Schema University OwnWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Schema University Own returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Virtualization
 •   Databases
 •   Wireless Technologies and Mobile Computing
 •   Data Center Management
 •   Mobile Device Management
 •   Security Policies
 •   Database Planning and Implementation
 •   Laptops/ Notebooks/ Tablet PCs
 •   Security Monitoring

Related Searches
 •   Buy Schema
 •   Configuration Schema University
 •   Environment Schema University
 •   Information About Schema University Own
 •   Learning Schema
 •   Schema General
 •   Schema University Own Layer
 •   Security Schema University
 •   Types Schema
Advertisement

ALL RESULTS
1 - 25 of 375 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation by ComputerWeekly.com

June 19, 2012 - (Free Research)
In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 10, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Computer Weekly - 10 January 2012: What’s in store for IT this year? by ComputerWeekly.com

January 10, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now. 
(EZINE)

Acadia University Case Study: Giving Students an Advantage by Dell, Inc.

September 01, 2008 - (Free Research)
Acadia University wanted to enable students to purchase their own laptops but needed to narrow their selection to models that would meet exacting requirements and student approval. Dell™ Latitude™ and Dell XPS™ laptops were among several models the students selected. Read this case study to learn more. 
(CASE STUDY) READ ABSTRACT |

DB2 9.7: Online schema change-- Minimize planned outages when making changes to your database objects by IBM

September 01, 2010 - (Free Research)
Learn about the new enhancements to DB2 9.7 that enable you to make online changes to the database schema while objects remain fully accessible during modification. 
(WHITE PAPER) READ ABSTRACT |

CW500: Best practice in BYOD by ComputerWeekly.com

September 06, 2013 - (Free Research)
Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation. 
(PRESENTATION) READ ABSTRACT |

Case Study: Implementing BYOD at Wittenberg University by Extreme Networks (E-mail this company)

January 16, 2014 - (Free Research)
This exclusive case study discusses how a university with limited resources was able to use a series of networking tools to centralize mobile management while providing the performance needed to support BYOD. 
(CASE STUDY) READ ABSTRACT |

Oracle Data Mining 11g Release 2 Mining Star Schemas: A Telco Churn Case Study by Oracle Corporation

June 24, 2012 - (Free Research)
This paper, based on the CACS and intended for users of the Oracle Data Miner, highlights the telco churn case study using Oracle Data Miner and explains the case study workflow methodology. Read this now and learn about preparing a database scheme and importing a pre-made Oracle Data Miner workflow. 
(WHITE PAPER) READ ABSTRACT |

Global Security University: IAM Integration Classroom by SearchSecurity.com

July 31, 2013 - (Free Research)
TBD 
(VIDEOCAST) READ ABSTRACT |

Computer Weekly – 12 March 2013: Will software-defined networking justify the hype? by SearchSecurity.com

March 12, 2013 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now. 
(EZINE) READ ABSTRACT |

CW500: Best practice in BYOD by ComputerWeekly.com

September 06, 2013 - (Free Research)
Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation. 
(PRESENTATION) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 14, 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

IT Security Case Studies by ComputerWeekly.com

June 21, 2013 - (Free Research)
Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards. 
(CASE STUDY) READ ABSTRACT |

Embarcadero Change Manager 5.0 by Embarcadero Technologies, Inc.

October 17, 2008 - (Free Research)
With Embarcadero Change Manager 5.0 you can simplify and automate database change management, streamline development cycles, and ensure availability, performance, and compliance. Download this demo and experience it for yourself. 
(TRIAL SOFTWARE) READ ABSTRACT |

IBM Optim Database Administrator by IBM

June 08, 2009 - (Free Research)
Learn how IBM information management software can assist you in managing change in dynamic application and database environments. 
(ARTICLE) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 03, 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

Success Story: University Improves Backup and Recovery by Ditching Tape by ExaGrid Systems, Inc.

May 21, 2013 - (Free Research)
This two-page paper explores how the University of Northern Iowa deployed an effective and affordable backup solution. Read on to discover the benefits they now enjoy, including, seamless integration with existing backup applications, scalability through primary scale-out storage, shortened backup times and more. 
(CASE STUDY) READ ABSTRACT |

University of Northern Georgia case study: Life made easier for thousands of students and teachers by Dell, Inc.

September 30, 2013 - (Free Research)
This informative paper explores how a university easily and affordably virtualized its network, data center and storage systems. Read on to learn the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

James Cook University accelerates access to student and business services with IBM® XIV® Storage Systems by IBM

March 22, 2011 - (Free Research)
James Cook University needed to replace ageing storage systems that held vital student, administration and business applications. In order to get enterprise-level performance and availability that could keep up with the exponential growth of the university's data needs, they turned to IBM. 
(CASE STUDY) READ ABSTRACT |

University of St. Thomas implements a tiered storage approach from Quantum, including Data De-duplication Technology to Cut Backup Time in Half by Quantum Corporation

June 2008 - (Free Research)
St. Thomas University needed to do something to shorten their backup windows and make everything more reliable and more robust, so they chose Quantum DXi™ appliance. 
(CASE STUDY) READ ABSTRACT |

Monash University Video Testimonial by Concur Technologies (E-mail this company)

June 2014 - (Free Research)
Check out the following webcast to see just how Monash University was able to gain substantial benefits by revamping their records management solution. 
(VIDEO) READ ABSTRACT |

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint by Hewlett-Packard Company

May 2012 - (Free Research)
This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access. 
(CASE STUDY) READ ABSTRACT |

Alfred University Case Study: Higher Returns for Higher Education by Dell, Inc.

November 2009 - (Free Research)
Read this case study to learn how Alfred University saved 80% on hardware, refreshing SunGard Higher Education Banner Unified Digital Campus infrastructure with Dell servers. 
(CASE STUDY) READ ABSTRACT |

Indiana University Virtualizes Mission-Critical Oracle Databases by VMware, Inc.

August 2011 - (Free Research)
Access this resource to learn how the Kelley School of Business at Indiana University used virtualization to decrease server deployment time for faculty special projects; reduce amount of physical hardware; and reduce the power consumption across all infrastructure. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 375 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts