Reports TheWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Reports The returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Data Protection and Privacy
 •   Marketing Management
 •   Wireless Technologies and Mobile Computing
 •   Business Intelligence Solutions
 •   Vulnerability Assessment
 •   Business to Business Web Commerce
 •   Social Networks and Community Management

Related Searches
 •   B2C Reports The
 •   Directory Reports
 •   Function Reports
 •   Orders Reports
 •   Reports Operating
 •   Reports The Plan
 •   Reports The Pricing
 •   Reports The Public
 •   Reports The Tracking
 •   Reports The Unix
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Symantec Internet Security Threat Report: Trends for 2008 by Symantec Corporation

April 01, 2009 - (Free Research)
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally. 
(WHITE PAPER) READ ABSTRACT |

Symantec Internet Security Threat Report by Symantec Corporation

April 01, 2008 - (Free Research)
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: The Total Economic Impact of Oracle Identity Manager by Oracle Corporation

November 03, 2008 - (Free Research)
This report walks through detailed return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Readers can use the model suggested in this report to design their implementation and measure results. 
(ANALYST REPORT) READ ABSTRACT |

IDC Report: The Benefits of Converged Systems in SMB Environments by Dell, Inc. and Intel®

August 07, 2013 - (Free Research)
This analyst report examines the current usage and adoption of converged systems and explains why SMBs and remote offices stand to gain the most from them. Find out how much your peers are spending on these alternative procurement models and get answers to frequently asked questions about them. 
(WHITE PAPER) READ ABSTRACT |

Analyst Report: The Economic Impact Of The IBM Rational Solution for Collaborative Lifecycle Management by IBM

June 30, 2013 - (Free Research)
Application development and deployment is often done in siloes -- which can cause major project delays and budget overruns. Check out this Forrester report to learn how collaborative lifecycle management can improve software quality and delivery, while improving collaboration between teams. 
(ANALYST REPORT) READ ABSTRACT |

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape by ESET

December 02, 2010 - (Free Research)
In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more.  
(PODCAST) READ ABSTRACT |

ESG Report: The Far Reaching Benefits of IT Efficiency by EMC Corporation

February 02, 2009 - (Free Research)
This report covers the primary means of gaining efficiency across the business and IT enterprise. It's realized by consolidating infrastructure and data, both physically and virtually. 
(WHITE PAPER) READ ABSTRACT |

Forrester Report: The Total Economic Impact™ Of The Cisco Unified Computing System by Cisco (E-mail this company)

January 04, 2012 - (Free Research)
This white paper quantifies the advantages of unified computing and presents key findings from interviews with organizations who implemented it. Discover the savings you can expect across several key categories and determine whether this IT model is right for your organization. 
(WHITE PAPER) READ ABSTRACT |

ESG Market Report: The EVAS Market - The Evolution of NAC by ForeScout Technologies, Inc.

July 31, 2013 - (Free Research)
For many businesses, network access control is essential for their network security since the days of Ethernet and IP. This guide outlines the history of network access control and how you can implement more effective policies to secure your network. 
(WHITE PAPER) READ ABSTRACT |

EMA/CXP Research Report: The Changing Role of the Service Desk in the Age of Cloud and Agile by IBM

April 10, 2013 - (Free Research)
This whitepaper reveals the results of a study that will show you how and why your IT service desk needs to adapt to the times. 
(WHITE PAPER) READ ABSTRACT |

EMA Report: The Benefits of a Unified Endpoint Management Approach by IBM

January 24, 2011 - (Free Research)
Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition by IBM

October 27, 2010 - (Free Research)
In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points. 
(WHITE PAPER) READ ABSTRACT |

The work/life report: The Hybrid Organisation: Technology by ComputerWeekly.com

June 15, 2010 - (Free Research)
The enterprise must be ready to embrace technologies that facilitate the blurring of the boundaries between work and life, in order to maximise the productivity, insight, innovation and collaboration gained from investments in its people, as well as technology itself. 
(WHITE PAPER) READ ABSTRACT |

CW+: Quocirca report: The perfect storm: time to review client computing strategies by ComputerWeekly.com

September 10, 2010 - (Free Research)
For many years, server-based computing has been seen as a means of, at best, providing those within highly task-based environments with a controlled desktop environment. 
(WHITE PAPER) READ ABSTRACT |

CW+ Quocirca report: The evolving MPS landscape by ComputerWeekly.com

October 11, 2010 - (Free Research)
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. 
(WHITE PAPER) READ ABSTRACT |

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

The DNA of the CIO by ComputerWeekly.com

October 31, 2012 - (Free Research)
This must-read report analyses the role and challenges of the CIO and offers guidance for career development, influencing the business and becoming part of the executive management team. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Big data: Lessons from the leaders by ComputerWeekly.com

September 14, 2012 - (Free Research)
This research from the Economist Intelligence Unit assess how far companies have progressed in their use of big data and examines how they can turn it to business advantage. 
(ESSENTIAL GUIDE) READ ABSTRACT |

2014 Planning Guide: Navigating the Cloud Storage Controller Market by TechTarget

March 18, 2014 - (Free Research)
Thinking about the cloud? Participate in our members-only Cloud Storage Research Program to share your thoughts, and get instant access to two exclusive reports: Our "2014 Cloud Storage Planning Guide" and "2014 Market Intelligence Report"! 
(RESOURCE)

Mainframe Rehosting with Oracle Tuxedo: Accelerating Cost Reduction and Application Modernization by Oracle Corporation UK Ltd

March 31, 2009 - (Free Research)
The backlog is the number-one hurdle to effectiveness for CIOs followed by inadequate budgets and a shortage of time for strategic thinking and planning, reports “The State of the CIO 2006” survey by CIO Magazine. For IT executives managing mainframe applications, these issues are all too familiar. After all, the average Fortune 100 company... 
(WHITE PAPER) READ ABSTRACT |

The Big Data Opportunity for HR and Finance by Workday

December 31, 2013 - (Free Research)
Read the research report, The Big Data Opportunity for HR and Finance, from Harvard Business Review Analytic Services to discover how big data is changing the way business gets done. 
(WHITE PAPER) READ ABSTRACT |

The Financial Close: Optimizing Performance and Driving Financial Excellence by SAP America, Inc.

June 02, 2009 - (Free Research)
The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls 
(WHITE PAPER) READ ABSTRACT |

2009 Annual Study: UK Enterprise Encryption Trends by PGP Corporation

July 25, 2009 - (Free Research)
Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection. 
(ANALYST REPORT) READ ABSTRACT |

Information security breaches survey 2012 by ComputerWeekly.com

April 24, 2012 - (Free Research)
Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey. 
(IT BRIEFING) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts