Products ArticleWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Products Article returned the following results.
RSS What is RSS?
Related Categories

 •   Product Data Management/ Product Information Management
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Enterprise Data Protection and Privacy
 •   Application Servers
 •   Data Mining
 •   Database Administration
 •   Databases

Related Searches
 •   Products Article Cycle
 •   Products Article Imports
 •   Products Article Quality
 •   Products Article Types
 •   Products Computers
 •   Products Diagrams
 •   Products Manufacturers
 •   Products Remote
 •   Recovery Products Article
 •   Statement Products Article
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 22, 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 09, 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Harvard Business Review Article: Mastering the Management System by SAP America, Inc.

September 01, 2011 - (Free Research)
In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system, which comprises five stages. 
(WHITE PAPER) READ ABSTRACT |

Design Reuse: The Key to Building Better Products Faster by PTC Small/Med Product Development

October 2008 - (Free Research)
Learn how design reuse can save up to 75% of modeling time, improve product quality and time-to-market and reduce the risk of fundamental errors in this feature article. 
(WHITE PAPER) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 4 by SearchBusinessAnalytics

April 2012 - (Free Research)
This edition of BI Trends & Strategies features a lead article by SearchCIO.com's Linda Tucci, who offers a helping hand in the quest to dismantle the dreaded data silo. The second piece outlines mobile BI, including a reference to Apple's iPad, and the final article delves into the world of performance management. 
(EZINE)

An Agile Approach to "Metrics": Applied Macromeasurements to Ensure On-Time Delivery by CollabNet

January 2011 - (Free Research)
This article challenges the value of traditional metrics for managing product development schedules and presents an alternative compatible with Agile approaches such as Scrum and XP. It is written for development managers or Scrum Product Owners who want to make decisions based on empirically derived schedule forecasts instead of shots in the dark. 
(WHITE PAPER) READ ABSTRACT |

Readers' Choice Awards by Information Security Magazine

April 2008 - (Free Research)
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles. 
(JOURNAL ARTICLE)

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

IT matters again by ComputerWeekly.com

December 2011 - (Free Research)
This report from Deloitte argues businesses are again investing in IT to provide the differentiation and innovation critical from their competitors despite the downturn. 
(IT BRIEFING) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - September 2009: Readers’ Choice Awards by Information Security Magazine

September 2009 - (Free Research)
This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more. 
(EZINE)

Storage: The Best Products of the Year 2008 by Storage Magazine

February 2009 - (Free Research)
Innovation was the byword for storage vendors in 2008. See which products came out on top in this issue of Storage. Other topics covered include deduplication, multitiered disaster recovery, and storage in a down economy. 
(EZINE) READ ABSTRACT |

E-Book: Gaining Control of Order Management Processes by SAP America, Inc.

April 2012 - (Free Research)
This e-book, packed with four expert articles, highlights SAP's solution to sales order management, offering insight into its CRM, ERP and supply chain management components. Read these insightful articles now to learn about this option's strengths and weaknesses, how to properly define the sales process and so much more. 
(EBOOK) READ ABSTRACT |

The Human Face of Big Data: Data Driven by ComputerWeekly.com

January 2013 - (Free Research)
Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris. 
(BOOK) READ ABSTRACT |

Detecting the use of TrueCrypt by ComputerWeekly.com

April 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Encryption in the cloud by ComputerWeekly.com

April 2014 - (Free Research)
This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Business Impact of Data Security Regulations: Featuring Massachusetts by Sophos, Inc.

November 2009 - (Free Research)
Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance. 
(WHITE PAPER) READ ABSTRACT |

Speeding the Time to Intelligence: Effective Information Management through Business Intelligence Competency Centers and Performance Management by SAS

May 2008 - (Free Research)
This article explains in detail about how to arrive at and implement an effective business intelligence strategy, using both a BICC and performance management technology. 
(WHITE PAPER) READ ABSTRACT |

Getting Ready for Microsoft Windows Server 2008 by Dell, Inc.

April 2008 - (Free Research)
Read this article to learn about the many capabilities and benefits of Microsoft Windows Server 2008 and how Dell products can help simplify the migration to this new operating system. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Sun's High Performance Computing Reference Architecture by Sun Microsystems, Inc.

April 2009 - (Free Research)
This Sun BluePrints article is designed to provide IT managers with a grounding in the basic products and technologies that comprise Suns' HPC Reference Architecture. Key components are highlighted along with typical uses, issues, and architectures of HPC systems. 
(WHITE PAPER) READ ABSTRACT |

Skill building takes time. Let knowledge paths pave the way. by IBM

December 2011 - (Free Research)
Check out this resource center to find how-to articles, free trial software, discussion forums, educational videos and podcasts, and hands-on exercises to help develop your skills in technologies and products such as: cloud computing, Java, Linux, open source, Web development, XML, AIX and UNIX, business analytics, information management, and more. 
(RESOURCE CENTER) READ ABSTRACT |

Journal of Management Excellence - Enterprise Performance Management Innovations by Oracle Corporation

April 2010 - (Free Research)
This collection of journal articles focuses on the many facets of enterprise performance management that can help organizations thrive through the recovery, including; integrating the financial close and reporting process, managing the transition to IFRS, centralized enterprise dimension management. 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication Special Report by NetApp

March 2008 - (Free Research)
Data deduplication is one of the hottest storage topics in storage today. This Special Report highlights how data deduplication products are shaping the marketplace, who the key suppliers are and what you should be aware of when evaluating these products. 
(WHITE PAPER) READ ABSTRACT |

NetApp FAS2240 - An Inside Look by NetApp

December 2012 - (Free Research)
This article takes an inside look at the unique design features of the NetApp FAS2240, including: Integration of controllers within NetApp SAS disk shelves; I/O and performance enhancements; New resiliency and availability features. 
(WHITE PAPER) READ ABSTRACT |

The Tangible Value of Virtualization by Dell, Inc. and Intel®

May 2009 - (Free Research)
Read this article to learn how Dell has developed adaptive power management and worked with VMware to develop ways to autonomically and proactively power-down underutilized systems during off-peak times. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts