Profile ProjectsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Profile Projects returned the following results.
RSS What is RSS?
Related Categories

 •   Data Quality
 •   Virtualization
 •   Web, Video and Audio Conferencing
 •   Web Content Management and Publishing
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Mobile Device Management
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Active Profile
 •   Files Profile
 •   Firm Profile
 •   Layer Profile Projects
 •   Production Profile Projects
 •   Profile Automation
 •   Profile Projects Finding
 •   Questions About Profile Projects
 •   Tracking Profile
 •   Web Cast Profile Projects
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 05, 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

Migration to Windows 7 with Immidio Flex Profiles by Immidio

January 15, 2011 - (Free Research)
This white paper discusses how to use Immidio Flex Profiles for making user profiles cross-platform compatible to Windows XP and Windows 7, both for migration projects and side-by-side scenarios using multiple versions of Windows simultaneously. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Driving Collaboration Efficiency - H.264 High Profile by Polycom, Inc.

September 27, 2010 - (Free Research)
Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  Read this transcript to learn how Less Delivers Much More! 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Driving Collaboration Efficiency - H.264 High Profile by Polycom, Inc.

September 15, 2010 - (Free Research)
Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  View this webcast to learn how Less Delivers Much More! 
(WEBCAST) READ ABSTRACT |

Computer Weekly 18 October 2011: Download the latest issue of the UK's leading technology publication, where we analyse the latest news in IT and what it means for IT managers by ComputerWeekly.com

October 14, 2011 - (Free Research)
In this week's Computer Weekly, we talk to the CIO of the London 2012 Olympics about progress on the UK's highest-profile IT implementation. We ask customers about Oracle’s long-awaited Fusion Applications; review the latest version of Windows Server; and find out how the Blackberry outage affected corporate customers. Download the new issue now. 
(EZINE) READ ABSTRACT |

BlackBerry Web Development Plug-in for Microsoft Visual Studio by BlackBerry

May 24, 2010 - (Free Research)
The BlackBerry® Plug-in for Microsoft® Visual Studio® allows developers to leverage existing Microsoft® based developer tools to create, profile and debug web projects for BlackBerry smartphones. Continue on to learn more and to download BlackBerry Plug-in for Microsoft Visual Studio. 
(DOWNLOAD)

Advanced Project Version Management in Schlumberger Petrel Platform Environments with Hitachi Storage Adapter for Petrel by Hitachi Data Systems

August 31, 2013 - (Free Research)
This resource profiles a storage adapter for advanced project management that can help you optimize exploration and development operations, reduce storage management complexity and TCO, and more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 4 March 2014: How IT brings aid to refugees by ComputerWeekly.com

March 04, 2014 - (Free Research)
In this week's Computer Weekly, we talk to the CIO at the UN High Commission for Refugees about the vital role that technology plays in supporting its aid programmes. We hear from IT leaders who are ditching BlackBerry – but moving to Windows Phone instead. And we look at how to choose the best hybrid cloud provider. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly 6 September 2011: Download the latest issue of the UK’s leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 06, 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at HP's strategic shake-up, and ask what it means for the supplier's customers and the UK IT industry as a whole. We also discuss a major research study into why IT projects go wrong, and start our latest Buyer's Guide, about business intelligence. Download the new issue now. 
(EZINE)

Barclays Application Security Assurance Project by Veracode, Inc.

February 17, 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 21 January 2014: The IT risks facing Universal Credit by ComputerWeekly.com

January 21, 2014 - (Free Research)
In this week's Computer Weekly, we examine the ongoing IT risks facing the UK government's highest-profile IT project – the troubled Universal Credit programme. We talk to IT leaders to find out their spending priorities for 2014. And we find out about the latest best practice in improving datacenter performance. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly 1 November 2011: Read this week's issue of the UK's leading technology publication, with the latest news, analysis and opinion for IT managers by ComputerWeekly.com

October 28, 2011 - (Free Research)
In this week's Computer Weekly, we examine the IT challenges facing retailers in a world of multi-channel shopping; our latest Buyer's Guide looks at upgrading from Windows XP to Windows 7 as XP approaches the time Microsoft ceases support; and we kick-off this year's search for the most influential people in UK IT. Download the new issue now. 
(EZINE) READ ABSTRACT |

Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization by Bradford Networks

January 21, 2009 - (Free Research)
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Storage and the WAN by Riverbed Technology, Inc.

April 01, 2009 - (Free Research)
Looking to connect your remote office devices to primary central files? Looking for a way to increase bandwidth without increasing costs? Download this WAN Special Report to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Successful Business Guide for Data Migration: Re-engineering Data for Optimized Value by Datanomic

April 25, 2008 - (Free Research)
Up to 75% of new systems fail to meet expectations, often because flaws in the migration process result in invalid data. With an understanding of the challenges, managing the migration as part of the investment is much more likely to... 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

eBook: Encryption 360 Degrees by TechTarget

May 20, 2009 - (Free Research)
Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today. 
(EBOOK) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 4 February 2014: Rural broadband roll-out row by ComputerWeekly.com

February 04, 2014 - (Free Research)
In this week's Computer Weekly, a Lancashire village is the centre of a row over rural broadband – we examine the arguments on both sides. The move to cloud and hosting is changing the market for datacentre technologies – we look at the implications for IT managers. Have you heard of Sepa? We explain why you need to know. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 4 December 2012: Games giant Sega takes to the cloud by ComputerWeekly.com

December 04, 2012 - (Free Research)
In this week's Computer Weekly, we talk to Sega about how the computer game giant has turned to the cloud to prepare for the Christmas rush. Our latest buyer's guide gives best practice advice on mobile device management. And Unilever tells us how business intelligence and analytics helps to better understand customer needs. Read the issue now. 
(EZINE) READ ABSTRACT |

Practical Data Migration: PDMv2 by ComputerWeekly.com

September 28, 2012 - (Free Research)
Data Migration expert Johny Morris, explains how organisations can use the PDMv2 methodology to overcome common data migration problems. 
(BOOK) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 11, 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

2008 Video SEO Playbook by Brightcove

June 2008 - (Free Research)
This white paper de-mystifies the world of video search, and in doing so, provide you with a practical framework for video SEO that lets you maximize the value of your video content. 
(WHITE PAPER) READ ABSTRACT |

Things You Always Wanted To Know About Windows Profile Management by Immidio

January 2011 - (Free Research)
This white paper examines why Windows user profiles are so critically important for corporate IT environments and how they can be managed efficiently. 
(WHITE PAPER) READ ABSTRACT |

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts