Prices Name OfWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Prices Name Of returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Data Center Management
 •   Backup Systems and Services
 •   Data Security
 •   Application Management and Maintenance
 •   Availability, Performance and Problem Management
 •   Business Intelligence Solutions
 •   Wireless Technologies and Mobile Computing
 •   Application Lifecycle Management(ALM)
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Linux-Based Prices
 •   Prices Java
 •   Prices Name Compliance
 •   Prices Name Of Advertising
 •   Prices Name Of Maintenance
 •   Prices Name Rhode Island
 •   Prices Name Templates
 •   Prices Tools
 •   Prices Wisconsin
 •   Spreadsheets Prices
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Pulling the Plug on Legacy Log Management by Tripwire, Inc.

April 09, 2010 - (Free Research)
When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh. 
(ANALYST BRIEF) READ ABSTRACT |

Hot Tips for Securing Your Wireless Network by Sophos, Inc.

August 31, 2012 - (Free Research)
Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more. 
(WHITE PAPER) READ ABSTRACT |

Improving Clinician Workflows with One-Touch Desktop Roaming by Imprivata

May 24, 2010 - (Free Research)
The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both. 
(WHITE PAPER) READ ABSTRACT |

Ultrabooks & Mobile Computing by ComputerWeekly.com

January 05, 2012 - (Free Research)
In this report extract, Juniper Research looks at the market challenges and opportunities of ultrabooks, the next generation of note book PCs. 
(ANALYST BRIEF) READ ABSTRACT |

Fixing the "Everyone" Problem by Varonis

July 30, 2009 - (Free Research)
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer. 
(WHITE PAPER) READ ABSTRACT |

THE DEFINITIVE GUIDE TO: Windows Application and Server Backup 2.0 CHAPTER 2 by AppAssure Software, Inc.

August 18, 2009 - (Free Research)
This chapter shares stories about backups to highlight problems that you yourself may have encountered. For each, we'll look at some of the root causes for those problems, and suggest ways that a modernized “Backup 2.0” approach might help solve the problem. 
(WHITE PAPER) READ ABSTRACT |

New Enterprise Desktop E-Zine Vol. 1: Defining Application Virtualization by Dell, Inc. and Intel®

June 16, 2009 - (Free Research)
In this premiere issue of New Enterprise Desktop, you'll learn the ins and outs of application virtualization and how to apply it in the enterprise, as well as finding out how to categorize user groups and match them with the best desktop virtualization solution. 
(EZINE) READ ABSTRACT |

Managed File Transfer: The Need for a Strategic Approach by Inovis

September 2008 - (Free Research)
This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution. 
(WHITE PAPER) READ ABSTRACT |

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your PeopleSoft 9.1 Upgrade by Oracle Corporation

July 2010 - (Free Research)
This paper explains how the Oracle Governance, Risk, and Compliance (GRC) applications suite may be leveraged to streamline your upgrade to PeopleSoft 9.1, while building an enterprise GRC platform that helps realize operating efficiencies, transparency, and sustainable compliance and risk management well into the future. 
(WHITE PAPER) READ ABSTRACT |

Guide to VMware Horizon View by Dell and VMware

November 2013 - (Free Research)
Do you know how to create pools with VMware Horizon View? What about providing HTML access to virtual desktops? And how do you solve View Connection Server issues to keep your users online? Find out the answers to these questions in this guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

GFI FAXmaker by GFI Software

GFI FAXmaker is the leading enterprise quality fax server when it comes to reliability, ease of use and administration, and price. 
(SOFTWARE PRODUCT)

Mapping Out a Cost-Effective Approach to SAP Virtualization by VCE (E-mail this company)

May 2013 - (Free Research)
Though SAP virtualization is beneficial, it can also be costly. Luckily, this expert e-guide explains how mapping out each step of the virtualization process can help you achieve maximum ROI, and offers advice and considerations to keep in mind when planning your SAP virtualization project. 
(EGUIDE) READ ABSTRACT |

Increasing Data Center Density While Driving down Power and Cooling Costs by Intel Corporation

July 2008 - (Free Research)
This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption. 
(WHITE PAPER) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

December 2013 - (Free Research)
This informative resource details the major components that make desktop virtualization secure by design. 
(WHITE PAPER) READ ABSTRACT |

Transforming business at the intersection of marketing and technology by ComputerWeekly.com

April 2014 - (Free Research)
Businesses have to change themselves quickly and dramatically if they want to survive and thrive, say Bob Lord and Ray Velez, CEO and CTO of razorfish, in this extract from their book, Covnerge. 
(BOOK) READ ABSTRACT |

How to Extend your Identity Management Systems to use OAuth by Forum Systems

April 2014 - (Free Research)
Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Integration with Public Cloud Services using OAuth by Forum Systems

April 2014 - (Free Research)
This white paper features a deployment strategy for an authentication and authorization solution that requires no third-party access to user credentials – so that your information stays within the company. 
(WHITE PAPER) READ ABSTRACT |

Cloud-based Enterprise Identity Management Using OAuth by Forum Systems

April 2014 - (Free Research)
This resource highlights an authentication and authorization solution that offers protection beyond the username and password-only level. 
(WHITE PAPER) READ ABSTRACT |

Acronis Backup & Recovery® 11.5 for Workstation by Acronis

March 2013 - (Free Research)
This data sheet highlights the benefits of a backup solution for built for laptops and desktops. 
(WHITE PAPER) READ ABSTRACT |

Extending Role Security in Analysis Services for SQL Server by Global Knowledge

December 2013 - (Free Research)
This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server. 
(WHITE PAPER) READ ABSTRACT |

Apps Revolution by ComputerWeekly.com

February 2014 - (Free Research)
This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change. 
(ESSENTIAL GUIDE) READ ABSTRACT |

A Cybercriminal's Guide to Exploiting DNS for Fun and Profit by Infoblox

January 2014 - (Free Research)
This guide explores current network security trends and how to protect your DNS from various cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Cisco IOS Digit Manipulation by Global Knowledge

December 2013 - (Free Research)
Platform digit manipulation may be needed for many business phone calls as they traverse their gateways. his guide explores the role of digit manipulation techniques and various is ways it can benefit for your business. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts