Publishing ImplementingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Publishing Implementing returned the following results.
RSS What is RSS?
Related Categories

 •   Web Content Management and Publishing
 •   Enterprise Content Management (ECM)
 •   Business Process Management (BPM)
 •   Data Security
 •   Website Design and Development
 •   Enterprise Resource Planning (ERP)
 •   Business Intelligence Solutions
 •   Data Center Management
 •   Virtualization
 •   Web Site Optimization

Related Searches
 •   Companies Publishing Implementing
 •   Price Publishing
 •   Publishing Illinois
 •   Publishing Implementing Arkansas
 •   Publishing Implementing Coding
 •   Publishing Implementing Recovery
 •   Publishing Implementing Timeline
 •   Publishing Manufacturers
 •   Techniques Publishing Implementing
 •   White Papers Publishing Implementing
Advertisement

ALL RESULTS
1 - 25 of 421 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Harvard Business Publishing Uses Open Source ECM to Transform into a Digital Media Enterprise by Rivet Logic Corporation

March 01, 2009 - (Free Research)
Rivet Logic and Harvard Business Publishing (HBP) implemented an enterprise content management (ECM) solution that unlocked content across all publishing divisions. This agile solution enabled HBP to broaden and accelerate its digital publishing activities by making content easily searchable and manageable for all business end-users. 
(CASE STUDY) READ ABSTRACT |

Optimizing Worldwide SharePoint Data and Content Access with DocAve by AvePoint, Inc.

July 29, 2011 - (Free Research)
This white paper outlines the technological and infrastructural barriers that businesses must overcome to ensure their SharePoint platform can quickly respond to ever-changing needs at "Web speed." 
(WHITE PAPER) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 18, 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

IBM Social Business Adoption QuickStart by IBM

July 17, 2013 - (Free Research)
Companies are investing in social business software to enhance knowledge exchange and sharing, streamline their operations and improve their response to evolving market demands. Consult this white paper to find out how to implement social business in the most effective way. 
(WHITE PAPER) READ ABSTRACT |

Implementing ITIL Using the PMBOK Guide in Four Repeatable Steps by Global Knowledge

January 2006 - (Free Research)
This white paper provides an overview of the PMBOK® and the key process areas and functions within the IT Infrastructure Library. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

A 15 Minute Guide to Enterprise Content Management by EMC Corporation

March 2008 - (Free Research)
Learn how to manage all the unstructured content in your organization. This 15 Minute Guide to Enterprise Content Management shows how to turn content into an asset for making faster decisions, winning and keeping customers and improving workflow. 
(WHITE PAPER) READ ABSTRACT |

Marketing in the Age of Digital Content:The Business Case for an Enterprise Marketing Platform by EMC Corporation

September 2008 - (Free Research)
In the age of digital content, marketing departments are increasingly tasked with creating digital experiences to promote their companies' brands. 
(WHITE PAPER) READ ABSTRACT |

Implementing a "Smart IPS": IANS Working Knowledge Series™ by Sourcefire

June 2008 - (Free Research)
The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire. 
(CASE STUDY) READ ABSTRACT |

Intel IT: Implementing Virtualization in a Global Environment by Intel Corporation

November 2008 - (Free Research)
Learn all the ways that server virtualization and consolidation can benefit IT: everything from greater agility to lower energy bills. 
(WHITE PAPER)

Kelley Blue Book Case Study by Microsoft

July 2007 - (Free Research)
In 2006, Kelley Blue Book implemented a new analytical capabilities solution based on Microsoft Business Intelligence technologies. Now Kelley Blue Book has improved sales staff efficiency and created a compelling new Web analytics product that can provide its business customers with more targeted data for their marketing efforts. 
(CASE STUDY) READ ABSTRACT |

How to Implement Chargeback in a Virtualized Data Center Using the Resource Consumption Model by VKernel

February 2008 - (Free Research)
When IT professionals make massive investments in the virtualized data center, financial controls to contain sprawl and maintain control are essential. This white paper shows you how to do so by implementing chargeback. 
(WHITE PAPER) READ ABSTRACT |

Implementing ERP: Lessons Learned from the Front by SAP America, Inc.

August 2008 - (Free Research)
SAP has implemented enterprise resource planning (ERP) systems in both the commercial and public sector for more than 30 years. This white paper explains four important principles that stand out from these experiences. 
(WHITE PAPER) READ ABSTRACT |

Implementing an identity management solution by SAP America, Inc.

June 2008 - (Free Research)
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory. 
(WHITE PAPER) READ ABSTRACT |

Roadmap for Implementing a Multi-Site IP Contact Center by Avaya Inc.

May 2008 - (Free Research)
Explore a three-part guide to identifying the potential presented by Internet Protocol (IP), building a business case for migration to IP and ultimately designing and implementing an IP infrastructure. 
(WHITE PAPER) READ ABSTRACT |

The New Information Agenda: Do You Have One? by IBM

May 2008 - (Free Research)
This white paper defines the information agenda; describes key considerations and best practices in creating and implementing an information agenda. 
(WHITE PAPER)

Simple Ways to Get the Most from Your Blade Environment by HP & Intel®

December 2008 - (Free Research)
Bladed environments have proven their ability to reduce complexity and costs, while also delivering an impressive level of flexibility to help organizations of all types and sizes quickly adapt to evolving requirements and realities. 
(WHITE PAPER) READ ABSTRACT |

Overcoming the Challenges of Green Procurement through eProcurement by Dimension Data Global

October 2008 - (Free Research)
This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program. 
(WHITE PAPER) READ ABSTRACT |

Maximizing IT Investments: Recession-proofing Your Network by F5 Networks

July 2008 - (Free Research)
This whitepaper outlines a plan that enables network teams to implement a plan that optimizes application performance. It also identifies recession-proof networking technologies and their challenges. 
(WHITE PAPER) READ ABSTRACT |

Top Considerations for Implementing Secure Backup and Recovery by Zmanda Inc.

July 2008 - (Free Research)
Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data. 
(WHITE PAPER) READ ABSTRACT |

Best Practices When Enabling Smart Card Authentication by Raritan Inc.

January 2007 - (Free Research)
When implementing an analog KVM solution, enabling users to employ smart cards for the purpose of accessing servers should not be a daunting task. 
(WHITE PAPER) READ ABSTRACT |

The Essential Guide to Protecting Essential Information by Websense, Inc.

November 2008 - (Free Research)
Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential. 
(ARTICLE) READ ABSTRACT |

A More Secure Front Door: SSO and Strong Authentication by Imprivata

February 2011 - (Free Research)
Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs. 
(WHITE PAPER) READ ABSTRACT |

The Foundation of High-Value Business Intelligence: A Description of the WebFOCUS 7.1 Architecture by Information Builders

June 2006 - (Free Research)
Good architecture for information systems is as important as good engineering is for automobiles and with good architecture, applications can be scaled up with less hardware. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 421 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts