Programs Choosing CompaniesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Programs Choosing Companies returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Data Security
 •   Data Quality
 •   Business Process Management (BPM)
 •   Security Policies
 •   Security Monitoring
 •   Statistical Data Analysis
 •   Wireless Technologies and Mobile Computing
 •   Network Security

Related Searches
 •   Events Programs Choosing Companies
 •   Improvements Programs Choosing Companies
 •   Programs Choosing Companies Environment
 •   Programs Choosing Parts
 •   Programs Manager
 •   Programs Sheets
 •   Risks Programs
 •   Spreadsheet Programs Choosing
 •   Strategic Programs Choosing
Advertisement

ALL RESULTS
1 - 25 of 454 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands by Symantec Corporation

October 2008 - (Free Research)
Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions. 
(WHITE PAPER) READ ABSTRACT |

Oracle Database 11g Application Development by Oracle Corporation

June 2007 - (Free Research)
Application development organizations have a wide variety of programming languages and technologies to choose from. In this white paper learn how Oracle Database 11g delivers a highly productive and powerful set of application development tools. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 27 May 2014: Targeting the digital customer by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, we go behind the scenes of John Lewis's £40m e-commerce transformation plan to find out how to target the digital customer. Starbucks' European CIO talks about the coffee chain's IT strategy. And we evaluate three big suppliers' plans for virtualised networking. Read the issue now. 
(EZINE) READ ABSTRACT |

Client Case Study: MoneyGram International by IBM

August 2011 - (Free Research)
This case study outlines the solution MoneyGram choose to help integrate their information in real-time and provide actionable insight so company managers can quickly identify questionable patterns and proactively enact new processing rules to reduce fraud. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Case Study: WebEx - Securing Web Collaboration by Qualys

May 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: Are your applications cloud-ready? by IBM

November 2011 - (Free Research)
This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint by Hewlett-Packard Company

May 2012 - (Free Research)
This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access. 
(CASE STUDY) READ ABSTRACT |

The Driving Principles of Open Source Software Success by Actuate

September 2013 - (Free Research)
In this e-guide, gain enterprise programming lessons from the driving principles of OSS success, and uncover why you should stop merely thinking about how open source development projects will bring in profits for a specific sector of your business and start thinking about how they can generate good press for your whole business. 
(EGUIDE) READ ABSTRACT |

Avon Products: Avon gets a Training Program Makeover With SpringCM by SpringCM

March 2011 - (Free Research)
Avon employs more than 5 million independent representatives - all of whom must receive in-depth, up-to-date training to ensure Avon’s continued success as the largest direct marketer on the planet. So when Avon sought to makeover its training program, it chose to go the SaaS route in order to implement it quickly with minimal support requirements. 
(CASE STUDY) READ ABSTRACT |

API Management: Choosing the Right Tools by CA Technologies.

December 2011 - (Free Research)
Making application programming interfaces (APIs) available to the general public brings with it a number of challenges and risks. In this white paper, explore the functional and operational requirements in depth and get the key criteria you need to choose the right API management tool for your organization. 
(WHITE PAPER) READ ABSTRACT |

Nexcap Finance: SpringCM Solution reduces Nexcap’s invoice processing time by 25 percent by SpringCM

March 2011 - (Free Research)
Nexcap Finance Corporation needed to implement a cost-effective, web-based application that would provide IT infrastructure interoperability and a portal for supplier interaction. Learn how SpringCM has streamlined every step of the process - from capturing invoices to expediting the time necessary to process payments and handle exceptions. 
(CASE STUDY) READ ABSTRACT |

Enterprise Data Services in SOA using ODI Suite by Oracle Corporation

February 2009 - (Free Research)
This whitepaper will demonstrate why Data Services are a foundation requirement for enterprise SOA deployments by describing just how valuable, and complex, business data is for the businesses that rely on it. 
(WHITE PAPER) READ ABSTRACT |

HP's Get Virtual Guarantee Program by Hewlett-Packard Company

April 2012 - (Free Research)
You need to maximize server virtualization efficiency, and doing so depends on choosing the right storage architecture. Check out this 2-page white paper to learn how. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Executing Your Strategy 5: Engagement by ComputerWeekly.com

February 2014 - (Free Research)
This is the fifth of a six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

CYOD: Hassle Free BYOD by Insight

April 2014 - (Free Research)
This informative resource discusses a new approach to BYOD where employees choose their own device from a menu of pre-approved devices and plans, helping ease the burden of management for IT and allowing for improved efficiency. 
(WHITE PAPER) READ ABSTRACT |

The new need for BI speed: Strategies, technologies and best practices for delivering real-time BI analytics by Tableau Software

September 2011 - (Free Research)
In this eBook, you'll get an overview of real-time BI plus insight and advice on planning and executing a real-time BI strategy. 
(EBOOK)

Acadia University Case Study: Giving Students an Advantage by Dell, Inc.

September 2008 - (Free Research)
Acadia University wanted to enable students to purchase their own laptops but needed to narrow their selection to models that would meet exacting requirements and student approval. Dell™ Latitude™ and Dell XPS™ laptops were among several models the students selected. Read this case study to learn more. 
(CASE STUDY) READ ABSTRACT |

Mortgage Company Uses DataFlux Technology to Improve Reporting, Manage Compliance by DataFlux Corporation

January 2009 - (Free Research)
Read how using DataFlux technology, this financial company implemented a data governance program, creating more complete and accurate data and drastically reducing the time needed to comply with Federal reporting regulations. 
(CASE STUDY) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

1 - 25 of 454 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts