Methods Reports CaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Methods Reports Case returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Business Process Management (BPM)
 •   Storage Security
 •   Virtualization
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Network Security
 •   Data Security

Related Searches
 •   Decision Methods Reports
 •   Desktops Methods Reports
 •   Latest Methods Reports Case
 •   Methods Protocol
 •   Methods Reports Case Office
 •   Methods Reports Case Organizational
 •   Methods Reports Screen
 •   Methods Reports Time
 •   Provider Methods Reports
 •   Web Casts Methods
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Analyst Report: Case Management Automation - Facilitating Compliance by EMC Corporation

September 30, 2010 - (Free Research)
Read this white paper to learn about the compliance implications of case-based process automaiton. 
(WHITE PAPER) READ ABSTRACT |

Building Your Business Case for Managed File Transfer by OpenText

November 11, 2011 - (Free Research)
The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing. 
(WHITE PAPER) READ ABSTRACT |

Building Your Business Case for Managed File Transfer by OpenText

October 17, 2013 - (Free Research)
This whitepaper details the benefits of managed file transfers and how to build an effective business case for implementation. 
(WHITE PAPER) READ ABSTRACT |

State of Agile Development Survey 2008 by VersionOne Inc.

September 2008 - (Free Research)
This white paper highlights the results of a third annual industry survey regarding the state of agile development. Gain insight into the status of organizations currently implementing or practicing agile methods. 
(DATA SHEET) READ ABSTRACT |

DevOps for a New Millennium: A Lifecycle Perspective Supporting Business Growth in an Altered Economy by OpTier (E-mail this company)

April 2013 - (Free Research)
This comprehensive research report examines the current state of DevOps and Agile methods in today's IT environment. Explore the modern, collaborative role of DevOps, compare technologies from top DevOps vendors, and check out real-world case studies of DevOps implementations. 
(WHITE PAPER) READ ABSTRACT |

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

Modelling the Insurance Enterprise by ComputerWeekly.com

February 2013 - (Free Research)
This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Introducing a Capacity Management Maturity Model by TeamQuest Corporation (E-mail this company)

October 2011 - (Free Research)
As greater demands are placed on IT for efficiency and productivity, it is becoming more important for IT organizations to adopt more sophisticated business process management methods. Learn about a capacity management approach that allows IT to plan for improved services. 
(WHITE PAPER) READ ABSTRACT |

Thomas & King Case Study: The Right Ingredients for Software Asset Management by Dell, Inc. and Intel®

October 2008 - (Free Research)
Read this Dell case study to learn how a restaurant franchisee gets its IT cooking with the right reporting from Dell Software Inventory & Usage Management. 
(CASE STUDY) READ ABSTRACT |

Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS by SAS

May 2014 - (Free Research)
The following digital book, Text Mining and Analysis Practical Methods, Examples, and Case Studies Using SAS, provides the reader with a solid foundation to successfully leverage text analytics. Understand core components, strategies, and much more. 
(BOOK) READ ABSTRACT |

E-Guide: Are 'strong authentication' methods strong enough for compliance? by SearchSecurity.com

September 2011 - (Free Research)
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance. 
(EGUIDE) READ ABSTRACT |

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises by Global Knowledge

October 2008 - (Free Research)
This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Wave Methodology- A Practical Guide to Defining Roles for Access Control by Oracle Corporation

June 2011 - (Free Research)
As the number and type of users who require access to organizations’ computer-based resources increase, the traditional method of managing user access on a case-by-case basis has quickly become antiquated. This paper explores a 7-step process which has proven to be an effective method for administrators to identify user roles for access control. 
(WHITE PAPER) READ ABSTRACT |

Air-Cooled High-Performance Data Centers: Case Studies and Best Methods by Intel Corporation

November 2006 - (Free Research)
Combining innovations and best-known methods for air-cooled data center design helps provide new approaches for power and cooling. This white paper discusses real world examples of how to lower costs and improve performance within the IT infras... 
(WHITE PAPER)

Automating Tax and Statutory Reporting Processes by IBM

November 2013 - (Free Research)
This video explains a method organizations can adopt in order to provide consistency and automation to their tax and statutory reporting. 
(VIDEO) READ ABSTRACT |

Improve Agile efforts: Benchmarks and guidelines by IBM

June 2013 - (Free Research)
Agile methods are no longer just for small software development teams -- organizations of all sizes are quickly adopting these strategies to achieve success with project portfolios. In this comprehensive report, explore the results of an Agile maturity survey of various types of organizations and projects 
(WHITE PAPER) READ ABSTRACT |

TrendLabs: Global Threat Trends 1H 2010 by Trend Micro, Inc.

October 2010 - (Free Research)
In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world. 
(WHITE PAPER) READ ABSTRACT |

Controlling Wireless Costs with any Connection Reporting: Supporting Three Dimensions of Mobile Intelligence by Fiberlink Communications

March 2010 - (Free Research)
In this white paper we will provide a general overview of Any Connection Reporting. We will then look at specific applications of this technology and see how organizations can use it to solve problems 3G, connectivity plans and so much more. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Unix-to-Linux Migration: A step-by-step approach for data center managers that covers everything from making the business case to getting the best training by Red Hat & IBM

December 2010 - (Free Research)
When migrating from  Unix to Linux, the most important case you will need to make is not a technical case but a business case. It’s all about the bottom line. How will the business benefit by moving over? What is the total cost of ownership and return on investment for the migration? Read on to learn more! 
(EBOOK)

Application Delivery Controller Performance Report by F5 Networks

January 2007 - (Free Research)
This report documents the performance of the top Application Delivery Controllers offered by F5 Networks, Cisco Systems, and Citrix Netscaler. Through the development and implementation of robust and reproducible testing methods, F5 demonst... 
(WHITE PAPER) READ ABSTRACT |

esXpress™ and DXi-Series Make Quantum A One-Stop Shop for VMware ESX Data Protection – A DCIG Analyst Report by Quantum Corporation

February 2010 - (Free Research)
As organizations begin implementing server virtualization, it is critical that they consider the fact that backup and data protection processes will need to be done differently and may become more complicated. This DCIG analyst report discusses methods of effectively protecting data in virtual environments and the different solutions available. 
(ANALYST REPORT) READ ABSTRACT |

DCIG Analyst Report: esXpress™ and DXi-Series Make Quantum A One-Stop Shop for VMware ESX Data Protection by Quantum Corporation

February 2010 - (Free Research)
As organizations begin implementing server virtualization, it is critical that they consider the fact that backup and data protection processes will need to be done differently and may become more complicated. This DCIG analyst report discusses methods of effectively protecting data in virtual environments and the different solutions available. 
(ANALYST REPORT) READ ABSTRACT |

Securing Sensitive Information: An Examination of Information Security Issues, Methods and Securing Data With LTO-4 Tape Drive Encryption by Hewlett-Packard Company

July 2009 - (Free Research)
Each month many companies, big or small, well known or unknown, experience a data security loss with the potential exposure of thousands to millions of sensitive customer or employee records. This brief examines cryptographic methods, specifically tape data encryption, to combat such security losses. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts