Security Business ObjectsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Business Objects returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Data Security
 •   Business Intelligence Solutions
 •   Storage Security
 •   Enterprise Systems Management
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Enterprise Information Integration/ Metadata Management
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Advantages Of Security Business Objects
 •   Configure Security Business Objects
 •   Demand Security
 •   Do Security
 •   Impact Security
 •   Own Security Business Objects
 •   Security Business Analysis
 •   Security Business Objects Pos
 •   Security New Jersey
 •   Test Security Business
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Quicktour Demo: Key Differentiators between Microstrategy and Business Objects by MicroStrategy Incorporated

November 2008 - (Free Research)
This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise business intelligence capabilities and illustrates the 12 key differentiators between MicroStrategy and Business Objects. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Data Protection Methods for Object Stores by Quantum Corporation

November 2012 - (Free Research)
If you have billions and billions of files and you want to use a storage system that doesn't have the restrictions of a standard file system, you can use an object store. Check out this expert transcript to learn more about object store and four different data protection methods used for this type of storage. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Dell DX Object Storage Platform: Efficiently Store, Access and Distribute Digital Content by Dell, Inc.

April 2011 - (Free Research)
Information is only as valuable as it is accessible—but keeping data readily available to meet compliance, governance and business intelligence requirements can be cumbersome and expensive. With DX Object Storage, you can finally end the trade-off between cost and accessibility while simplifying your data management. 
(PRODUCT OVERVIEW) READ ABSTRACT |

DB2 9.7: Online schema change-- Minimize planned outages when making changes to your database objects by IBM

September 2010 - (Free Research)
Learn about the new enhancements to DB2 9.7 that enable you to make online changes to the database schema while objects remain fully accessible during modification. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

2013 MarketScope Report for Web Access Management by IBM

November 2013 - (Free Research)
This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs. 
(ANALYST REPORT) READ ABSTRACT |

Storage Europe: December 2011 by SearchStorage.com

December 2011 - (Free Research)
Object-based storage dispenses with the hierarchical file system, so there are no nested subfolders. Instead, it uses an indexed flatfile structure in which each object is given a unique ID. This issue of IT in Europe includes case studies of how object-based storage products are being implemented in Europe. 
(EZINE) READ ABSTRACT |

Object Storage: A Dell Point of View by Dell, Inc.

April 2011 - (Free Research)
Dell has developed a customer centric strategy and a set of solutions and services designed to help customers meet the new challenges created by the amount and type of data being generated today. This strategy is based on Dell's Point of View (POV) with respect to Object Storage. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Data Systems Object Storage Solutions by Hitachi Data Systems

April 2013 - (Free Research)
This solution profile explores the innovation of object storage designed to address the challenges of fast growing file data, and integrate many key technologies in a single storage platform. Find out how this approach provides a path to short-term return on investment and significant long-term efficiency improvements. 
(WHITE PAPER) READ ABSTRACT |

Object Storage: Imagine the possibilities… More data, less headaches by Hitachi Data Systems

June 2013 - (Free Research)
This eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system. 
(EBOOK) READ ABSTRACT |

Distributed Object Store Principles of Operation: The Case for Intelligent Storage by Hitachi Data Systems

February 2012 - (Free Research)
This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development. 
(WHITE PAPER) READ ABSTRACT |

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools? by Dell Software

October 2009 - (Free Research)
Windows Server 2008 R2 offers a number of exciting new features, including an expanded Server Core offering, new Active Directory features, and - of special interest to anyone who has ever wished Active Directory had an “undo” button - a sort of recycle bin for Active Directory objects. 
(WHITE PAPER) READ ABSTRACT |

Objects, Databases and the Myth of Serialization by Versant Corp.

August 2010 - (Free Research)
Authors quite commonly, and incorrectly, refer to the process of serialization as part of what is happening when an object database stores an object or object graph. This white paper debunks that misperception, and sets the record straight about the efficiency of object databases as brought about by the avoidance of serialization. 
(WHITE PAPER) READ ABSTRACT |

Object Persistence and Agile Software Development by Versant Corp.

December 2009 - (Free Research)
Agile Software Development is one of the most effective methodologies to develop application software. This paper examines and compares RDBMS with several object persistence methods within the context of Agile Software Development by quantifying the impact of these methods on the velocity and success of an agile application development project. 
(WHITE PAPER) READ ABSTRACT |

Object Storage: A Fresh Approach to Long-Term File Storage by Dell, Inc.

April 2011 - (Free Research)
In this white paper we explore Object Storage, compare it to traditional NAS, and demonstrate that an intelligent, policy based data management strategy is the best approach to determining when it is beneficial for organizations to use Object Storage, or continue to use NAS. 
(WHITE PAPER) READ ABSTRACT |

KVM: Hypervisor Security You Can Depend On by Red Hat & IBM

February 2012 - (Free Research)
Implementing secure virtual and cloud environments is a major concern for businesses. Discover how KVM hypervisors provide the security businesses need with features such mandatory access control and hardware-based isolation, and compare its performance against other general-purpose x86 hypervisors. 
(WHITE PAPER) READ ABSTRACT |

Going Serverless at the Branch Office: Using WAN Optimization to Solve the Server Consolidation Challenge by Expand Networks

June 2008 - (Free Research)
The Expand Accelerator is a standards-based, tightly integrated, multi-service platform that delivers a complete application acceleration solution. 
(WHITE PAPER) READ ABSTRACT |

Putting Security First in the Newly Virtualized World by Lumension

July 2008 - (Free Research)
At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches 
(WHITE PAPER) READ ABSTRACT |

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations by SAP America, Inc.

May 2008 - (Free Research)
In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes. 
(WHITE PAPER) READ ABSTRACT |

Managing and Securing Mobile Healthcare Data and Devices by Fiberlink Communications

March 2010 - (Free Research)
Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more! 
(WHITE PAPER) READ ABSTRACT |

Secure Search: Balancing Security with the Need for Information Access by EMC Corporation

August 2008 - (Free Research)
This white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search. 
(WHITE PAPER) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Learning Computing: Why object orientated programming works. by ComputerWeekly.com

January 2012 - (Free Research)
Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey. 
(JOURNAL ARTICLE) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts