ ABSTRACT |

Reduce the Effects of Latent Connections for Remote Users by Dell and Microsoft

June 2014 - (Free Research)
In this video, experts explain how Quest EOP Xtream (a component of Quest vWorkspace and a sub-feature of vWorkspace EOP) eliminates barriers that latency induces on RDP sessions for VDI or Terminal Server/Session Host and eliminates the perceived lag that exists when latency goes higher than 30ms (the threshold where RDP becomes less responsive). 
(VIDEO) READ ABSTRACT |

Sybase IQ , A Competitive Analysis by Sybase, an SAP company

October 2010 - (Free Research)
This paper, intended for both IT and operational management, explores a series of high-level best practices for analytics and data warehousing based on Sybase’s experience with successful implementations. Suggestions are provided in three categories: performance, cost control, and ease-of-deployment with each dimension broken down into sub-topics. 
(WHITE PAPER) READ ABSTRACT |

Special Report: Tiered Data Storage Strategies for Your IT Shop by Dell Compellent

August 2011 - (Free Research)
Check out this SearchStorage.com Special Report to learn everything storage tiering as it outlines four different options including dynamic storage tiering, sub-LUN tiering, data migration in tiering and auto-tiering. 
(EGUIDE) READ ABSTRACT |

Guide to Improving Your Tape Storage Practices by Iron Mountain

May 2011 - (Free Research)
Proper security of data backups doesn’t just happen. It requires thoughtful planning and careful controls. Given the implications of failure – reputational damage, direct costs, compliance issues, and sub-optimal business operations - companies owe it to themselves to take data backup security seriously. 
(WHITE PAPER) READ ABSTRACT |

ESG: Nexsan’s Flexible Storage System by Nexsan

September 2011 - (Free Research)
Although it’s a commonly used term, "midmarket" has no standard definition; however, it can usefully be given some specific context and parameters if looked at from the perspective of some common attributes that exist within and across its three sub-tiers: the bottom, middle, and top. 
(WHITE PAPER) READ ABSTRACT |

FAQ Guide: Data Deduplication and Compression on Primary Storage Can Reduce Data Footprint by CommVault Systems, Inc.

August 2011 - (Free Research)
Dave Russell, a research vice president at Gartner, discusses the current techniques for data reduction on primary storage, from standard compression to file- and sub-file deduplication, to a combination of deduplication and compression. He also outlines the emerging approaches that users may find more prevalent in the future. 
(EGUIDE) READ ABSTRACT |

The IBM Data Governance Unified Process: Driving Business Value with IBM Software and Best Practices Book (Sunil Soares) by IBM

March 2011 - (Free Research)
This 150 page book by Sunil Soares provides a practical set of detailed steps and sub-steps to implement an Information Governance program, as well as the associated automation provided by IBM Software. 
(BOOK) READ ABSTRACT |

Consolidating Applications with Oracle Solaris Containers by Oracle Corporation

May 2010 - (Free Research)
Oracle Solaris Containers implement OS virtualization using containers that are designed to provide a complete, isolated, secure runtime environment for applications—and in situations where resources can be managed with sub-CPU granularity. 
(WHITE PAPER) READ ABSTRACT |

Avaya IP Office Release 6: Small Office Deployment & TCO vs. ShoreTel IP Phone System by Avaya

September 2011 - (Free Research)
Read this white paper for a comparison of Avaya's IP Office and ShoreTel’s IP Phone System. Then discover how Avaya IP Office uses a scalable system that minimizes power consumption and avoids the need for a dedicated Windows server system in sub-20 person offices. 
(WHITE PAPER) READ ABSTRACT |

Can Your Data Center Infrastructure Handle the Heat of High Density by CyrusOne

August 2008 - (Free Research)
High density computing is today's standard in best-in-class performance and availability, and those that fail to keep pace or fall behind will find themselves no longer competitive in today's markets. 
(ANALYST REPORT) READ ABSTRACT |

5 Levels of Agile Planning: From Enterprise Product Vision to Team Stand-up by Rally Software

August 2008 - (Free Research)
Existing agile methods often focus on small, single-team projects, overlooking the broader impact of large programs. This paper outlines a distinct planning framework that has been successful in large-scale agile software development projects and relies.. 
(WHITE PAPER) READ ABSTRACT |

Locating Rogue 802.11n and Legacy Wireless Access Points by Fluke Networks

July 1967 - (Free Research)
Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security. 
(WHITE PAPER)

Computer Weekly - 8 May 2012: The changing face of retail IT by ComputerWeekly.com

May 2012 - (Free Research)
In this week’s Computer Weekly, we look at the IT challenges facing retailers, as consumers turn increasingly to web and mobile shopping channels. Oracle president Mark Hurd talks about how the supplier intends to simplify IT infrastructures. And new government CIO Andy Nelson discusses how he plans to transform Whitehall IT. Read the issue now. 
(EZINE)

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts