Related WhatWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Related What returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Management
 •   Virtualization
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Customer Relationship Management (CRM)
 •   Wireless Technologies and Mobile Computing
 •   Business Process Management (BPM)

Related Searches
 •   Benefit Of Related
 •   Finds Related What
 •   Practice Related What
 •   Related Configuration
 •   Related Remote
 •   Related What Georgia
 •   Related What Global
 •   Related What Note
 •   Warehouse Related What
 •   Webcast Related
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Creating Sound Infrastructure Foundation for SOA and Integration by IBM

April 04, 2014 - (Free Research)
What are successful companies doing to tackle the modern integration landscape? Find out in this expert e-guide that features two discussions with principal enterprise architect at freight logistics company Conway Inc. Maja Tibbling. 
(EGUIDE) READ ABSTRACT |

4G mobile phone (LTE) revenue opportunities for business by ComputerWeekly.com

November 25, 2010 - (Free Research)
This  Whitepaper is based on Juniper Research’s  November 2010 report entitled:  “4G LTE Revenue Opportunities: Business Models, Scenarios and Operator Strategies 2010-2015”. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 27 September 2011: Download the latest issue of the UK's leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers by ComputerWeekly.com

September 27, 2011 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at Windows 8 - identifying what new features will be key to business users; and examine the remains of the National Programme for IT and what this means for the future of the NHS. Download the latest issue now. 
(EZINE)

E-Guide: PCI DSS 2011: Key themes to watch by SearchSecurity.com

May 20, 2011 - (Free Research)
This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines. 
(EGUIDE) READ ABSTRACT |

The Definitive Guide to Windows Application Server and Backup 2.0 - Chapter 3: Whole Server Backups by AppAssure Software, Inc.

September 21, 2009 - (Free Research)
Ready to start ensuring solid backups in your environment, the Backup 2.0 way? That's what this chapter is all about, and what I call "whole server backups" is definitely the right place to begin. In this chapter, we'll discuss all the most common types of servers, what their native solutions look like, and assemble a Backup 2.0 wishlist. 
(WHITE PAPER) READ ABSTRACT |

What's New in BlackBerry® Enterprise Server v4.1 with Service Pack 5 for Microsoft® Exchange by BlackBerry

March 2008 - (Free Research)
View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange. 
(WEBCAST) READ ABSTRACT |

Email Archiving in Exchange 2010: Are Third-Party Solutions Still Necessary? by Proofpoint, Inc.

February 2010 - (Free Research)
With the introduction of basic email retention and discovery features in Exchange 2010, some organizations are delaying or canceling the deployment of third-party email archiving solutions. But can Exchange adequately address these three critical business issues? And what about organizations that aren't planning to upgrade anytime soon? 
(WEBCAST) READ ABSTRACT |

BPM Projects: What You Need to Know by IBM

November 2013 - (Free Research)
While business process management (BPM) can offer improved efficiency and cost savings, many people can be resistant to change, especially when it comes to alterations of roles, status, or priorities. In this expert e-guide, Gartner VP and distinguished analyst Tina Nunno explains how to avoid four main change-related pitfalls of BPM projects. 
(EGUIDE) READ ABSTRACT |

IBM Adds Real-time Compression to Storage by IBM

June 2012 - (Free Research)
Why should your data center deploy Storwize V7000 with Real-time Compression? From an economic standpoint, Storwize V7000 provides the financial benefits you need to meet the growing storage requirements within the limits of a constrained budget. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

PST Archiving: What is it and How is it Done? by CommVault Systems, Inc.

January 2014 - (Free Research)
This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files. 
(WEBCAST) READ ABSTRACT |

Password Management Survey by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
This report shows how RoboForm Enterprise password management solution, can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs. 
(WHITE PAPER) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

How Green is Your Storage? by 3PAR

June 2008 - (Free Research)
In this Videocast, renowned storage expert, Jon Toigo, outlines the Green Data Project, provides an overview of green storage and explores other relevant topics. 
(VIDEOCAST) READ ABSTRACT |

5 Best Practices for Telling Great Stories with Data by Tableau Software

February 2008 - (Free Research)
Data doesn't have to be only fact driven and metric. Learn these five best practices to help you make sense and order out of a disparate collection of facts. 
(WHITE PAPER) READ ABSTRACT |

Managing Today's Data Centers: Avoiding the Impending Crisis by Aperture - An Emerson Network Brand

February 2008 - (Free Research)
High-density equipment has created significant benefits for organizations. However, there are challenges with high-density that could negatively impact organizations. Download this paper for a look at challenges and key issues facing organizations. 
(WHITE PAPER) READ ABSTRACT |

Let Innovation, Not Technology, Drive Your Product Business by SAP America, Inc.

July 1967 - (Free Research)
SAP's unique Product and Service Leadership framework is a strategy for companies to bring innovative products to market faster and to drive value for their customers. Learn more about it in this whitepaper. 
(WHITE PAPER) READ ABSTRACT |

Password Management Survey by RoboForm Enterprise

September 2008 - (Free Research)
This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs. 
(WHITE PAPER) READ ABSTRACT |

Honey Stick Report Results by Symantec Corporation

April 2012 - (Free Research)
The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Getting the Most Out of Your BI Investment in SAP Environments by IBM

December 2010 - (Free Research)
In this e-book, readers will get an overview of SAP’s BI strategy, and get advice on what to do about BEx, BW, and more to develop long-term BI strategies of their own. Read on to learn how to get the most out of your BI investment in SAP environment. 
(EBOOK)

Collaborative Reporting Architecture by Actuate

July 2008 - (Free Research)
The Collaborative Reporting Architecture represents a breakthrough in BI by bringing not only technology, but also the principals of open source development, into reporting applications of any size and complexity. 
(WHITE PAPER) READ ABSTRACT |

What's New in Cloud Storage? by NetApp

February 2013 - (Free Research)
Each year, new storage challenges come to the surface, and vendors set out on creating solutions to overcome them. In this issue of Storage Magazine, our editors examine the current storage lineup and reveal the offerings that stand out across six critical categories. 
(EZINE) READ ABSTRACT |

Mainframe Performance Management: A New Twist by CA Technologies.

October 2008 - (Free Research)
Read this white paper featuring mainframe expert Wayne Kernochan to gain insight on insight on performance management software - specifically as it relates to the mainframe - and on why this technology is more important now than ever before. 
(WHITE PAPER) READ ABSTRACT |

E911 VoIP Essentials for Enterprise Deployments by XO Communications

December 2010 - (Free Research)
Deploying VoIP across multiple business locations is a great way to simplify and streamline your distributed network and reduce costs, but how does a business provide E911 effectively across the enterprise and what are the legal requirements? 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts