Related HowWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Related How returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Storage Management
 •   Network Security
 •   Virtualization
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Identity Management/ User Provisioning
 •   Security Policies
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)

Related Searches
 •   Computers Related How
 •   Patent Related How
 •   Related How Controls
 •   Related How Note
 •   Related How Offices
 •   Related How Packages
 •   Related How Small
 •   Related How Wyoming
 •   Value Related How
 •   Webcasts Related How
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

How To Avoid Heartbleed Or Similar SSL Related Vulnerabilities? by i-Sprint Innovations (E-mail this company)

May 29, 2014 - (Free Research)
This informative guide explores top strategies for resolving Heartbleed and similar SSL-related vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Designing of Desktop Virtualization Architecture by Dell and VMware

July 07, 2011 - (Free Research)
Where exactly does virtualization come in when implementing a Virtual Desktop Infrastructure (VDI)? This white paper takes a look at how server virtualization and storage relate (or don't relate) to VDI, and offers advice on virtualizing your desktops. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Designing of Desktop Virtualization Architecture by Dell, Inc.

July 07, 2011 - (Free Research)
Where exactly does virtualization come in when implementing a Virtual Desktop Infrastructure (VDI)? This white paper takes a look at how server virtualization and storage relate (or don't relate) to VDI, and offers advice on virtualizing your desktops. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Effective Risk Management in a Collaboration Driven Enterprise by AvePoint, Inc.

August 01, 2008 - (Free Research)
How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability. 
(WHITE PAPER) READ ABSTRACT |

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 09, 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

CA Compliance Manager for z/OS by CA Technologies.

May 12, 2009 - (Free Research)
Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk. 
(WEBCAST) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

5 Ways VMware vSphere Improves Backup and Recovery by Veeam Software

November 10, 2009 - (Free Research)
VMware's latest enterprise-level hypervisor product suite, vSphere, includes many new features and technological enhancements over its predecessor, VMware Infrastructure 3 (VI3). This white paper focuses on how VMware improved various storage technologies, how they relate to data backup and recovery, and more. 
(WHITE PAPER) READ ABSTRACT |

Profiting from Absence Management: How to Cut the Costs of Employee Absences by Infor

December 2008 - (Free Research)
This paper explains how a decisive strategy and integrated systems will enable you to surmount the costly barriers now associated with employee absence management. 
(WHITE PAPER) READ ABSTRACT |

Capacity Allocation Efficiency Explained - Presentation Transcript by Dell, Inc.

September 2012 - (Free Research)
Jon William Toigo offers up his five best tips for maximizing efficiency in today's complex data storage environments. This tip covers capacity allocation efficiency, including advice on how to prevent storage-related downtime. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks by EMC Corporation

August 2008 - (Free Research)
Remote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues. 
(WHITE PAPER) READ ABSTRACT |

BPM Projects: What You Need to Know by IBM

November 2013 - (Free Research)
While business process management (BPM) can offer improved efficiency and cost savings, many people can be resistant to change, especially when it comes to alterations of roles, status, or priorities. In this expert e-guide, Gartner VP and distinguished analyst Tina Nunno explains how to avoid four main change-related pitfalls of BPM projects. 
(EGUIDE) READ ABSTRACT |

Universitätsklinikum Erlangen strengthens analytics expertise and focuses on a customised healthcare analytics solution by IBM

April 2013 - (Free Research)
View this white paper to learn how one company strengthened analytics by developing a focus on customised healthcare. It linked to relevant operational systems, how to optimise information flow and how to support the overall strategic control of the hospital at just the touch of a button. 
(WHITE PAPER) READ ABSTRACT |

Webinar: 20 Critical Controls for Cyber Defense by ISACA

June 2014 - (Free Research)
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity. 
(WEBCAST) READ ABSTRACT |

The Forrester Wave™: Hybrid2 Integration, Q1 2014 by MuleSoft

February 2014 - (Free Research)
Today's increasingly complex application landscape calls for new hybrid integration strategies, as businesses  must integrate on-premise and cloud-based applications. In this report from Forrester Research, Inc., see how 14 top middleware providers stack up against 51 criteria related to hybrid integration. 
(ANALYST REPORT) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

Oracle + Sun Product Strategy Webcast Series - Sun Blade Systems by Oracle Corporation

March 2011 - (Free Research)
These informative, on-demand sessions offer strategies for Sun's major product lines related to the combination, explain how Oracle will deliver more innovation to our customers, and outline our approach to protecting customers' investments. This webcast will provide you with an overview of the Oracle Sun Blade Server product line. 
(WEBCAST) READ ABSTRACT |

Transition your existing service offerings into a private or hybrid cloud-based environment with Service Catalog by CA Technologies.

August 2011 - (Free Research)
It seems as if every company is looking to gain cost advantages and efficiencies by moving toward a cloud environment.  In this webcast, learn how CA Service Catalog can define your services in business terms, and automatically provision them in a private or hybrid cloud environment provided by cloud suppliers and delivered to cloud consumers. 
(WEBCAST) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

HP Database Archiving Software by Hewlett-Packard Information Management Software (IM)

August 2011 - (Free Research)
This comprehensive paper demonstrates how data management and HP database Archiving software solves the problems that arise as a result of increased database size and unmanaged growth in production databases. 
(WHITE PAPER) READ ABSTRACT |

Responding to Major Power Outages by Emerson Network Power

December 2011 - (Free Research)
Explore this informative whitepaper to learn key steps to help you respond in the event of a major power outage and how you can leverage UPS equipment and other measures to protect your datacenter and network from power outages and power-related problems, ensuring business continuity and 24/7 uptime. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Today's Compliance and Security Data-Related Challenges by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges. 
(WHITE PAPER) READ ABSTRACT |

Smart enterprise mobility solutions are powered by Smart Containerization™ by CA Technologies.

June 2014 - (Free Research)
This informative white paper examines a technique called containerization, which allows you to keep enterprise data segregated in its own "container" so that you can apply security policies without affecting any data that isn't work related. 
(WHITE PAPER) READ ABSTRACT |

University of Tennessee Knoxville Success Story by Citrix

March 2014 - (Free Research)
This whitepaper explains how this university was able to support anywhere, anytime student computing while conserving IT resources by adopting a desktop virtualization delivery system. 
(WHITE PAPER) READ ABSTRACT |

The Falling Cost and Rising Value of Desktop Virtualization by Citrix

January 2014 - (Free Research)
This whitepaper details the major business drivers for desktop virtualization and reveals how falling costs and simpler, more efficient architectures make virtual desktops more valuable than ever before. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts