Script Purpose OfWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Script Purpose Of returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Storage Management
 •   Business Process Management (BPM)
 •   Data Security
 •   Disk-based Backup & Storage/ RAID
 •   Network Security
 •   Virtualization
 •   Application Security
 •   Web Servers
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)

Related Searches
 •   Buy Script
 •   Owning Script
 •   Part Script Purpose Of
 •   Project Script
 •   Script Purpose Events
 •   Script Purpose Measure
 •   Script Purpose Of Net
 •   Script Schedule
 •   Script Strategies
 •   Script Top
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Automated Scanning versus Manual Penetration Testing by IBM

February 2009 - (Free Research)
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Workflow Vs. Application Automation Tools: Choosing the Right Tool for the Job by UC4 Software, Inc

June 2008 - (Free Research)
With the increasing popularity of workflow software, many IT departments are wrestling with the distinction between workflow programs and application automation tools. This paper sheds some light on their distinction. 
(WHITE PAPER) READ ABSTRACT |

What Enterprises Should Do About IPv6 in 2011 by Cisco Systems, Inc.

January 2011 - (Free Research)
The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators. 
(WHITE PAPER) READ ABSTRACT |

The Implementation of LISP as it Relates to Cisco OTV by Global Knowledge

March 2014 - (Free Research)
The purpose of this paper is to examine the four common elements for the implementation of Open Shortest Path First (OSPF). 
(WHITE PAPER) READ ABSTRACT |

Stand and Be Heard by Iron Mountain

September 2013 - (Free Research)
The purpose of this article is not to shed light on significant advancements in the field of records and information management, but rather help highlight some of the most common and not so common records concerns that should be considered when transferring or acquiring a large MSR portfolio. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Total Economic Impact™ of Trend Micro Enterprise Security by Trend Micro, Inc.

July 2009 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection. 
(ANALYST REPORT) READ ABSTRACT |

DELL DX Object Storage Platform – Remote Synchronous Replication Configuration by Dell, Inc.

April 2011 - (Free Research)
The purpose of this document is to provide DX Storage administrators, application developers, and support teams instructions on the DX platform configuration required when applications are utilizing the remote synchronous write feature to enable synchronous writes to a local and remote DX Clusters. 
(WHITE PAPER) READ ABSTRACT |

Best Practices When Enabling Smart Card Authentication by Raritan Inc.

January 2008 - (Free Research)
When implementing an analog KVM solution, enabling users to employ smart cards for the purpose of accessing servers should not be a daunting task. 
(WHITE PAPER) READ ABSTRACT |

The Mandate for Converged Infrastructure Management by EMC

June 2011 - (Free Research)
This whitepaper discusses how effective management of the Vblock Infrastructure Platform using EMC Ionix Unified Infrastructure Manager can provide greater value in the form of faster and more efficient infrastructure service delivery and more robust infrastructure operational management for the purpose of meeting or exceeding service levels. 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication Background: A Technical White Paper by Quantum Corporation

March 2011 - (Free Research)
The purpose of data deduplication is to increase the amount of information that can be stored on disk arrays and to increase the effective amount of data that can be transmitted over networks. Read this white paper from Quantum Corporation to learn more about data deduplication today. 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication Background - A Technical White Paper by Quantum Corporation

June 2009 - (Free Research)
The purpose of data deduplication is to increase the amount of information that can be stored on disk arrays and to increase the effective amount of data that can be transmitted over networks. Read this white paper to learn more about data deduplication as well as Quantum Dxi-Series disk-based backup solutions. 
(WHITE PAPER) READ ABSTRACT |

The Guide to Data Movement and Governance by IBM

November 2011 - (Free Research)
Missed opportunities and lost revenue might be the least of your worries. In some cases, poor practices can lead to lawsuits, fines and even the failure of the business itself. The purpose of this e-guide is to help you grasp the measures that can keep your organization on track to meet objectives and stay in line with regulations. 
(EGUIDE) READ ABSTRACT |

Dispelling the Vapor Around Cloud Computing: Drivers, Barriers and Considerations for Public and Private Cloud Adoption by IBM

December 2010 - (Free Research)
IBM conducted a survey in June and July of 2009 of 1,090 IT and line-of-business decision makers around the world. The purpose of this white paper is to share the survey findings, and to provide the IBM point of view regarding key steps and considerations for cloud adoption. 
(WHITE PAPER)

Web application security: automated scanning versus manual penetration testing by IBM

January 2008 - (Free Research)
There are two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. The purpose of this paper is to compare these two methods. 
(WHITE PAPER) READ ABSTRACT |

The Enterprise of the Future: Implications for the CIO by IBM

February 2009 - (Free Research)
The purpose of this paper is to highlight the key insights from the IBM Global CEO Study and relate them to the new CIO challenge: driving transformation as "change leaders" and implementing transformation as "change agents". 
(WHITE PAPER) READ ABSTRACT |

Change Management Best Practices for the Engineering and Construction Industry by Oracle Corporation

April 2009 - (Free Research)
The purpose of this white paper is to highlight best practices of identifying and managing changes that might occur on a construction project, and provide a process to effectively manage changes on construction projects. 
(WHITE PAPER) READ ABSTRACT |

HP Aligns with Customers through Agile Development by Hewlett-Packard Company

May 2010 - (Free Research)
This white paper details HP's progression to agile methodology. The purpose of this evolution is to improve the ability of HP’s R&D software development team to adapt to customer requirements, without adding cost and delays to its development processes. 
(WHITE PAPER) READ ABSTRACT |

Open Group: FAIR -ISO/IEC 27005 Cookbook by ComputerWeekly.com

February 2011 - (Free Research)
The purpose of this document is to help the security practitioner responsible for their organization’s risk estimation function to utilize The Open Group Risk Management Frameworkin an ISO/IEC 27005 structured process. 
(WHITE PAPER) READ ABSTRACT |

CW+: Developer Survey Report from Embarcadero Technologies by ComputerWeekly.com

August 2010 - (Free Research)
The Embarcadero Developer Survey was conducted throughout the months June and July 2010 and encompasses responses from a wide array of application developers worldwide. The purpose of the survey was to collect information about the top developer trends, challenges, key initiatives, and current tools being used. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in ECM Document Archive Migration by Xenos Group Inc.

November 2007 - (Free Research)
The purpose of this white paper is to outline the challenges of migrating documents from enterprise content management (ECM) systems, educate the reader, and provide best practices that ensure success. 
(WHITE PAPER) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

The Total Economic Impact of USA.NET SaaS Secure Messaging Solution by Perimeter eSecurity

January 2012 - (Free Research)
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations. 
(WHITE PAPER) READ ABSTRACT |

Solid State Drive Applications in Storage and Embedded Systems by Atrato, Inc.

February 2010 - (Free Research)
The purpose of this article is to examine the unique benefits of Intel® Solid State Drive (Intel® SSD) over traditional HDDs and competing SSDs, and to explore the benefits one could realize in using these new high performance SSDs in storage and embedded applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts