Profile GroupWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Profile Group returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Enterprise Systems Management
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Storage Management
 •   Data Quality
 •   Web, Video and Audio Conferencing
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Application Servers

Related Searches
 •   Firm Profile
 •   Guides Profile Group
 •   Profile Group Implement
 •   Profile Group Indian
 •   Profile Group Uk
 •   Profile Group Utah
 •   Publishing Profile
 •   Resource Profile Group
 •   Unix Profile
 •   Wireless Profile Group
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Symantec Workspace Profiles by Symantec

October 29, 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

Aberdeen Group: Today's Customer Data-Driven Supply Chain: Top Five Practices by IBM

April 30, 2013 - (Free Research)
In this informative e-book, you will learn about the impact of using customer data on key supply chain metrics. Access this paper today to get the analyst perspective on thorough research and insights regarding the connection between customer profile data and companies' supply chains. 
(EBOOK) READ ABSTRACT |

Export Compliance Management: Best Practices for Managing Export Compliance to Support Globalization and Reduce Your Risk Profile by Management Dynamics

May 26, 2010 - (Free Research)
Before escalating their overseas sales, companies must gauge their exporting best practices to see what can be gained from improving compliance process. This Report profiles export compliance programs in various industries to reveal key challenges companies face in managing these programs and determine how software is used in the process. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 11, 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Taneja Group Analyst Report: Quantum Goes Beyond Deduplication by Quantum Corporation

May 26, 2010 - (Free Research)
Read this Taneja Group analyst report to learn how Quantum is bringing data protection to a new level with more than just deduplication; making them a strong competitive force, even amongst industry juggernauts. 
(ANALYST REPORT) READ ABSTRACT |

The Architectural Advantages of Compellent Automated Tiered Storage by Dell Compellent

November 11, 2010 - (Free Research)
With the recent profusion of tiered storage solutions into the enterprise storage market, organizations are increasingly adopting tiering strategies to accommodate rapid data growth while controlling costs. Yet most solutions fail to maximize the potential benefits of tiered storage. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Technology Profile: Cloud Building - Requirements for Private Clouds (Instrumentation and the Private Cloud) by Virtual Instruments

February 13, 2012 - (Free Research)
Check out this white paper for best practices and requirements when establishing a private cloud. Learn about the importance of efficiency, scalability and real-time awareness of your cloud environment, and discover what tools and technologies are currently available to ensure your private cloud is running smoothly and effectively. 
(WHITE PAPER) READ ABSTRACT |

Data Profiling: Underpinning Data Quality Management by Pitney Bowes Group 1 Software

May 2008 - (Free Research)
Data Profiling delivers a deeper and broader insight in a fraction of the time required by traditional approaches to data analysis. 
(WHITE PAPER) READ ABSTRACT |

What is Carrier Grade Ethernet? by Brocade

January 2010 - (Free Research)
This paper explains the fundamentals of Carrier Ethernet and examines how service profiles and Service Level Agreements (SLAs) can be defined in Carrier Ethernet. 
(WHITE PAPER) READ ABSTRACT |

Quantum Goes Beyond Deduplication by Quantum Corporation

July 2010 - (Free Research)
Read this Taneja Group analyst report to learn how Quantum is bringing data protection to a new level with more than just deduplication; making them a strong competitive force, even amongst industry juggernauts. 
(ANALYST REPORT) READ ABSTRACT |

Quantum Goes Beyond Deduplication by Quantum Corporation

March 2010 - (Free Research)
Read this Taneja Group analyst report to learn how Quantum is bringing data protection to a new level with more than just deduplication; making them a strong competitive force, even amongst industry juggernauts. 
(ANALYST REPORT) READ ABSTRACT |

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by Information Security Magazine

January 2009 - (Free Research)
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it. 
(EZINE)

Guide: Desktop Authority by ScriptLogic Corporation

August 2009 - (Free Research)
Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 4 March 2014: How IT brings aid to refugees by ComputerWeekly.com

March 2014 - (Free Research)
In this week's Computer Weekly, we talk to the CIO at the UN High Commission for Refugees about the vital role that technology plays in supporting its aid programmes. We hear from IT leaders who are ditching BlackBerry – but moving to Windows Phone instead. And we look at how to choose the best hybrid cloud provider. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 4 December 2012: Games giant Sega takes to the cloud by ComputerWeekly.com

December 2012 - (Free Research)
In this week's Computer Weekly, we talk to Sega about how the computer game giant has turned to the cloud to prepare for the Christmas rush. Our latest buyer's guide gives best practice advice on mobile device management. And Unilever tells us how business intelligence and analytics helps to better understand customer needs. Read the issue now. 
(EZINE) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Cloud Service Delivery Models - Security Risks and Recommendations by SecureWorks

August 2011 - (Free Research)
This presentation transcript examines how different levels of isolation and multi-tenancy in cloud models introduce different risks to organizations leveraging cloud services. We also discuss what organizations can do to address these risks and we recommend ways to deliver an improved security posture to organizations utilizing cloud services. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM DeveloperWorks by IBM

June 2011 - (Free Research)
The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals. 
(DOWNLOAD) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

Resolving Issues When Creating a Cisco UCS Service Profile by Global Knowledge

May 2014 - (Free Research)
This white paper examines several common service profile errors in Cisco UCS Service Profile and their solutions. 
(WHITE PAPER) READ ABSTRACT |

Things You Always Wanted To Know About Windows Profile Management by Immidio

January 2011 - (Free Research)
This white paper examines why Windows user profiles are so critically important for corporate IT environments and how they can be managed efficiently. 
(WHITE PAPER) READ ABSTRACT |

Migration to Windows 7 with Immidio Flex Profiles by Immidio

January 2011 - (Free Research)
This white paper discusses how to use Immidio Flex Profiles for making user profiles cross-platform compatible to Windows XP and Windows 7, both for migration projects and side-by-side scenarios using multiple versions of Windows simultaneously. 
(WHITE PAPER) READ ABSTRACT |

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

How to start, refine and improve your social media business strategy by ComputerWeekly.com

April 2014 - (Free Research)
This extract from Adam Gray's  book, Brilliant Social Media will help your organisation get started with social media, then refine and improve your strategy to get real business results. 
(BOOK) READ ABSTRACT |

Faster SQL Profiling for Better Database Performance by Embarcadero Technologies, Inc.

April 2009 - (Free Research)
Find out how Embarcadero's DB Optimizer™ can help you to quickly discover and fix problematic SQL statements that can cause performance bottlenecks in your database. DB Optimizer™ gives you the flexibility of using a single easy-to-use IDE to test, profile and tune SQL. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts