Risk Markets LogicalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Markets Logical returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Center Management
 •   Storage Management
 •   Network Management
 •   Networks
 •   Business Intelligence Solutions
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   WAN/ LAN Solutions
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Find Risk Markets
 •   Procurement Risk
 •   Risk Calendars
 •   Risk Case
 •   Risk Collection
 •   Risk Filing
 •   Risk Markets Logical Application
 •   Risk Markets Logical White Paper
 •   Sales Risk
 •   Top Risk Markets
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Real-Time Risk Monitoring by Sybase, an SAP company

November 02, 2011 - (Free Research)
Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 15, 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

Optimize server utilization in real time with HP Virtual Server Environment for HP Integrity servers by Hewlett-Packard Company

December 08, 2008 - (Free Research)
Read this document to learn how HP Virtual Server Environment (VSE), the HP virtualization solution for HP Integrity servers, gives you the flexibility you need to increase the return on your IT investments and become more agile at the same time. 
(WHITE PAPER) READ ABSTRACT |

OpenBench Labs Analysis: Maximize Storage Utilization and Network Bandwidth Automating Virtual System Backup by CommVault Systems, Inc.

February 23, 2010 - (Free Research)
Simpana® from CommVault® enables IT to leverage a single solution that integrates backup, archive, replication and storage resource management across physical and virtual servers. Simpana helps IT deal with the challenges associated with critical backup recovery issues within a virtual infrastructure. 
(WHITE PAPER)

All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Your Company by IBM

February 29, 2012 - (Free Research)
You've decided to make the leap to the cloud, but with so many different configurations offered by multiple providers representing different degrees of benefits and risks, how do you even begin to determine the approach that will best suit your organisation's unique needs? Read this white paper to find guidance to help you make sense of the cloud. 
(WHITE PAPER) READ ABSTRACT |

Cloud Security as a Service For Secure Cloud-Based Server Hosting by SearchSecurity.com

April 20, 2011 - (Free Research)
Access this expert e-guide where industry specialist Joseph Granneman highlights the need for cloud-specific security tools, such as encryption and identity management, and how they can be offered as a service to better mitigate cloud computing risks. 
(EGUIDE) READ ABSTRACT |

Simplifying the Scope of the PCI Audit: How Cross-Platform Server Isolation Helps Retailers Achieve Compliance by Apani

February 2008 - (Free Research)
This paper will describe how Apani EpiForce can solve key aspects of the PCI compliance challenge. Apani® EpiForce® proactively eliminates vulnerabilities within the corporate network by isolating computers and the business-critical data, personal information and intellectual property stored on them into logical security zones. 
(ARTICLE) READ ABSTRACT |

Virtual Success in the Healthcare Provider Market by NetApp

February 2011 - (Free Research)
Check out this white paper to learn why and how virtualization is a logical investment for hospitals and health care providers. Learn the benefits specific to desktop virtualization in a health facility and access a case study regarding a medical center that adopted virtualization technology. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Risk of Catastrophic Failure in the Software Defined Data Center by nlyte Software

September 2013 - (Free Research)
This webcast covers software-defined data centers and how to implement them successfully and avoid catastrophic failure. 
(VIDEO) READ ABSTRACT |

How to Use the Six Laws of Persuasion during a Negotiation by Global Knowledge

October 2006 - (Free Research)
Discover the Six Laws of Persuasion and learn how to use them to conduct more effective negotiations. 
(WHITE PAPER) READ ABSTRACT |

10 Performance Management Best Practices by Gomez

January 2007 - (Free Research)
This white paper examines performance practices that represent the best chance for any organization-regardless of its size and market presence-to gain alignment and win more than its fair share of the online market opportunity. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your APIs Against Attack & Hijack by CA Technologies.

December 2013 - (Free Research)
Application programming interface (API), a technology for integrating applications using Web technology. This white paper identifies threats, both old and new, and provides clear solutions to address them. 
(WHITE PAPER) READ ABSTRACT |

LAN Fundamentals: Logical Addresses vs. Physical Addresses by Global Knowledge

May 2013 - (Free Research)
There are two basic types of addresses used in Local Area Networking (LAN): logical addresses and physical addresses. Ethernet is the most common LAN and is the example used in this document. Understanding the differences of how the two addresses are used is the focus of this discussion. 
(WHITE PAPER) READ ABSTRACT |

Building an Infrastructure That Enables Log Management Best Practices by RSA, The Security Division of EMC

February 2008 - (Free Research)
This paper takes the next logical step by guiding organizations in establishing the criteria for an infrastructure to help realize best practices and build a technology strategy for comprehensive security information and event management. 
(WHITE PAPER) READ ABSTRACT |

Beyond Disaster Recovery: Becoming a Resilient Business Organization by IBM Software Group

June 2008 - (Free Research)
Discover how to combine several risk management strategies into a single integrated one, making your infrastructure able to respond to the threat of disaster. 
(WHITE PAPER) READ ABSTRACT |

Genius Project4Domino Versus Microsoft Project Server 2007 by Genius Inside

October 2007 - (Free Research)
The goal of this white paper is to demonstrate that Genius Project4Domino has a stronger ROI, is better integrated, is rich in features, and is a more cost effective (TCO) alternative - especially for Domino and Lotus Notes users. The comparison benefits for Exchange and other platforms are similar. 
(WHITE PAPER) READ ABSTRACT |

Understanding AIX Logical Volume Management by Global Knowledge

May 2014 - (Free Research)
This whitepaper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage. 
(WHITE PAPER) READ ABSTRACT |

Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center by SearchSecurity.com

August 2010 - (Free Research)
We are potentially at the beginning of a new generation of IT administrators who manage a range of technologies outside of the traditional realm of virtualization. Read this E-Book to learn more. 
(EBOOK) READ ABSTRACT |

Solution Spotlight: The Future of Data Warehousing Infrastructure and Architectures by IBM

May 2014 - (Free Research)
This e-guide examines why the data warehousing appliance business case must trump traditional tools for business to address needs such as costs, flexibility and agility while eliminating key technology silos. 
(EGUIDE) READ ABSTRACT |

The Right Platform for Software-Defined Storage by IBM

October 2013 - (Free Research)
Read on to learn more about software-defined storage and its development as a promising enterprise storage solution. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Security and Compliance with Amazon Web Services by Trend Micro

December 2013 - (Free Research)
This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for a Data Warehouse on Oracle Database 11g by Oracle Corporation

January 2009 - (Free Research)
In order to ensure the enterprise data warehouse will get the optimal performance and will scale as your data set grows you need to get three fundamental things correct, the hardware configuration, the data model and the data loading process. 
(WHITE PAPER) READ ABSTRACT |

Getting Real about Virtual Management: Managing Complex Infrastructures by CA Technologies.

August 2008 - (Free Research)
This white paper outlines the challenges that virtualization and clustering create for IT and provides techniques for addressing the specific requirements of these environments. 
(WHITE PAPER) READ ABSTRACT |

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations by Cisco Systems, Inc.

February 2008 - (Free Research)
This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN. 
(WHITE PAPER) READ ABSTRACT |

Simplifying Contact Center Technology by Oracle Corporation

August 2008 - (Free Research)
Computer telephony integration (CTI) enabled contact centers realize immense cost savings, increased reliability and improved performance. Learn how an on-demand solution can simplify your organization’s contact center technology. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts