Profile List SqlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Profile List Sql returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Enterprise Systems Management
 •   Data Security
 •   Virtualization
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Identity Management/ User Provisioning
 •   Application Servers
 •   Database Administration
 •   Application Management and Maintenance

Related Searches
 •   Construction Profile
 •   Organization Profile List
 •   Parts Profile
 •   Profile Data
 •   Profile Desktops
 •   Profile List Demand
 •   Profile List Sql Schedules
 •   Profile Risk
 •   Providers Profile
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Faster SQL Profiling for Better Database Performance by Embarcadero Technologies, Inc.

April 16, 2009 - (Free Research)
Find out how Embarcadero's DB Optimizer™ can help you to quickly discover and fix problematic SQL statements that can cause performance bottlenecks in your database. DB Optimizer™ gives you the flexibility of using a single easy-to-use IDE to test, profile and tune SQL. 
(WHITE PAPER) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Migrate Oracle Database Lite to Sybase SQL Anywhere by Sybase, an SAP company

March 31, 2011 - (Free Research)
Oracle Database Lite Client, Branch Office and Web-to-Go have been removed from Oracle's technology price list and are no longer being actively developed.  Now you are faced with a migration project. 
(PODCAST) READ ABSTRACT |

Recovery Manager for SharePoint by Dell Software

Recovery Manager for SharePoint is an enterprise recovery solution that provides emergency access to all SharePoint content all the time. With Recovery Manager, any recovered content can be restored to any SharePoint instance or saved to a file system. Get your business-critical data back online before the entire server farm comes back. 
(ASP & SOFTWARE PRODUCT)

SQL Server Insider E-Zine - Volume 1: Is Self-service BI the Answer? by Dell, Inc. and Intel®

February 16, 2010 - (Free Research)
Business intelligence is a hot topic in 2010, especially with the upcoming release of Microsoft's SQL Server 2008 R2 being dubbed as the "BI release." In this e-zine, one SQL Server expert breaks down exactly what goes into self-service BI, where it works and where it falls short. 
(EZINE)

SQL Server Insider E-Zine – Volume 1: Is Self-service BI the Answer? by Dell, Inc. and Intel®

November 16, 2010 - (Free Research)
Business intelligence is a hot topic in 2010, especially with the upcoming release of Microsoft's SQL Server 2008 R2 being dubbed as the "BI release." In this e-zine, one SQL Server expert breaks down exactly what goes into self-service BI, where it works and where it falls short. 
(EZINE)

Virtualization Consulting Service Providers: Profiles by Dell, Inc. and Intel®

October 27, 2009 - (Free Research)
This document provides a quick reference to understand the offerings and capabilities of nine service players in virtualization consulting services. This research can help you make informed decisions on your “long list” of providers for a virtualization program. 
(ANALYST REPORT) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 03, 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by Forum Systems

September 13, 2005 - (Free Research)
Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more. 
(WHITE PAPER) READ ABSTRACT |

Microsoft Dynamics GP & CRM CASE STUDY: King Plastic: Plastics Manufacturer Protects IT Investments, Boosts Efficiency with E-Learning by Microsoft Dynamics

January 22, 2009 - (Free Research)
King Plastic uses Microsoft Dynamics CRM alongside Microsoft Dynamics GP to track sales leads and manage profiles for its growing list of customers. 
(CASE STUDY)

Total Data Quality Integration Toolkit (TDQ-IT) for Master Data Management … powered by the Microsoft SQL Server SSIS 2005/2008 by Melissa Data Corp

April 20, 2010 - (Free Research)
The Total Data Quality Integration Toolkit is an affordable, full-featured enterprise data integration platform and rich development environment for creating and managing data assets that can be leveraged specifically for MDM applications. TDQ-IT leverages SSIS to provide a flexible, effective solution for data quality and MDM initiatives. 
(WHITE PAPER) READ ABSTRACT |

Trust in Cyberspace by (ISC)2 UK Ltd

February 26, 2014 - (Free Research)
In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Simplifying Sharepoint 2007 Permissions Management by Idera

July 27, 2010 - (Free Research)
Authentication to a SharePoint environment is the process in which a company’s IT architecture approves a user’s credentials. To fully understand the spectrum involved with managing permissions in a SharePoint environment, you need to know the components involved with permissions and how they work with one another. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 09, 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

The EMA All-Stars in Enterprise Systems Management for 2008 by CA Technologies.

March 2008 - (Free Research)
Analyst firm EMA has released the results of their first ever All-Stars in Enterprise Systems Management for 2008 report, covering 18 different systems management disciplines. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 1 November 2011: Read this week's issue of the UK's leading technology publication, with the latest news, analysis and opinion for IT managers by ComputerWeekly.com

October 2011 - (Free Research)
In this week's Computer Weekly, we examine the IT challenges facing retailers in a world of multi-channel shopping; our latest Buyer's Guide looks at upgrading from Windows XP to Windows 7 as XP approaches the time Microsoft ceases support; and we kick-off this year's search for the most influential people in UK IT. Download the new issue now. 
(EZINE) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Evolving Threats Demand New Approaches To Security by Akamai Technologies

November 2012 - (Free Research)
Consult this white paper for a profile of the evolving cast behind today's advanced threats and find out the key steps you can take to ensure enterprise security – click through to read on. 
(WHITE PAPER) READ ABSTRACT |

Toad for Data Analysis - Query, Understand & Report on Data From Any Source by Dell Software

Toad for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports. 
(ASP & SOFTWARE PRODUCT)

Simplifying SharePoint Backup and Recovery by Dell Software

October 2008 - (Free Research)
Safeguarding your valuable SharePoint data is critical, but native tools are limited. In this new Quest white paper, discover the strengths and weaknesses of native tools, and how you can extend them. Read this white paper today. 
(WHITE PAPER) READ ABSTRACT |

Recovering Microsoft® Office SharePoint® Server Data: Granular Search and Recovery Means Time and Cost Savings by Ontrack® PowerControls™ by Kroll Ontrack

February 2009 - (Free Research)
This paper spotlights the issues SharePoint administrators and IT administrators encounter when trying to recover SharePoint data and reveals a solution. 
(WHITE PAPER) READ ABSTRACT |

Next-gen Load Balancing: Delivering Advanced Web Apps by Citrix

September 2008 - (Free Research)
The increasing demands for high availability, reliability and security of application access are driving the need for load balancers to provide a comprehensive set of network level and application-level services. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

StorageConsole® Backup Manager 6.5 - What's New by APTARE

July 2007 - (Free Research)
APTARE StorageConsole for Backup Manager provides detailed reporting for HP Data Protector 5.5 and 6.0. 
(DATA SHEET) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Understanding the business case for in-memory technology by Hewlett-Packard Company

April 2013 - (Free Research)
In-memory analytics technology is impressive, but is it really necessary right now for small to midsize businesses (SMBs)? Would an investment provide a true competitive advantage? And what are some ways it be leveraged? Read this e-guide to find expert insight on these questions and get the inside scoop on the rise of in-memory technology. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts