Public Activity NetworkingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Public Activity Networking returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Network Security
 •   Network Management
 •   Security Monitoring
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Security Policies
 •   Budgeting, Financial Planning and Analysis
 •   Application Security

Related Searches
 •   Database Public Activity
 •   Forms Public Activity
 •   Linux-Based Public
 •   Public Activity Making
 •   Public Activity Rfp
 •   Public Disk
 •   Public Script
 •   Public Software
 •   Public Solutions
Advertisement

ALL RESULTS
1 - 25 of 452 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Unified network traffic monitoring for physical and VMware environments by NetFort Technologies Ltd

October 25, 2010 - (Free Research)
This white paper outlines an approach, based on monitoring network traffic, that delivers a unified view of network activity across virtual and physical components of the network. 
(WHITE PAPER) READ ABSTRACT |

Take Back Control: Increase Security, Empower Employees, Protect the Business by WatchGuard Technologies, Inc.

October 20, 2010 - (Free Research)
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more. 
(WHITE PAPER) READ ABSTRACT |

Human Capital Management for the Public Sector: Make Every Employee a Strategic Asset With Sap® Solutions by SAP AG

January 01, 2007 - (Free Research)
Discover how public sector agencies are shifting the focus in HR departments from transactional activities to performance with strategic human capital management (HCM). 
(ARTICLE) READ ABSTRACT |

X-Force Mid-Year Trend Report by IBM

January 11, 2012 - (Free Research)
This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. 
(ANALYST REPORT) READ ABSTRACT |

Fraud Detection and Prevention in the Public Sector by Information Builders

May 01, 2013 - (Free Research)
Those in the public sector are facing significant fraud, waste, and abuse (FWA) challenges. Check out this informative paper today to learn of these challenges and discover a fraud detection and prevention framework to help combat fraud before it occurs. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 1 May 2012: The technology behind the England football team by ComputerWeekly.com

May 01, 2012 - (Free Research)
This week's Computer Weekly examines how the Football Association's IT director is using technology to help improve the prospects for the England national team. Our Buyer's Guide to government IT looks at the future of open source in the public sector and we report from Infosec 2012 on the rising number of cyber attacks. Read the issue now. 
(EZINE)

Three simple steps to building a digital framework by ComputerWeekly.com

December 10, 2013 - (Free Research)
Mark Thompson, Digital and IT Director for TUI Travel Specialist & Activity, discusses IT transformation in this PowerPoint presentation. 
(PRESENTATION) READ ABSTRACT |

Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Founding Principles by ComputerWeekly.com

February 07, 2011 - (Free Research)
The overriding goals for Data Centre Consolidation, the G-Cloud and the Applications Store for Government are:Reduce ICT costs;Provide open competition and create a vibrant marketplace enabling the best product at the best price;Create flexibility. 
(WHITE PAPER) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 07, 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

Terrorist use of the internet by ComputerWeekly.com

May 23, 2014 - (Free Research)
Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats? 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: The role of the IT department in mergers and acquisitions by ComputerWeekly.com

July 13, 2010 - (Free Research)
Mergers and acquisitions (M&As) are among the biggest challenges for enterprises and their IT organisations to navigate. Conventional leadership and management techniques often are not enough. 
(WHITE PAPER) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

The Financial Edge™: Fund Accounting Software for Nonprofits by Blackbaud

The Financial Edge gives you all the information you need to make the best financial decisions for today and tomorrow. Think of it as insurance for your organization’s future. 
(ASP & SOFTWARE PRODUCT)

Implementing ERP: Lessons Learned from the Front by SAP America, Inc.

August 2008 - (Free Research)
SAP has implemented enterprise resource planning (ERP) systems in both the commercial and public sector for more than 30 years. This white paper explains four important principles that stand out from these experiences. 
(WHITE PAPER) READ ABSTRACT |

What Auditors Think about Crypto by Thales

May 2011 - (Free Research)
Thales e-Security & The Ponemon Institute present a joint webinar “What Auditors Think about Crypto”. The webinar discusses the findings of a recent survey that was conducted with auditors in various industries. 
(WEBCAST) READ ABSTRACT |

Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution by Citrix Online - GotoMyPC

January 2004 - (Free Research)
Johns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely. 
(CASE STUDY) READ ABSTRACT |

VMware TV Series: The Enterprise-Class Hybrid Cloud. Delivered. by VMware, Inc.

April 2011 - (Free Research)
View this webcast to learn how VMware vCloud™ and the VMware service provider ecosystem can help you extend your VMware private cloud environment with compatible public cloud computing services. Discover how VMware delivers enterprise-class public and hybrid cloud infrastructure solutions as an evolution of virtualization. 
(WEBCAST) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 2: WebSphere sMash and DB2 Express-C on the Amazon EC2 Public Cloud by IBM

September 2010 - (Free Research)
Read this article to see how IBM WebSphere sMash and IBM DB2 Express-C Amazon Machine Images can be combined to help you deliver Web applications hosted on the Amazon Elastic Compute Cloud (EC2) infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Operational Logistics/Resource Allocation: The World's Best Business Intelligence Applications by Information Builders

December 2011 - (Free Research)
This paper highlights several real-world success stories, where a proactive approach to resource allocation was implemented. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 6 March 2012: Windows 8 - tablet meets desktop by ComputerWeekly.com

March 2012 - (Free Research)
This week’s Computer Weekly delves into the new world of Windows 8. We also talk to some top CIOs about how the downturn has shaped their priorities. You'll also find the third and final part of our Buyer's Guide to IPv6 migration, all inside this digital magazine. 
(EZINE)

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

Akershus University Hospital: Safeguarding patient privacy with security information and event management by RSA, The Security Division of EMC

May 2009 - (Free Research)
Since 1995, a series of new European regulations have been introduced to protect the security and privacy of personal data held by corporations and public bodies, particularly concerning the logging of access to sensitive information. Read this case study to learn how RSA keeps Akerus University Hospital secure and compliant. 
(CASE STUDY) READ ABSTRACT |

Linear Architecture for Municipal Wireless Video Surveillance Solutions by Motorola, Inc.

August 2009 - (Free Research)
Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed. 
(WHITE PAPER) READ ABSTRACT |

Delivering on high cloud expectations by ComputerWeekly.com

March 2012 - (Free Research)
Many firms are now planning to run mission critical workloads on public cloud, according to this research from Forrester and BMC. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 452 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts