Section RequestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Section Request returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Virtualization
 •   Network Management
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Application Management and Maintenance
 •   Enterprise Data Protection and Privacy
 •   Data and Application Distribution
 •   Storage Management

Related Searches
 •   Markets Section Request
 •   Networking Section Request
 •   Notes Section Request
 •   Section Request Connecticut
 •   Section Request Kentucky
 •   Section Request Rfq
 •   Section Request Template
 •   Section Roi
 •   Section Webinars
 •   Starting Section Request
Advertisement

ALL RESULTS
1 - 25 of 293 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Developer Issue Tracker by BlackBerry

May 25, 2010 - (Free Research)
Through Developer Issue Tracker, BlackBerry® developers can understand what issues exist in the market today, the potential workarounds and timelines for fixing those issues. 
(ASSESSMENT TOOL)

Security Assertion Markup Language (SAML) - the Essential Guide by Ping Identity Corporation

September 14, 2011 - (Free Research)
This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more! 
(WHITE PAPER) READ ABSTRACT |

Best Practices for a Data Warehouse on Oracle Database 11g by Oracle Corporation

January 19, 2009 - (Free Research)
In order to ensure the enterprise data warehouse will get the optimal performance and will scale as your data set grows you need to get three fundamental things correct, the hardware configuration, the data model and the data loading process. 
(WHITE PAPER) READ ABSTRACT |

Postgres Plus 8.4 vs. MySQL 5.5: Feature Comparison and Commentary by EnterpriseDB Corporation

September 01, 2010 - (Free Research)
This paper compares Postgres Plus Standard Server and Postgres Plus Advanced Server 8.4 against MySQL 5.5. The comparison is broken down into a number of sections with a short commentary following each section. Read on to learn how the Postgres Plus 8.4 stacks up against MySQL 5.5 on all the above topics and learn which one comes out on top. 
(WHITE PAPER) READ ABSTRACT |

Security Gateway Buyer's Guide by Intel

February 14, 2011 - (Free Research)
If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity. 
(WHITE PAPER) READ ABSTRACT |

Network Barometer Report 2011 by Dimension Data

June 03, 2011 - (Free Research)
This report reviews the networks’ readiness to support business by evaluating the configuration variance from best practices, potential security vulnerabilities and end-of-life status of the included network devices. 
(ANALYST REPORT) READ ABSTRACT |

HP Servers in a Virtual Environment by PC Connection and HP

March 2008 - (Free Research)
The purpose of this white paper is to provide examples of how HP server virtualization and HP storage virtualization technologies work together to improve data center operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

ESG: Market Landscape Report: Storage Tiering by DataCore Software Corporation

September 2011 - (Free Research)
It's almost impossible to conduct a conversation with a storage vendor without raising the topic of "storage tiering." Along with "virtualisation" and "cloud," it's one of those de rigueur phrases. And, like those other two, storage tiering suffers from an over-exposure that can assume familiarity and understanding where it does not exist. 
(WHITE PAPER) READ ABSTRACT |

Delivering Next Generation User Interfaces for Business Intelligence Using AJAX by Information Builders

November 2006 - (Free Research)
This paper explains why Information Builders chose to use a component-based AJAX architecture for its new report and graph authoring solution - WebFOCUS Power Painter. 
(WHITE PAPER) READ ABSTRACT |

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

Cisco Intercompany Media Engine for Dummies Section 1: SIP Alone Doesn't Cut It by Cisco Systems, Inc.

December 2009 - (Free Research)
To help address the many questions about the Cisco Intercompany Media Engine, Wade Hamblin and Hakim Mehmood from the product team will post a "for Dummies" blog every 2 weeks to explain the basics and help you understand what it is, how it works, and why you should care. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Riverbed Stingray Traffic Manager VA Performance on vSphere 4 by Riverbed Technology, Inc.

January 2012 - (Free Research)
Cloud infrastructure platforms like VMware vSphere 4.0 can benefit from load balancers that connect users to the most suitable datacenter. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance compared to a Linux install. 
(WHITE PAPER) READ ABSTRACT |

Constellation Energy Group by EMC Corporation

June 2008 - (Free Research)
In its quest to fully leverage the new technologies, Constellation energy realized it needed to integrate them to one another, as well as integrate them with other business processes and applications. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Cloud Backup: Expert Overview of Available Services by Asigra

June 2013 - (Free Research)
This e-guide follows the evolution and maturity of cloud backup and explores several changes prompting its recent attention and adoption. It also provides a sampling of available services and a list of key section criteria you need to consider when evaluating various approaches and vendor offerings. 
(EGUIDE) READ ABSTRACT |

Building a Home Lab for VMware vSphere by Global Knowledge

February 2010 - (Free Research)
Read this paper by Global Knowledge instructor, John Hales, to learn how to build a home lab for VMware vSphere for study. This paper is broken down into three major sections; the first and most detailed is about the hardware required, the second is about the Workstation configuration, and the third is about installing vSphere and Virtual Center. 
(WHITE PAPER) READ ABSTRACT |

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall by Riverbed Technology, Inc.

January 2012 - (Free Research)
PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6. 
(WHITE PAPER) READ ABSTRACT |

IFRS in the Life Sciences: Broad implications by Deloitte

September 2009 - (Free Research)
This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more. 
(WHITE PAPER) READ ABSTRACT |

Application Delivery and Optimization Solutions Spotlight- Checklist #3 by SearchNetworking.com

February 2013 - (Free Research)
The third section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization (ADO) solutions explores the product benefits and tradeoffs and aims to help you seal the deal on a purchasing decision. 
(EGUIDE) READ ABSTRACT |

High Availability for Desktop Virtualization by Citrix

October 2009 - (Free Research)
This Implementation Guide shows how to provide high-availability, disaster recovery and business continuity to a XenDesktop environment. The document is divided into the following sections: local availablity, global availability, and disaster recovery/business continuity. 
(WHITE PAPER) READ ABSTRACT |

Securing Web Applications and Databases for PCI Compliance by Imperva

July 2009 - (Free Research)
This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency. 
(WHITE PAPER) READ ABSTRACT |

Servers by APC by Schneider Electric

April 2011 - (Free Research)
This Interactive Data Center section outlines the various components that companies should consider when selecting a server, including processors, memory, and more. 
(RESOURCE CENTER) READ ABSTRACT |

Customer Satisfaction with Email Archiving Systems by Sunbelt Software

January 2010 - (Free Research)
Email archiving is rapidly becoming a critical best practice for organizations of all sizes and across all industries. This white paper compares Sunbelt Exchange Archiver (SEA) with a cross-section of other email archiving offerings, to help decision makers in the evaluation process. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: The dangers of application logic attacks by IBM

April 2011 - (Free Research)
Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them. 
(EGUIDE) READ ABSTRACT |

IBM Tivoli Service Request Manager White Paper by IBM

January 2010 - (Free Research)
This IBM white paper will show you how you can help your organization manage incidents and problems, restore critical services, and minimize service desk calls in this white paper. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 293 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts