Profile SourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Profile Source returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Automated Security Auditing/ Source Code Analysis
 •   Data Quality
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Systems Management
 •   Business Intelligence Solutions
 •   Application Servers
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Articles About Profile Source
 •   Code Profile Source
 •   Manufacturers Profile
 •   Needs Profile Source
 •   Profile Electronic
 •   Profile Source Batch
 •   Profile Source Controls
 •   Profile Source Intrastructures
 •   Profile Source Testing
 •   Tutorials Profile Source
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Resin Application Server Java EE 6 Web Profile by Caucho Technology

March 04, 2010 - (Free Research)
Caucho Technology aims to certify the Resin 4 application server on the newly finalized Java EE 6 Web Profile. This white paper discusses the Java EE 6 Web Profile and how it fits with the development philosophy of Resin as well as the details of our implementation including Resin extensions to the Java EE 6 Web Profile. 
(WHITE PAPER) READ ABSTRACT |

Focus Solution Profile: Qumranet by Qumranet Inc.

May 2008 - (Free Research)
Qumranet is bringing to the market a solution that is optimized specifically for desktop deployment using a virtual desktop architecture leveraging the KVM hypervisor native in the Linux kernel. 
(ARTICLE) READ ABSTRACT |

Faster SQL Profiling for Better Database Performance by Embarcadero Technologies, Inc.

April 2009 - (Free Research)
Find out how Embarcadero's DB Optimizer™ can help you to quickly discover and fix problematic SQL statements that can cause performance bottlenecks in your database. DB Optimizer™ gives you the flexibility of using a single easy-to-use IDE to test, profile and tune SQL. 
(WHITE PAPER) READ ABSTRACT |

Demonstrating the ROI of Data Discovery by CA ERwin®

October 2009 - (Free Research)
Data discovery and profiling is a relatively new data management technique. Today’s budget holders and decision makers must be educated on data discovery and profiling and then shown the value it can bring to the organization through a clear return on investment (ROI) analysis. Read on for more. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Managing Supply Chain Risk by SAP America, Inc.

January 2006 - (Free Research)
Download this white paper and explore new thinking on potential risk to global supply chains and how companies are adopting the statistical methods more commonly associated with finance and insurance. Learn how identifying and profiling risk variables, quantifying risk and using IT solutions can create higher resilience for supply chain management. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Mortgage Company Uses DataFlux Technology to Improve Reporting, Manage Compliance by DataFlux Corporation

January 2009 - (Free Research)
Read how using DataFlux technology, this financial company implemented a data governance program, creating more complete and accurate data and drastically reducing the time needed to comply with Federal reporting regulations. 
(CASE STUDY) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Ways To Get More From Your SharePoint Deployment by Radiant Logic, Inc.

February 2011 - (Free Research)
Check out this white paper to see how identity and context virtualization delivers integrated identity, a richer security profile, and contextual search across all your data. 
(WHITE PAPER) READ ABSTRACT |

Achieve Higher Quality Decisions Faster for a Competitive Edge in the Oil and Gas Industry by Hitachi Data Systems

July 2013 - (Free Research)
This brief resource profiles a storage and analysis approach that can help your organization meet the challenges of today's data-intensive business world and achieve a competitive edge. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Evolve SiteMinder With RadiantOne by Radiant Logic, Inc.

December 2013 - (Free Research)
This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments. 
(WHITE PAPER) READ ABSTRACT |

Successful Business Guide for Data Migration: Re-engineering Data for Optimized Value by Datanomic

April 2008 - (Free Research)
Up to 75% of new systems fail to meet expectations, often because flaws in the migration process result in invalid data. With an understanding of the challenges, managing the migration as part of the investment is much more likely to... 
(WHITE PAPER) READ ABSTRACT |

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems by Fortinet, Inc.

July 2011 - (Free Research)
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 September 2011: Download the latest issue of the UK’s leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at HP's strategic shake-up, and ask what it means for the supplier's customers and the UK IT industry as a whole. We also discuss a major research study into why IT projects go wrong, and start our latest Buyer's Guide, about business intelligence. Download the new issue now. 
(EZINE)

E-Guide: Exploring Configuration Changes to Reduce Attacks by Tripwire, Inc.

September 2011 - (Free Research)
Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks. 
(EGUIDE) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations by Websense, Inc.

September 2011 - (Free Research)
Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Implementing Database Security and Auditing - Authentication and Password Security by IBM

May 2011 - (Free Research)
In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management. 
(EBOOK) READ ABSTRACT |

Storage Through the Looking Glass by ComputerWeekly.com

April 2013 - (Free Research)
This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Has Your QSA Thrown You Under a Bus? by Dell SecureWorks UK

August 2011 - (Free Research)
After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

Resolving Issues When Creating a Cisco UCS Service Profile by Global Knowledge

May 2014 - (Free Research)
This white paper examines several common service profile errors in Cisco UCS Service Profile and their solutions. 
(WHITE PAPER) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts