Practices KeyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Practices Key returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Enterprise Systems Management
 •   Network Security
 •   Data Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Data Center Management
 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions

Related Searches
 •   Example Practices Key
 •   Examples Practices Key
 •   Export Practices
 •   Flowchart Practices Key
 •   Practices Compare
 •   Practices Key Basics
 •   Practices Key Expert
 •   Practices Key Managers
 •   Practices Key Quality
 •   Systems Practices
Advertisement

ALL RESULTS
1 - 25 of 463 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Top four considerations for securing Microsoft SharePoint by Sophos, Inc.

March 08, 2011 - (Free Research)
This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets. 
(WEBCAST) READ ABSTRACT |

Best Practices in Data Protection: Encryption, Key Management and Tokenization by nuBridges, Inc.

October 12, 2010 - (Free Research)
Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices. 
(WHITE PAPER) READ ABSTRACT |

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

Multiple Country Implementation — Influencing Factors and Approaches by ComputerWeekly.com

August 31, 2012 - (Free Research)
This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Three Best Practices for Today's Profitable Contact Centers: Three Best Practices for Contributing to the Bottom Line by Avaya Inc.

July 2008 - (Free Research)
This white paper provides the three best practices for today's profitable contact centers. 
(WHITE PAPER) READ ABSTRACT |

Key E-Discovery Issues to Consider in 2011 by Dell, Inc.

May 2011 - (Free Research)
This white paper focuses on the key practices and technologies that organizations should pursue as they seek to improve their e-discovery practices and technologies. It also provides a brief overview on the relevant offerings from Dell. 
(WHITE PAPER) READ ABSTRACT |

Advanced Case Management: Making its Mark on Key Government Sectors by IBM

May 2012 - (Free Research)
Government agencies are frequently adopting advanced case management strategies to automate processes, streamline practices and achieve better, swifter results. This paper from IBM discusses how advanced case management strategies are taking hold in today's agencies and how these practices can help foster more efficient, effective environments. 
(WHITE PAPER) READ ABSTRACT |

Worst Practices in Predictive Analytics by Information Builders

August 2012 - (Free Research)
According to IDC, predictive analytics has the potential to generate an average ROI of 145% -- but most companies today have implemented it incorrectly, thus preventing them from seeing any benefit. This paper explores the 5 common worst predictive analytics practices and provides you with 6 key steps to ensure a successful implementation. 
(WHITE PAPER) READ ABSTRACT |

Accelerate Performance in Human Resources by SAP America, Inc.

January 2012 - (Free Research)
This white paper addresses HR challenges and metrics solutions for improving operations. 
(WHITE PAPER) READ ABSTRACT |

Virtualization Best Practices to Accelerate Virtual Machine Migration by VMware, Inc.

April 2013 - (Free Research)
This expert e-guide discusses virtualization best practices and key advice about accelerating VM migration with VM provisioning software. 
(EGUIDE) READ ABSTRACT |

Key Strategies for your application integration approach by Oracle Corporation

October 2011 - (Free Research)
Application integration practices have their own patterns and languages and over the past few years the number of practices have grown immensely. This eguide will gives you expert advice on strategies for multiple application integration practices. 
(EGUIDE) READ ABSTRACT |

Mainframe Tape Technology: Eight Myths, Realities and Best Practices by CA Technologies.

July 2008 - (Free Research)
Read this paper to learn how organizations can mitigate risk, reduce TCO, address compliance requirements and optimize security and support by better managing and automating key tape-related processes, creating broad strategies for retention and encryption and implementing best practices. 
(WHITE PAPER) READ ABSTRACT |

Good to Great: Transform IT through Service Lifecycle Management by Hewlett-Packard Company

June 2008 - (Free Research)
This paper examines service lifecycle management SLcM and the ITIL v3 principles on which it is based. It shows how SLcM provides the framework for organizations to optimize business outcomes and facilitates continual service improvement. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Strategies and Best Practices for Cloud Integration by MuleSoft

January 2014 - (Free Research)
Access this expert presentation transcript today to uncover top strategies and best practices for driving cloud integration success. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

VAR Guide: Agile BPM for improved business agility by OpenText

September 2013 - (Free Research)
This E-Guide identifies the key characteristics of an agile system, and offers tips and best practices for implementing an agile business approach. 
(EGUIDE) READ ABSTRACT |

A Mobile Customer Service Strategy: Research Report and Best Practices Guide by Aspect

December 2013 - (Free Research)
Contact center professionals are quickly realizing that they must support customers via mobile devices -- but implementing that mobile support isn't always easy for organizations. In this report, get the info you need to create and implement a successful mobile customer service strategy. 
(WHITE PAPER) READ ABSTRACT |

Integrated Systems and Streamlined Practices Propel New, Responsive IT Organizations by IBM

February 2014 - (Free Research)
This whitepaper examines key findings about IT innovation today, including how new integrated systems are enabling new levels of responsiveness and the 3 significant structural changes it is inspiring. 
(WHITE PAPER) READ ABSTRACT |

Going from reactive to proactive - What Business Intelligence means today by Infor

March 2014 - (Free Research)
Consult the following white paper to uncover the some of the best practices organizations are using to make the most out of business intelligence today. Learn about 5 key focus areas and where to tailor your efforts to increase the effectiveness of your BI strategies, and more. 
(WHITE PAPER) READ ABSTRACT |

Transitioning to Cloud Business: Best Practices for ISVs by Progress

January 2014 - (Free Research)
This Saugatuck Strategic Report shares not only analysis of key market shifts, and the challenges faced by ISVs in these transitions, but also provides critical success factors and best practices from more than seven years of Saugatuck Technology research and business consulting with a diverse range of software providers around the world. 
(WHITE PAPER) READ ABSTRACT |

Best Practices: A Checklist for Backup Tapes by Iron Mountain

February 2012 - (Free Research)
Check out these best practices to get the most out of your tape backups. Discover keys to help you define your needs and ensure future success by establishing regular testing of recovery procedures. Also included is a breakdown of tape's lifecycle to help you better understand the backup process, and tips for proper tape handling and transport. 
(WHITE PAPER) READ ABSTRACT |

Project Portfolio Management in the Public Sector: Benefits, Challenges, Best Practices and Gotchas by Oracle Corporation

November 2013 - (Free Research)
As federal government programs have dramatically increased in number and complexity, more agencies have turned to project portfolio management (PPM). This helpful white paper provides an overview of the key things federal agency officials need to know about PPM, as well as best practices to follow and pitfalls to avoid with PPM implementation. 
(WHITE PAPER) READ ABSTRACT |

Five Areas of Records and Information Management Best Practices by Iron Mountain

June 2012 - (Free Research)
More than 73% of CIOs, general counsel and records managers surveyed in a recent compliance benchmark study indicated they do not proactively monitor their records program for compliance. Out of 4,000 respondents, 42% have no formal information security program and 61% struggle with discovery. Where does your company’s policy fall? 
(WHITE PAPER) READ ABSTRACT |

Best Practices For a Successful Information Governance Strategy by Iron Mountain

August 2012 - (Free Research)
Effective information governance is a top priority in modern enterprises, but crafting a successful strategy is more challenging than most professionals realize. Read this e-guide to learn information governance best practices, such as why case studies help secure executive support, the importance of involving senior management, and more. 
(EGUIDE) READ ABSTRACT |

Records Management: The Keys to Success by Iron Mountain

April 2012 - (Free Research)
With the heightened compliance regulations, your records management has never been more important. Read this e-book to discover: the importance of physical and digital records convergence, why data retention is a cross-departmental concern, new apps designed specifically for e-discovery, and the compliance risks associated with social media. 
(EBOOK) READ ABSTRACT |

1 - 25 of 463 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts