Multiple ActivitiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Multiple Activities returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Business Activity Monitoring (BAM)
 •   Business Intelligence Solutions
 •   Data Security
 •   Databases
 •   Enterprise Systems Management
 •   Security Monitoring
 •   Business Planning
 •   Enterprise Information Integration/ Metadata Management
 •   Security Policies

Related Searches
 •   Articles About Multiple Activities
 •   Automated Multiple Activities
 •   Content Multiple Activities
 •   Evaluation Multiple
 •   Multiple Activities Basics
 •   Multiple Activities Communication
 •   Multiple Activities Conversions
 •   Multiple Activities Mac
 •   Multiple Activities White Paper
 •   Supply Multiple Activities
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Voice over IP Networks: Ensuring Quality through Proactive Link Management by Elfiq Networks

April 2008 - (Free Research)
Voice over IP (VoIP) networks offer clear advantages over traditional telephony technologies (PSTN) making it a choice that many organizations are making and migrating their systems to. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Effectively Managing Enterprise Wi-Fi Networks by Motorola, Inc.

September 2007 - (Free Research)
In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d... 
(WHITE PAPER) READ ABSTRACT |

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by Centrify Corporation

March 2009 - (Free Research)
This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

Managing Identities and Access in the Cloud by IBM

December 2011 - (Free Research)
Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data. 
(WHITE PAPER) READ ABSTRACT |

Closing the Circle: How to Get Manageable Endpoint, Mobile Device and Web Security Together by IBM

March 2013 - (Free Research)
This whitepaper discusses why it is necessary to implement security solutions that protect endpoints and mobile devices together, and to discover one company's suggestions for ameliorating this area of vulnerability within your organisation. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Creating an Effective Security Operations Function by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this white paper to understand all the activities and roles in a security operations function - your first step in making those operations more effective and efficient. 
(WHITE PAPER) READ ABSTRACT |

Testing as Managed Services - TMS by Wipro Technologies

February 2009 - (Free Research)
Testing as Managed Service' also known as TMS is a delivery model which encompasses all the QA activities across project, programs and organization across enterprise domain. This document analyzes the challenges faced in testing enterprise applications and explains some enefits from successful implementation of TMS. 
(WHITE PAPER) READ ABSTRACT |

JobClock by Exaktime

JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine. Each worker carries keytabs on their own keyring that identifies them in the system. 
(HARDWARE PRODUCT)

Leading Pharmaceutical Company Reduces Costs to Meet CFR Compliance Through Digital Signature Implementation by Hexaware Technologies

October 2011 - (Free Research)
In this brief case study, discover eSignature's method of capturing electronic signatures at appropriate points in the work flows, storing relevant information, and enabling an audit trail to be retrieved for each applicable asset. 
(CASE STUDY) READ ABSTRACT |

Faster SQL Profiling for Better Database Performance by Embarcadero Technologies, Inc.

April 2009 - (Free Research)
Find out how Embarcadero's DB Optimizer™ can help you to quickly discover and fix problematic SQL statements that can cause performance bottlenecks in your database. DB Optimizer™ gives you the flexibility of using a single easy-to-use IDE to test, profile and tune SQL. 
(WHITE PAPER) READ ABSTRACT |

Performance Management: What the Mid-Market Can Learn from Large Enterprises by SAP America, Inc.

January 2012 - (Free Research)
This white paper features results from a study by Aberdeen Group on mid-sized (or mid-market) organization on performance management. 
(ANALYST REPORT) READ ABSTRACT |

The State of Database Management by IBM

June 2008 - (Free Research)
Data managers are concerned about managing the explosion of data, and are looking for ways to manage the process. In this survey from IDUG, learn about improving database performance and overall corporate performance. 
(WHITE PAPER) READ ABSTRACT |

IBM Multiform Master Data Management: The Evolution of MDM Applications by IBM

June 2007 - (Free Research)
IBM Multiform Master Data Management manages master data domains - customers, accounts, products - that have significant impact on the most important business processes and realize the promise of Service Oriented Architecture (SOA). 
(WHITE PAPER) READ ABSTRACT |

Why IBM DB2 is easier to administer than Oracle by IBM

June 2011 - (Free Research)
Learn about why it matters that IBM DB2 is easier to administer than Oracle. Triton case study. 
(RESOURCE)

Web Filtering: An Essential Part of a Consolidated Security System by Fortinet, Inc.

July 2011 - (Free Research)
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter. 
(WHITE PAPER) READ ABSTRACT |

Realizing the Economic Benefits of Oracle Enterprise Manager Ops Center by Oracle Corporation

March 2011 - (Free Research)
This paper examines areas of potential optimization, shows how day-to-day IT management processes can contribute to – rather than detracts from – that optimization, and provides an ROI analysis with an example scenario based on actual deployments. 
(WHITE PAPER) READ ABSTRACT |

Designing Secure Multi-Tenancy into Virtualized Data Centers by Continental Resources

April 2010 - (Free Research)
Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture. 
(WHITE PAPER) READ ABSTRACT |

Websites are Dead. Long Live Digital Presence by Limelight Networks, Inc.

September 2013 - (Free Research)
As digital channels evolve, so should your business's digital strategy – yet most businesses today still rely solely on websites to generate traffic and attract customers. In order to thrive, you need to engage and interact with customers across a variety of channels. Read on to learn how to get started crafting a strong digital presence. 
(WHITE PAPER) READ ABSTRACT |

Top Mobile Data Protection Best Practices by SearchSecurity.com

November 2011 - (Free Research)
Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours. 
(EGUIDE) READ ABSTRACT |

What You Don't Know Will Cost You by Sybase, an SAP company

August 2009 - (Free Research)
Rising trading volumes, complex assets and inaccurate assessments of risk by multiple financial partners all contributed to the recent global meltdown. Does your business rely on up-to-the-minute, accurate data? Can you get the insights you need quickly? 
(BROCHURE) READ ABSTRACT |

Full Demo: IBM Cognos Business Intelligence by IBM

November 2013 - (Free Research)
The following webcast details exactly how to achieve multiple-department fluidity to help maximize your competitive advantage. 
(WEBCAST) READ ABSTRACT |

Business-Model-Driven Data Warehousing: Keeping Data Warehouses Connected to Your Business by Kalido

June 2008 - (Free Research)
This paper analyzes the issues of conventional data warehouse design process and explains how this practice can be improved using a business-model-driven process in support of effective Business Intelligence. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts