Related DataWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Related Data returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Enterprise Content Management (ECM)
 •   Databases
 •   Statistical Data Analysis
 •   Customer Information Management/ Customer Databases
 •   Data Center Management
 •   Network Security
 •   Mobile Device Management
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Contacts Related
 •   Device Related
 •   Hardware Related Data
 •   Related Data Files
 •   Related Data Import
 •   Related Data Mississippi
 •   Related Data Tool
 •   Related Illinois
 •   Size Related
 •   Technology Related
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Protecting Data from the Cyber Theft Pandemic by FireEye

April 20, 2009 - (Free Research)
Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Strategies to Improve Application Testing: Optimized Test Environments Speed the Deployment of Reliable Applications by IBM

March 2008 - (Free Research)
Princeton Softech Optim™ enables IT organizations to meet even the most complex application testing challenge by providing all the fundamental components of an effective test data management strategy. 
(WHITE PAPER)

Defending Against APTs: Do You Have the Complete Picture? by Hexis Cyber Solutions Inc

July 2013 - (Free Research)
Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats. 
(WHITE PAPER) READ ABSTRACT |

Strengthening Enterprise Security through Notebook Encryption by Intel Corporation

December 2008 - (Free Research)
Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner. 
(WHITE PAPER)

Discover the Unique Benefits of Enterprise Search Technology for Your Organization by Google Search Appliance

December 2010 - (Free Research)
Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market. 
(EGUIDE) READ ABSTRACT |

The Flawed Vision of Customer Data Integration – How to Get it Right the First Time by Siperian, Inc.

September 2009 - (Free Research)
The initial goal of Customer Data Integration (CDI) was to create the most reliable customer data for the entire company. We now know that the golden opportunity for CDI lies within Master Data Management and the ability to uncover interactions and understand the relationships that companies have with their customers. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Data Governance: The Human Element by SAS

April 2013 - (Free Research)
This white paper explores the human element of enterprise data governance, as nearly every organizational task involving employees affects data quality. Read more to learn, through a simulated case study, how to combat people-related, data integration, organizational and cultural issues. 
(WHITE PAPER) READ ABSTRACT |

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities? by i-Sprint Innovations (E-mail this company)

May 2014 - (Free Research)
This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Today's Compliance and Security Data-Related Challenges by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Designing of Desktop Virtualization Architecture by Dell, Inc.

July 2011 - (Free Research)
Where exactly does virtualization come in when implementing a Virtual Desktop Infrastructure (VDI)? This white paper takes a look at how server virtualization and storage relate (or don't relate) to VDI, and offers advice on virtualizing your desktops. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Genius Project4Domino Versus Microsoft Project Server 2007 by Genius Inside

October 2007 - (Free Research)
The goal of this white paper is to demonstrate that Genius Project4Domino has a stronger ROI, is better integrated, is rich in features, and is a more cost effective (TCO) alternative - especially for Domino and Lotus Notes users. The comparison benefits for Exchange and other platforms are similar. 
(WHITE PAPER) READ ABSTRACT |

vokeStream Market Snapshot: Automated Testing of Networks and Connected Devices by Fanfare

November 2007 - (Free Research)
Service providers and network equipment manufacturers are adding automation to their pre-production testing process for a combination of reasons. This Market Snapshot will focus on the need for test automation of networks and connected devices, identify a path to automation adoption and provide an overview of the market. 
(ANALYST REPORT) READ ABSTRACT |

The Innovation Barrier, Part 2: Symptoms, Solutions, and the Impact on Equipment Manufacturers by Fanfare

November 2007 - (Free Research)
This paper is the second in a two-part series exploring the innovation barrier – the point at which testing can no longer keep pace with development in the equipment manufacturing industry. It examines the innovation barrier’s symptoms – from slowdowns in development to mounting quality issues – and the potential impact on equipment manufacturers. 
(WHITE PAPER) READ ABSTRACT |

HP Integrity Server Blades: Meeting Mission-Critical Requirements with a Bladed Form Factor by HP & Intel®

September 2010 - (Free Research)
This paper outlines the trends in the industry relating to blade server deployments, the challenges relating to systems management and power and cooling in that computing environment, and HP's approach to addressing those challenges. 
(WHITE PAPER) READ ABSTRACT |

HP Integrity Server Blades: Meeting Mission-Critical Requirements with a Bladed Form Factor by HP & Intel®

August 2010 - (Free Research)
This paper outlines the trends in the industry relating to blade server deployments, the challenges relating to systems management and power and cooling in that computing environment, and HP's approach to addressing those challenges. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Designing of Desktop Virtualization Architecture by Dell and VMware

July 2011 - (Free Research)
Where exactly does virtualization come in when implementing a Virtual Desktop Infrastructure (VDI)? This white paper takes a look at how server virtualization and storage relate (or don't relate) to VDI, and offers advice on virtualizing your desktops. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webinar: 20 Critical Controls for Cyber Defense by ISACA

June 2014 - (Free Research)
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity. 
(WEBCAST) READ ABSTRACT |

Expert Tips to Address 3 Virtualization-Related Storage Issues by SearchStorage.com

May 2013 - (Free Research)
This expert E-Guide provides insight into the processes and tools you can use to overcome virtualization-related storage challenges in the areas of efficiency, deployment time and complexity. 
(EGUIDE) READ ABSTRACT |

Effective Risk Management in a Collaboration Driven Enterprise by AvePoint, Inc.

August 2008 - (Free Research)
How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability. 
(WHITE PAPER) READ ABSTRACT |

The Implementation of LISP as it Relates to Cisco OTV by Global Knowledge

March 2014 - (Free Research)
The purpose of this paper is to examine the four common elements for the implementation of Open Shortest Path First (OSPF). 
(WHITE PAPER) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

5 Ways VMware vSphere Improves Backup and Recovery by Veeam Software

November 2009 - (Free Research)
VMware's latest enterprise-level hypervisor product suite, vSphere, includes many new features and technological enhancements over its predecessor, VMware Infrastructure 3 (VI3). This white paper focuses on how VMware improved various storage technologies, how they relate to data backup and recovery, and more. 
(WHITE PAPER) READ ABSTRACT |

Profiting from Absence Management: How to Cut the Costs of Employee Absences by Infor

December 2008 - (Free Research)
This paper explains how a decisive strategy and integrated systems will enable you to surmount the costly barriers now associated with employee absence management. 
(WHITE PAPER) READ ABSTRACT |

Back to the Future: The New IT Infrastructure Opportunity by Avocent

June 2011 - (Free Research)
Access this exclusive resources to discover new technology and solutions to address security and operating expense (OPEX) issues related to distributed computing such as thin client, fast client, diskless workstations, SaaS, and VDI. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts