Papers ApproachWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Papers Approach returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Systems Management
 •   Data Security
 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Process Management (BPM)
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Vulnerability Assessment

Related Searches
 •   Chart Papers
 •   Enterprise Papers Approach
 •   Objectives Papers Approach
 •   Papers Approach Timeline
 •   Papers Filing
 •   Papers Function
 •   Papers Improvements
 •   Papers Technical
 •   Schedule Papers Approach
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

EMC's Comprehensive Approach for Building Proven Information Infrastructure Solutions by Wipro Technologies

October 30, 2008 - (Free Research)
In this paper, Wipro Technologies focuses on the methodology EMC follows for building its Proven Solutions for organizations of all sizes and domains. This paper also demonstrates the methodology using an example of the solution development process for Microsoft Exchange in physical and VMware environments. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 16, 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

Layered Security: Protecting Your Data in Today's Threat Landscape by Tripwire, Inc.

November 15, 2011 - (Free Research)
In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more. 
(WHITE PAPER) READ ABSTRACT |

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security by Trend Micro, Inc.

January 31, 2011 - (Free Research)
An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management. 
(WHITE PAPER) READ ABSTRACT |

Realizing Asset-Centric and User-Centric Approaches to Security by RES Software

September 18, 2009 - (Free Research)
This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799. 
(WHITE PAPER) READ ABSTRACT |

Jumping on the Cloud-Wagon? AppZero's Virtual Application Appliance Approach by AppZero

March 04, 2009 - (Free Research)
This paper explains the attributes of AppZero's VAA approach to server-side application virtualization and conveys various advantages in the cloud environment. 
(WHITE PAPER) READ ABSTRACT |

Why You Should Take a Holistic Approach to ITIL and Service Support (French) by BMC Software, Inc.

November 12, 2009 - (Free Research)
In these tough economic times, how do you address the challenge of reducing costs without diminishing your service quality? Companies can lower costs significantly and meet the growing demand for services by taking a more holistic approach. This paper discusses the importance of taking a unified approach to service support management and... 
(WHITE PAPER) READ ABSTRACT |

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management by CommVault Systems, Inc.

April 30, 2014 - (Free Research)
This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient. 
(WHITE PAPER) READ ABSTRACT |

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation by IBM

June 2008 - (Free Research)
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed. 
(WHITE PAPER)

Data Security and Privacy: A Holistic Approach by IBM

September 2011 - (Free Research)
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk. 
(WHITE PAPER) READ ABSTRACT |

IDC White Paper: The Evolution of Job Scheduling - CA's Approach to Workload Automation by CA Technologies.

February 2008 - (Free Research)
This IDC paper presents the key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. 
(WHITE PAPER) READ ABSTRACT |

Reducing risk through requirements-driven quality management: An end-to-end approach by Hewlett-Packard Company

February 2008 - (Free Research)
When IT initiates a project, the department makes a commitment to the business to ensure quality and success when it is deployed. Learn how requirements management helps IT quantify project risks and make informed decisions about resource allocation. 
(WHITE PAPER) READ ABSTRACT |

Use a Hybrid Approach to Accelerate the Value of an SAP HANA Investment by Hewlett-Packard Limited

February 2014 - (Free Research)
Access the following white paper to uncover how you can successfully implement a hybrid approach to SAP HANA and the cloud to ultimately give your IT the flexibility it need to handle huge data spikes, all while gaining the actionable insights of real time analytics. 
(WHITE PAPER) READ ABSTRACT |

The Benefits of an Integrated Approach to Security in the Cloud by IBM

December 2013 - (Free Research)
This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM. 
(WHITE PAPER) READ ABSTRACT |

Lighting and the Efficient Data Center by CommScope (E-mail this company)

March 2014 - (Free Research)
Read this brief white paper to uncover the ins-and-outs of this inexpensive data center lighting approach, so you can beef up your PUE and distribute your data center budget more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment by VCE (E-mail this company)

December 2013 - (Free Research)
This paper presents a structured approach to migrating Oracle apps from a physical to a virtual environment. Inside, discover why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started. 
(WHITE PAPER) READ ABSTRACT |

Top Considerations for Moving to a Cloud Delivery Model for ITSM by BMC Software, Inc.

October 2010 - (Free Research)
This white paper discusses how to select the right SaaS model to fit your business needs. 
(WHITE PAPER) READ ABSTRACT |

Why You Should Take a Holistic Approach to ITIL and Service Support (German) by BMC Software, Inc.

November 2009 - (Free Research)
In these tough economic times, how do you address the challenge of reducing costs without diminishing your service quality? Companies can lower costs significantly and meet the growing demand for services by taking a more holistic approach. This paper discusses the importance of taking a unified approach to service support management and... 
(WHITE PAPER) READ ABSTRACT |

Why You Should Take a Holistic Approach to ITIL and Service Support by BMC Software, Inc.

June 2009 - (Free Research)
In these tough economic times, how do you address the challenge of reducing costs without diminishing your service quality? Companies can lower costs significantly and meet the growing demand for services by taking a more holistic approach. This paper discusses the importance of taking a unified approach to service support management and... 
(WHITE PAPER) READ ABSTRACT |

Hardware and Software Authentication: Choosing the Right Approach by SafeNet, Inc.

July 2010 - (Free Research)
This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization. 
(WHITE PAPER) READ ABSTRACT |

Integrated Solutions for Defect and Project Tracking by TechExcel

June 2008 - (Free Research)
This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market. 
(WHITE PAPER) READ ABSTRACT |

Gaining the Performance Edge Using a Column-Oriented Database Management System by Sybase, an SAP company

July 2009 - (Free Research)
This paper explores the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge. The paper contrasts row-oriented systems with column-oriented systems, and then elaborates on the benefits of the columnar approach. 
(WHITE PAPER) READ ABSTRACT |

Protecting Virtual Machines: The "Best Of VMworld" Approach by Citrix

September 2008 - (Free Research)
This white paper explores a completely new approach to availability for virtual machines-an approach recognized with the Best of VMworld 2007 - New Technology award. 
(WHITE PAPER) READ ABSTRACT |

Load Testing 2.0 - The Next Generation of Load Testing for the Web 2.0 World by Gomez

July 2009 - (Free Research)
Read this paper to learn why Load Testing 2.0 solutions are needed and who benefits. Learn best practices to get business value out of advanced load testing features, the limits of load testing 1.0 solutions, how today's approach complements existing 1.0 solutions, and what factors are important for selecting successful Load Testing 2.0 solutions. 
(WHITE PAPER) READ ABSTRACT |

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis by VeriSign, Inc

June 2010 - (Free Research)
Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts