Public Activity Based White PaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Public Activity Based White Paper returned the following results.
RSS What is RSS?
Related Categories

 •   Identity Management/ User Provisioning
 •   Storage Management
 •   Network Security
 •   Endpoint Security
 •   Data Security
 •   Application Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Disk-based Backup & Storage/ RAID
 •   Application Management and Maintenance

Related Searches
 •   About Public Activity
 •   Computers Public Activity
 •   Contract Public
 •   License Public Activity Based
 •   Public Activity Based Florida
 •   Public Activity Based Reviews
 •   Public Activity Metrics
 •   Public Computer
 •   Public Minnesota
 •   Using Public Activity Based
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The AT&T Telepresence Solution: Transforming Business at AT&T by AT&T Corp

April 05, 2010 - (Free Research)
This paper details the gains AT&T has achieved from using the AT&T Telepresence Solution: Improved productivity, increased business velocity, controlled costs, strengthened business relationships and reduced environmental impact. 
(WHITE PAPER) READ ABSTRACT |

Integrating Use Cases, Storyboarding and Prototyping by Ivar Jacobson Consulting

June 2008 - (Free Research)
This white paper discusses how to optimize requirements gathering and documentation through the integration of use case, storyboarding and prototyping. 
(WHITE PAPER) READ ABSTRACT |

Log Management in the Cloud: A Comparison of In-House Vs. Cloud-Based Management of Log Data by Alert Logic

December 2008 - (Free Research)
This white paper presents some questions to consider when vetting your business needs against each type of log management model. 
(WHITE PAPER) READ ABSTRACT |

Using Technologies to Increase Perfect Order Metrics by Intermec

August 2008 - (Free Research)
Companies are continually finding new ways to get the right goods to the right customers on time. This white paper explains how each aspect of perfect order performance can be improved through enhancements to data collection processes and technologies. 
(WHITE PAPER) READ ABSTRACT |

Realize positive ROI on your SOA investments by Vitria Technology, Inc.

May 2008 - (Free Research)
This white paper discusses the steps to achieve greater operational visibility to better meet customer requirements and enhance business responsiveness. 
(WHITE PAPER) READ ABSTRACT |

Cloud Services: What Are They, What Value Do They Provide? by AT&T Corp

August 2010 - (Free Research)
AT&T defines the cloud as a way for enterprises to quickly and easily tap computing, storage, software, development and network resources on demand. The model offloads the capex burden from enterprise budgets and moves it into a "pay-as-you-use" service model, reducing overall IT spend and service commitment terms.<!-- /Executive Summary --> 
(WHITE PAPER)

SAML 101 White Paper by Ping Identity Corporation

December 2012 - (Free Research)
Read this whitepaper to learn how identity federation has helped provide a secure, private mechanism for organizations to share user identities. And discover how this solution can help you enhance security, limit risk and improve compliance by eliminating Web application passwords. 
(WHITE PAPER) READ ABSTRACT |

Five Reasons It’s Time For Secure Single Sign-On by Ping Identity Corporation

July 2013 - (Free Research)
This white paper outlines five reasons why single sign-on is a smart choice for cloud apps – from improved security to increased customer engagement. Inside, discover how to dramatically increase the overall ROI and user adoption rate of cloud applications. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Internet Single Sign-On (SSO) by Ping Identity Corporation

June 2009 - (Free Research)
This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on. 
(WHITE PAPER) READ ABSTRACT |

Achieve Immediate Returns With Practical Storage Management by Northern Parklife

February 2009 - (Free Research)
This white paper in an introduction to Northern Storage Suite, a perfect solution for organizations seeking to implement a systematic approach to storage resource management, once and for all reclaiming control over previously ungoverned storage use. 
(WHITE PAPER) READ ABSTRACT |

X-Force Mid-Year Trend Report by IBM

January 2012 - (Free Research)
This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. 
(ANALYST REPORT) READ ABSTRACT |

Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management by Northern Parklife

February 2009 - (Free Research)
In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention. 
(WHITE PAPER) READ ABSTRACT |

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing by Ping Identity Corporation

August 2012 - (Free Research)
In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

Adaptec Intelligent Power Management: Reducing IT Costs and Storage Power Consumption by Up to 70% by Adaptec, Inc.

October 2009 - (Free Research)
The challenge of saving power while maintaining server performance has become a primary concern within the IT environment. But, the latest generation of Adaptec RAID controllers provides Intelligent Power Management software and supports a variety of techniques that, together, enable significant savings without compromising performance. 
(WHITE PAPER) READ ABSTRACT |

Fraud Detection and Prevention in the Public Sector by Information Builders

May 2013 - (Free Research)
Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs. 
(WHITE PAPER) READ ABSTRACT |

A Primer On the System for Cross Domain Identity Management (SCIM) by Ping Identity Corporation

January 2014 - (Free Research)
Single sign-on (SSO) requires user provisioning. But, since traditional provisioning systems have struggled to scalably manage identities due to the diversity of applications, the need for a solution is dire. In this white paper, learn about how SCIM overcomes this issue and has gained adoption among application vendors. 
(WHITE PAPER) READ ABSTRACT |

Security Assertion Markup Language (SAML) - the Essential Guide by Ping Identity Corporation

September 2011 - (Free Research)
This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more! 
(WHITE PAPER) READ ABSTRACT |

Reinforce Business Objectives and Achieve ROI with Internet Identity Security by Ping Identity Corporation

June 2009 - (Free Research)
Read this white paper to learn how after deploying PingFederate or PingConnect your organization will yield a high return on investment and run more efficiently and will have distinct competitive advantage over companies that do not leverage Internet Identity Security Software. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Supply Chain Technology Trends by Intermec

June 2008 - (Free Research)
This white paper identifies the top 10 technology trends in mobile, industrial and supply chain operations environments and presents results from users who have adapted the technologies to improve their businesses. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Trasluz Casual Wear - Stylish Results in Children's Clothing by Intermec

October 2013 - (Free Research)
Access this white paper today to learn more about how implementing a comprehensive track-and-trace solution brought success in this case study, and consider applying the solution to your own business! 
(WHITE PAPER) READ ABSTRACT |

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future by Intermec

May 2011 - (Free Research)
This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future. 
(WHITE PAPER) READ ABSTRACT |

Buyer's Guide to Log Management: Comparing On-Premise and On-Demand Solutions by Alert Logic

March 2007 - (Free Research)
This white paper examines and compares two solutions to log management - traditional on-premise log management managed in-house by the infrastructure team and a Software-as-a-Service (SaaS). 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance Made Simple by Alert Logic

March 2007 - (Free Research)
This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1, discusses best practices to achieve PCI compliance, and identifies which of these requirements can be satisfied by Alert Logic. 
(WHITE PAPER) READ ABSTRACT |

Internet-Scale Identity Systems: An Overview and Comparison by Ping Identity Corporation

August 2009 - (Free Research)
This white paper provides an overview of the key initiatives for Internet-scale identity systems and explores the similarities, differences, and synergies between them. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts