Review PartsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Review Parts returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Enterprise Systems Management
 •   Virtualization
 •   Data Security
 •   Application Management and Maintenance
 •   Network Management
 •   Security Policies
 •   Data and Application Distribution
 •   Availability, Performance and Problem Management
 •   Security Monitoring

Related Searches
 •   Concerns Review Parts
 •   Customers Review Parts
 •   Guide Review
 •   Pay Review Parts
 •   Review Issues
 •   Review Parts Metrics
 •   Review Parts Practices
 •   Review Parts Wyoming
 •   Unix Review
 •   View Review
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 24, 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

Computer Weekly 13 September 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news, trends and IT management issues by ComputerWeekly.com

September 13, 2011 - (Free Research)
In this week's Computer Weekly, we talk to the man tasked with bringing public services into the digital age. The second installment of our Buyer's Guide to business intelligence reviews two low-cost alternatives to the big suppliers; and we go behind the scenes of the IT preparations for the London 2012 Olympic Games. 
(EZINE)

Symantec assesses its options in storage as part of a complete business review by The 451 Group (E-mail this company)

November 27, 2012 - (Free Research)
Symantec recently held its annual Vision Europe customer conference in Barcelona, affording us an opportunity to catch up with executives and get a strategy update. Or at least affording us apartial opportunity, for Symantec is in the middle of a review of its entire business. 
(WHITE PAPER) READ ABSTRACT |

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET

March 16, 2011 - (Free Research)
The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 20, 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

2008 ERP REPORT, PART II: Comparing Leading Tier I and Tier II ERP Solutions by Panorama Consulting Group

September 09, 2009 - (Free Research)
Find the ERP solution that is right for your organization by reviewing this detailed report, which discusses the differences between leading ERP solutions and shares the findings of current research. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly – 20 March 2012: The open data revolution by ComputerWeekly.com

March 20, 2012 - (Free Research)
In this week’s Computer Weekly, Cabinet Office minister Francis Maude talks about releasing government datasets to the public and why open data will drive the next industrial revolution. We also review the latest test version of Windows 8 and see how it shapes up for tablet computers and business users and much more. 
(EZINE)

Computer Weekly 18 October 2011: Download the latest issue of the UK's leading technology publication, where we analyse the latest news in IT and what it means for IT managers by ComputerWeekly.com

October 14, 2011 - (Free Research)
In this week's Computer Weekly, we talk to the CIO of the London 2012 Olympics about progress on the UK's highest-profile IT implementation. We ask customers about Oracle’s long-awaited Fusion Applications; review the latest version of Windows Server; and find out how the Blackberry outage affected corporate customers. Download the new issue now. 
(EZINE) READ ABSTRACT |

Pocket E-Guide Review: Dell Latitude E6400 by Dell, Inc. and Intel®

December 16, 2009 - (Free Research)
The Dell Latitude E6400 is a 14" laptop targeted towards businesses that need good performance, solid design, and a commonality of parts for an entire workforce. Read this Pocket E-Guide for a features and performance review of the Dell Latitude E6400. 
(EGUIDE) READ ABSTRACT |

Computer Weekly – 4 March 2014: How IT brings aid to refugees by ComputerWeekly.com

March 04, 2014 - (Free Research)
In this week's Computer Weekly, we talk to the CIO at the UN High Commission for Refugees about the vital role that technology plays in supporting its aid programmes. We hear from IT leaders who are ditching BlackBerry – but moving to Windows Phone instead. And we look at how to choose the best hybrid cloud provider. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends by ComputerWeekly.com

August 15, 2011 - (Free Research)
In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Virtualization Best Practices 2010 - Virtualization Project Planning by Dell and Microsoft

April 23, 2010 - (Free Research)
This presentation transcript examines how effective server room deployment and management can maximize efficiency and minimize costs in virtual environments. Gain insight into key steps for evaluating your current infrastructure and realizing the benefits of virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Securing Embedded Software with Threat Modeling by Klocwork

September 02, 2011 - (Free Research)
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

VDI Benefits and Challenges Part 2: The Changing World of VDI by Oracle Corporation

September 04, 2012 - (Free Research)
Access this presentation transcript to find out about an industry leading solution from Oracle to utilize VDI and discusses ways to improve application delivery. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Reclaim Wasted Capacity by Northern Parklife

August 03, 2009 - (Free Research)
This four-part webcast demonstrates the necessity for a proper storage management solution, such as Northern Storage Suite, in an organization's storage infrastructure. They'll review how NSS can reclaim wasted capacity, control user behavior, getting your end-users on-board with saving capacity and how to properly plan for future storage needs. 
(VIDEO) READ ABSTRACT |

Application Acceleration for Satellite-Based Enterprise Services by BlueCoat

December 30, 2008 - (Free Research)
This paper reviews the best of the newest achievements in VSAT performance and utility and shows how these solutions could become part of the mainstream of corporate network deployment and an integral portion of commercial (and competitive) service provider offerings. 
(WHITE PAPER) READ ABSTRACT |

IBM's Technology Center by IBM

September 09, 2011 - (Free Research)
As part of this multimedia resource center, expert Mike Laverick reviews the different disaster recovery options available for VMware infrastructures. 
(RESOURCE CENTER) READ ABSTRACT |

Special Report on Steria by ComputerWeekly.com

September 14, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Steria, its strategy, products and services and reviews its financial performance. 
(WHITE PAPER) READ ABSTRACT |

Beyond Deduplication - Rethinking Data Protection by Syncsort UK

July 19, 2011 - (Free Research)
Most users are still deploying data protection technology that was crafted decades ago. This white paper reviews new potential data protection solutions for your organization. 
(WHITE PAPER) READ ABSTRACT |

CAE Analysis in a Hybrid Compute Environment by Cray

November 11, 2010 - (Free Research)
This presentation transcript will review of some of the recent technology enhancements for high performance computing, on the hardware side, and also how this technology could be leveraged in a hybrid compute environment, specifically targeted for computer-aided engineering, or CAE. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Best and Worst Practices for Exchange email archiving by Metalogix

March 29, 2012 - (Free Research)
In this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant. 
(EGUIDE) READ ABSTRACT |

Multi-Step Authentication and Why You Should Use It by Global Knowledge

August 08, 2013 - (Free Research)
Authentication is one of the essential components of security. It is one part of the concept known as authentication, authorization, and accounting (AAA). All three of these should be addressed when constructing a system in order to have a reasonable foundation for reliable security. 
(WHITE PAPER) READ ABSTRACT |

Optimizing Microsoft Exchange for the Enterprise: Hub Transport Server and Lync-SharePoint Integration by Global Knowledge

January 31, 2013 - (Free Research)
In part two of this Exchange optimization series, we'll discuss techniques for enhancing your Hub Transport server and integrating Lync and SharePoint. Discover simple tips for utilizing the advanced features of Exchange Server 2010 to enhance your messaging environment. 
(WHITE PAPER) READ ABSTRACT |

PocketClock/GPS by Exaktime

While JobClock is designed to be locked down and left at a jobsite 24/7, PocketClock/GPS is a portable solution that is ideal for: -Crews on the move, -Multiple cost codes, -Service and route work 
(HARDWARE PRODUCT)

Information is King: Business Analytics in the Age of the Downturn and the (Re)Emergence of the Customer by SAS

April 07, 2010 - (Free Research)
BusinessWeek Research Services (BWRS) launched a research program in April 2009 to determine the attitudes and opinions of C-level executives with regard to the use and value of business analytics. This paper reviews a portion of the research and provides analysis and insights on the topic of business analytics. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts