Name TechnicalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Name Technical returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Data Center Management
 •   Backup Systems and Services
 •   Availability, Performance and Problem Management
 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance
 •   Social Networks and Community Management
 •   Virtualization
 •   Business Intelligence Solutions
 •   Laptops/ Notebooks/ Tablet PCs

Related Searches
 •   Developments Name Technical
 •   Forms Name Technical
 •   Name Technical Improving
 •   Name Technical Methodology
 •   Name Technical Office
 •   Name Technical Templates
 •   Name Technical Web Cast
 •   Print Name Technical
 •   Summary Name
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Defender 5: The Right Way to Prove, Identify and Establish Trust by Dell Software

February 11, 2011 - (Free Research)
The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password. 
(WHITE PAPER) READ ABSTRACT |

Defender 5: The Right Way to Prove, Identify and Establish Trust by Dell Software

November 03, 2010 - (Free Research)
Are you certain each person accessing your network resources is who they say they are? In this Quest technical brief, learn how Defender 5 gives you more control over who has access to resources, applications and data – well beyond a simple login name and password. Defender 5. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Ultrabooks & Mobile Computing by ComputerWeekly.com

January 05, 2012 - (Free Research)
In this report extract, Juniper Research looks at the market challenges and opportunities of ultrabooks, the next generation of note book PCs. 
(ANALYST BRIEF) READ ABSTRACT |

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 24, 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

Top 10 Root Causes of Data Quality Problems by Talend

August 01, 2011 - (Free Research)
This white paper discusses the top ten root causes of data quality problems and suggests steps the business can implement to prevent them. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 10 December 2013: The most influential people in UK IT by ComputerWeekly.com

December 10, 2013 - (Free Research)
In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and also select 10 rising stars to look out for in 2014. We look back at the big changes in the datacentre environment this year. And we examine the growing popularity of agile development. Read the issue now. 
(EZINE) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 01, 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Agile Software Release Readiness: Cleared for Takeoff or Crash and Burn? by Borland Software Corporation

March 12, 2009 - (Free Research)
In today's challenging economic climate, the consequences of releasing software prematurely can be severe. Read this presentation transcript and learn how you can transform your next software release into a more managed and predictable business process, increasing the likelihood of your success. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enterprise Integration with Public Cloud Services using OAuth by Forum Systems

April 03, 2014 - (Free Research)
This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company. 
(WHITE PAPER) READ ABSTRACT |

Cloud-based Enterprise Identity Management Using OAuth by Forum Systems

April 01, 2014 - (Free Research)
This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level. 
(WHITE PAPER) READ ABSTRACT |

Acronis Backup & Recovery® 11.5 for Workstation by Acronis

March 31, 2013 - (Free Research)
This data sheet highlights the benefits of a backup solution for built for laptops and desktops. 
(WHITE PAPER) READ ABSTRACT |

How to Extend your Identity Management Systems to use OAuth by Forum Systems

April 03, 2014 - (Free Research)
Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration. 
(WHITE PAPER) READ ABSTRACT |

Cisco IOS Digit Manipulation by Global Knowledge

December 31, 2013 - (Free Research)
Platform digit manipulation may be needed for many business phone calls as they traverse their gateways. his guide explores the role of digit manipulation techniques and various is ways it can benefit for your business. 
(WHITE PAPER) READ ABSTRACT |

Extending Role Security in Analysis Services for SQL Server by Global Knowledge

December 31, 2013 - (Free Research)
This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server. 
(WHITE PAPER) READ ABSTRACT |

Extending Role Security in Analysis Services for SQL Server by Global Knowledge

December 31, 2013 - (Free Research)
This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server. 
(WHITE PAPER) READ ABSTRACT |

QLE10000 Series Adapter Provides Application Benefits Through I/O Caching by QLogic Corporation

November 30, 2012 - (Free Research)
This white paper provides an overview of the application performance capability of the FabricCache QLE10000 Series Adapter in single-server and multi-server environment, enabling the acceleration of clustered and virtualized environments with a transparent, shared cache. 
(WHITE PAPER) READ ABSTRACT |

The Value of Shared SSDs in Enterprise Computing by QLogic Corporation

March 31, 2013 - (Free Research)
This paper covers the advantages of the QLogic FabricCache 10000 Series adapters bringing transparent, shared caching to enterprise application environments. It combines a QLogic Fibre Channel adapter with intelligent caching to bring new levels of scalable application performance to existing SAN environments. 
(WHITE PAPER) READ ABSTRACT |

Cloud Backup: Terms and Trends by Symantec Corporation

May 14, 2013 - (Free Research)
This expert E-Guide recaps the results of a recent cloud backup survey and reports on your peers' experiences and satisfaction with it. It also examines how cloud backup fits into the broader cloud storage ecosystem and clears up some confusion around semantics. 
(EGUIDE) READ ABSTRACT |

NetApp FAS6240 Clustered SAN Champion of Champions by NetApp

December 31, 2012 - (Free Research)
This informative white paper outlines NetApp’s Clustered SAN systems ability to supply a compelling solution to meet current mission critical storage needs as well as future enterprise storage requirements. 
(WHITE PAPER) READ ABSTRACT |

Application Performance Management Tools For The Cloud by CA Technologies.

August 13, 2013 - (Free Research)
Application performance management tools are a good investment for organizations maintaining cloud applications. In this eGuide, our experts take a closer look at these tools and the ways that they can aid data center administrators. 
(EGUIDE) READ ABSTRACT |

IDC_ Entry-Level Enterprise Storage: Stepping Up to Big Challenges by Hitachi Data Systems

October 31, 2012 - (Free Research)
This paper examines the functionality and benefits a converged storage architecture provides and explains why businesses no longer have to spend more to get the enterprise-level technology best suited to their data storage needs 
(WHITE PAPER) READ ABSTRACT |

IDC: The Business Value of Entry-Level Enterprise Storage by Hitachi Data Systems

October 31, 2012 - (Free Research)
In this short white paper, learn how to deploy the next-generation of entry-level arrays to businesses that are budget-conscious, but also cannot afford to compromise on technology. 
(WHITE PAPER) READ ABSTRACT |

Citrix Mobile Solutions Bundle - Product Overview by Citrix Systems, Inc. (E-mail this company)

June 06, 2013 - (Free Research)
Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications. 
(WHITE PAPER) READ ABSTRACT |

Transforming business at the intersection of marketing and technology by ComputerWeekly.com

April 14, 2014 - (Free Research)
Businesses have to change themselves quickly and dramatically if they want to survive and thrive, say Bob Lord and Ray Velez, CEO and CTO of razorfish, in this extract from their book, Covnerge. 
(BOOK) READ ABSTRACT |

Apps Revolution by ComputerWeekly.com

February 24, 2014 - (Free Research)
This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts