Research On Management ProceduresWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research On Management Procedures returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management
 •   Storage Security
 •   Data Security
 •   Security Policies
 •   Network Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Networks

Related Searches
 •   Buy Research
 •   Issues With Research
 •   Manuals Research On Management
 •   Research On Management Profile
 •   Research On Management Requirements
 •   Research On Management Workflow
 •   Research On Statistics
 •   Research Portals
 •   Research Production
 •   Uk Research On Management
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Importance of Information Governance for Records Managers by RSD

April 14, 2014 - (Free Research)
The following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more. 
(WHITE PAPER) READ ABSTRACT |

Top 5 Network Performance Management Mistakes & How to Avoid Them by Netcordia

August 12, 2009 - (Free Research)
This whitepaper will look at five of the most common mistakes when it comes to network performance management and discuss how IT organizations can get ahead of the curve by automating network management and giving the appropriate level of visibility to different levels of IT staff. Read on to learn how your organization can fix these mistakes. 
(WHITE PAPER) READ ABSTRACT |

Expert considerations for deploying VDI by Dell, Inc.

November 30, 2011 - (Free Research)
In this expert e-guide, learn the importance of looking into current network bandwidth/stability, desktop storage requirements and application management procedures. In addition, discover how to choose the right VDI management tools to enhance your performance. 
(EGUIDE) READ ABSTRACT |

Consolidating Service Provider Points of Presence Using Virtualization to Optimize and Consolidate Networks by Juniper Networks, Inc.

March 16, 2010 - (Free Research)
This white paper outlines the challenges that service providers are facing in the points of presence (POP), and presents the results of the NSP study quantifying the operational and capital savings possible through POP consolidation with virtualization. Read this white paper to learn how to improve the efficiency of POPs through virtualization. 
(WHITE PAPER) READ ABSTRACT |

MDS 9000 SAN-OS Software: The Virtual Machine Aware SAN by Cisco Systems, Inc.

October 2008 - (Free Research)
This document describes the innovative approach introduced by the Cisco MDS 9000 Family to support an end-to-end virtualized SAN environment that is flexible, secure, scalable, and mobile. 
(WHITE PAPER) READ ABSTRACT |

Step by Step: Best practices for security patch management by SearchSecurity.com

March 2011 - (Free Research)
Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization. 
(EGUIDE) READ ABSTRACT |

E-Guide: Considerations for Deploying VDI by Dell, Inc.

January 2013 - (Free Research)
Before implementing a virtual desktop environment, it's critical that you carefully consider what your infrastructure will need for an effective deployment. This expert guide provides key advice from those who have implemented this technology before. 
(EGUIDE) READ ABSTRACT |

The Benefits of User Directed Email Archiving by EMC Corporation

March 2008 - (Free Research)
Email archiving solutions enhance a company's ability to comply with regulatory and internal standards for data retention and the ability to find data when needed, either for internal use or for legal discovery. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Time to rethink backup procedures by ComputerWeekly.com

February 2014 - (Free Research)
IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell. 
(ANALYST BRIEF) READ ABSTRACT |

Mizuho information and research speeds up system development by automating test processes by Hewlett-Packard Company

April 2012 - (Free Research)
Mizuho Information needed to improve the efficiency of financial system deployments and shorten development cycle times. To do this, they knew they needed to rethink their testing processes. In this case study, discover how Mizuho utilized a test automation tool to enhance their testing procedures without having to make drastic process changes. 
(CASE STUDY) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Conquering the sys-admin challenge by ComputerWeekly.com

October 2012 - (Free Research)
This report from Quocirca presents new data on how well organisations are able to automate their sys-admin procedures, manage the use of privilege and satisfy the requirements of auditors. 
(ANALYST REPORT) READ ABSTRACT |

Increasing Business Efficiency and End-User Productivity by Oracle Corporation

July 2009 - (Free Research)
The following report features Michael Fauscette, group vice president of IDC's Software Business Solutions research, answering questions posed by Oracle's customers regarding business efficiency and end-user productivity. 
(ANALYST REPORT) READ ABSTRACT |

Endpoint Security, Endpoint Management: The Cost-Cutter's Case for Convergence by Lumension

March 2009 - (Free Research)
This analyst report is for any organization that relies on end-user computing platforms (personal computers, workstations, laptops, notebooks) - and their associated applications, data, and network connectivity - to carry out strategic business objectives. It describes how the companies with top results keep these endpoints "clean and ready." 
(ANALYST REPORT)

Introducing Social Business for the Mid-Market by IBM

April 2013 - (Free Research)
Consult this resource to learn more about the insight Aberdeen research discovered by studying 229 mid-sized companies. They looked to uncover if there were specific characteristics that made companies more interested in using social business. 
(WHITE PAPER) READ ABSTRACT |

Mobile BI: Actionable Intelligence for the Agile Enterprise by SAS

June 2011 - (Free Research)
This report describes how mobile devices can drive better BI. Find out how top performing companies have made mobile devices the primary platform for BI deployments. 
(WHITE PAPER) READ ABSTRACT |

HP LeftHand SAN Failback Procedure for VMware by Hewlett-Packard Company

August 2009 - (Free Research)
This white paper documents the procedure for failback from a VMware Site Recovery Manager (SRM) recovery site after SRM has performed a failover on an HP LeftHand SAN. This document is intended for customers who are using an HP LeftHand SAN with VMware. 
(WHITE PAPER) READ ABSTRACT |

CPM Tools Help Wacom Improve Budgeting Procedures by Prophix Software

May 2014 - (Free Research)
This case study addresses how a global leader in computer graphics tablets harnessed Corporate Performance Management (CPM) tools to achieve automatic daily reports that can be distributed amongst key decision makers. 
(CASE STUDY) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server by EnterpriseDB Corporation

March 2008 - (Free Research)
This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code. 
(TRAINING GUIDE) READ ABSTRACT |

Presentation Transcript: Setting up Security Policies and Procedures for the Cloud by Webroot

August 2011 - (Free Research)
This presentation transcript provides a framework for enterprises to transition to the cloud safely, as well as examines specific considerations for private, public and hybrid cloud initiatives and the controls you'll need to consider for each model. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Making Mobility Matter in Healthcare Data Security by Dell, Inc.

June 2012 - (Free Research)
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place. 
(WHITE PAPER)

Data Quality Process Needs All Hands on Deck by Harte-Hanks Trillium Software

December 2013 - (Free Research)
Access the following expert e-guide to uncover the best practices and procedures for developing and implementing a successful data quality strategy. 
(WHITE PAPER) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk by Symantec Corporation

July 2008 - (Free Research)
This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance. 
(BOOK) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts