Protocol Chess DirectoryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Protocol Chess Directory returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Systems Management
 •   Authentication / Password Management
 •   Directory Services
 •   Identity Management/ User Provisioning
 •   Directory Servers
 •   Network Management
 •   Disaster Recovery
 •   Security Policies
 •   Backup Systems and Services
 •   Access Control

Related Searches
 •   Faqs Protocol Chess Directory
 •   Impact Protocol
 •   Knowledge Protocol Chess
 •   Products Protocol
 •   Protocol Chess Directory Improve
 •   Protocol Chess Directory Integrated
 •   Protocol Chess Directory Own
 •   Protocol Chess Louisiana
 •   Seminars Protocol Chess Directory
 •   Uk Protocol Chess Directory
Advertisement

ALL RESULTS
1 - 25 of 453 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

E-Guide: Securing Naming and Directory Services for Application Defense-in-Depth by IBM

May 20, 2011 - (Free Research)
Application security professionals depend on infrastructure teams to build a secure foundation; and naming and directory services are a prime example of where this holds true. This tips explains how Lightweight Directory Access Protocol (LDAP), helps assemble a solid platform that applications can trust. 
(EGUIDE) READ ABSTRACT |

Leverage Active Directory with Kerberos to Eliminate HTTP Password by PistolStar, Inc.

April 2008 - (Free Research)
This paper will discuss the workings and benefits of Kerberos, focusing on its single sign-on capabilities, its multipronged security, and its ease of use. 
(WHITE PAPER) READ ABSTRACT |

Identity Simplification and Consolidation through Virtualization and Synchronization by Agilysys-Sun Technology Solutions

March 2009 - (Free Research)
You'll want to read this paper if simplifying your company's identity and access management (IAM) infrastructures are on your agenda. Directory virtualization provides new opportunities to move towards this goal by abstracting disparate sources of identity data and presenting them in a unified fashion. Read on for details and more information. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers by Sendmail, Inc.

October 2008 - (Free Research)
This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure. 
(PODCAST) READ ABSTRACT |

Watson – A System Designed for Answers by IBM

February 2012 - (Free Research)
Following four years of research and development, IBM's Watson debuted on Jeopardy! last year, competing at the level of human experts in terms of precision, confidence and speed. This white paper details Watson's workload optimized system design, how it's a glimpse into the future of systems design and why it offers a new computing paradigm. 
(WHITE PAPER) READ ABSTRACT |

SIP and the Art of Converged Communications by Global Knowledge

June 2013 - (Free Research)
Session Initiation Protocol (SIP) is an internet signaling protocol, developed by the IETF (starting in 1996), for establishing, maintaining, and tearing down sessions between a variety of real-time media, including voice, video, and chat. This white paper is going to look at the way SIP is used in the converged Unified Communications environment. 
(WHITE PAPER) READ ABSTRACT |

Meet HDAP: Directory Innovation Based on Big Data Technology by Radiant Logic, Inc.

May 2014 - (Free Research)
View this webcast to discover the advantages of big data-run highly available directory access protocol (HDAP) for today's more scalable user environments. 
(WEBCAST) READ ABSTRACT |

Meet HDAP: The World's First Large-Cluster, Elastic LDAP v3 Directory Built on "Big Data" Standards by Radiant Logic, Inc.

June 2014 - (Free Research)
This white paper reveals the advantages HDAP has over LDAP and why it is a better fit for enterprise identity management. 
(WHITE PAPER) READ ABSTRACT |

Migrating from Netware to Active Directory by Dell Software

July 2010 - (Free Research)
In this new Quest Software white paper, get the facts on a safe and secure migration from NetWare. Learn the reasons why now really is the best time to put a migration plan together, and discover how automated migration tools make the job easy, accurate and fast. Read this valuable white paper today. 
(WHITE PAPER) READ ABSTRACT |

DataNAS XP by Excel Meridian Data, Inc.

The DataNAS XP is designed with performance in mind integrating Pentium Technology, Gigabit connectivity and low cost IDE resources to produce a reliable and economical NAS Filer. The DataNAS XP is scalable from 240GB to 2TB of storage capacity and provides unified file data access for your mixed environment clients without expensive licenses. 
(HARDWARE PRODUCT)

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation

January 2009 - (Free Research)
Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Cisco VPN Client Large-Scale Deployments by Global Knowledge Network, Inc.

March 2006 - (Free Research)
This paper explores the tools Cisco provides to simplify mass deployments of the VPN Client. The two methods are discussed: the creation of an installation CD-ROM and network-based installations. I will explain how to reduce calls to the Help Desk by locking users out of advanced configuration functions in the user interface. 
(WHITE PAPER) READ ABSTRACT |

NetStor MVD NAS by Excel Meridian Data, Inc.

NetStor MVD NAS is extremely versatile and scalable solution. Up-to (6) Gigabit NIC's per system, up-to (15) separate hardware driven RAID's, Snapshot file system for instant file restoration, local or remote tape backup options. Web based administration interface, native Windows file security. 
(HARDWARE PRODUCT)

Wireless LAN ITDC - Checklist #2 by SearchSecurity.com

October 2012 - (Free Research)
Download this quick read to get an overview of technical requirements for wireless solutions, questions to ask potential vendors, and a list of vendors that have products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

The Top 12 Most Difficult Active Directory Management Tasks by Dell Software

October 2008 - (Free Research)
This paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier. 
(WHITE PAPER) READ ABSTRACT |

Mastering Active Directory Migrations: Controlling Critical Issues (webcast) by Dell Software

October 2013 - (Free Research)
This new webcast explores Active Directory migration challenges, key considerations for planning your own transition and how Dell Software's Active Directory migration and management solutions can help. 
(WEBCAST) READ ABSTRACT |

Active Directory Expert Best Practices and Security Tips by Centrify Corporation

December 2012 - (Free Research)
Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more. 
(EGUIDE) READ ABSTRACT |

Using Microsoft Active Directory in the Domino World by PistolStar, Inc.

February 2009 - (Free Research)
Active Directory for Windows-based Lotus shops has left administrators with yet another account to manage. Learn about the password management challenges AD brings and the benefits of enabling users to use AD as a central authentication point. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Ensuring High Availability for Active Directory by Dell Software

September 2010 - (Free Research)
Every Active Directory administrator will agree that the health stability and recoverability of Active Directory is essential for the enterprise. If Active Directory fails, even in the slightest manner, one or all of the services and communications with Active Directory can also fail. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Directory Services Integration with Database Enterprise User Security by Oracle Corporation

April 2008 - (Free Research)
This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment. 
(WHITE PAPER) READ ABSTRACT |

The Seven Common Challenges of Administering Active Directory by NetIQ Europe

May 2011 - (Free Research)
This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties. 
(WHITE PAPER) READ ABSTRACT |

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories by Radiant Logic, Inc.

February 2011 - (Free Research)
This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Integrating Mac OS X into Active Directory by CDW

April 2010 - (Free Research)
Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment. 
(VIDEOCAST) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

1 - 25 of 453 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts