Set ComputersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Set Computers returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Business Intelligence Solutions
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Social Networks and Community Management
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID
 •   Mobile Device Management
 •   Storage Management

Related Searches
 •   Functions Set Computers
 •   Set Computers Code
 •   Set Computers Communication
 •   Set Computers Distribution
 •   Set Computers Equipment
 •   Set Computers Integrated
 •   Set Computers Rhode Island
 •   Set Computers Templates
 •   Set Displays
 •   Set Hr
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Computer Weekly – 4 December 2012: Games giant Sega takes to the cloud by ComputerWeekly.com

December 04, 2012 - (Free Research)
In this week's Computer Weekly, we talk to Sega about how the computer game giant has turned to the cloud to prepare for the Christmas rush. Our latest buyer's guide gives best practice advice on mobile device management. And Unilever tells us how business intelligence and analytics helps to better understand customer needs. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly 25 October 2011: Read this week's issue of the UK's leading technology publication, with news, analysis and opinion on the topics that matter to IT managers by ComputerWeekly.com

October 21, 2011 - (Free Research)
In this week's Computer Weekly, we ask IT experts to help answer the question of why so many big IT projects fail. We report from VMware's user conference in Copenhagen on the latest developments in virtualisation, and analyse the emerging threat from military-style cyber attacks on corporate IT networks. Download the new issue now. 
(EZINE)

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Pervasive Data Profiler v4 by Pervasive Integration

January 2008 - (Free Research)
Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data 
(WHITE PAPER) READ ABSTRACT |

Native XML Management with Documentum by EMC Corporation

July 2003 - (Free Research)
This paper is intended to describe how Documentum manages XML content. 
(WHITE PAPER) READ ABSTRACT |

Get Ready for Master Data Management: Ten Things You Can Do Now by Kalido

October 2008 - (Free Research)
This paper explians in detail ten things you can do now to prepare for your master data management initiative. 
(WHITE PAPER) READ ABSTRACT |

Security Virtualization: Re-architecting the Appliance Mentality by Crossbeam Systems

November 2008 - (Free Research)
In order to determine what "security virtualization" really means, it is useful to understand how companies define and enforce their security and accompanying compliance policies today. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 6 May 2014: The problems of legacy IT in banking by ComputerWeekly.com

May 2014 - (Free Research)
In this week's Computer Weekly, as problems caused by legacy IT in banks become increasingly critical, we assess the difficulties in updating banking systems. After the Windows XP support issues – we look at a similar problem facing Oracle users. And we take an in-depth look at managing corporate networks to enable mobile IT. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly – 8 January 2013: Digital strategies to drive CIOs in 2013 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we look ahead to the challenges facing IT leaders in 2013 and examine how the shift to digital will change the role of the CIO. A new report details how CIOs must adapt to work more closely with business colleagues. And our first buyer's guide of the year focuses on software as a service. Read the issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 17 April 2012: How to ensure smartphone security by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines the growing threat from smartphones being targeted by hackers and viruses as the devices are increasingly used for work. Hospitality giant Mitchells & Butlers talks about its migration to the cloud and the CIO of Airbus discusses his IT priorities and how he spends €500m a year on IT. 
(EZINE) READ ABSTRACT |

Computer Weekly – 20 March 2012: The open data revolution by ComputerWeekly.com

March 2012 - (Free Research)
In this week’s Computer Weekly, Cabinet Office minister Francis Maude talks about releasing government datasets to the public and why open data will drive the next industrial revolution. We also review the latest test version of Windows 8 and see how it shapes up for tablet computers and business users and much more. 
(EZINE)

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

Log Management Best Practices by RSA, The Security Division of EMC

February 2008 - (Free Research)
Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t... 
(WHITE PAPER) READ ABSTRACT |

Secure Enterprise e-mail Solutions with Microsoft® Exchange by Agilysys-Sun Technology Solutions

July 1967 - (Free Research)
This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies. 
(WHITE PAPER) READ ABSTRACT |

Surviving and Thriving in the Customer-Driven Age by Oracle Corporation

September 2008 - (Free Research)
The customer-driven age is upon us and succeeding in this environment requires a new set of goals and a new set of tools. Learn how CRM is the catalyst to transform organizations, empower employees and capitalize on new market opportunities. 
(WHITE PAPER) READ ABSTRACT |

Global profiles of the fraudster by ComputerWeekly.com

November 2013 - (Free Research)
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Smartphone market set to expand as vendors vie for position by ComputerWeekly.com

November 2010 - (Free Research)
The Smartphone market is characterised by increasing competition on one hand and healthy growth prospects in the medium-term on the  other. Barriers to entry are high for most players, owing to the global nature of the  mobile industry and the consequent financial strength required to enter the market. 
(WHITE PAPER) READ ABSTRACT |

Mobile Virtualization and Remote Access on Windows Mobile Smartphones by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. 
(WHITE PAPER) READ ABSTRACT |

California Institute for Telecommunications and Information Technology (Calit2) Uses Kognitio WX2 for CAMERA Project by Kognitio

July 2007 - (Free Research)
In this case study Calit2 and Cyberinfrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) develop a cost-effective, high-performance environment where researchers have unlimited access to the existing genomics data. 
(CASE STUDY) READ ABSTRACT |

The Impact of AJAX on the Network by F5 Networks

March 2007 - (Free Research)
Though AJAX has a unique impact on the client, server, and the network, these challenges are addressed by existing, proven application delivery methods that address similar challenges arising from other technologies. 
(WHITE PAPER) READ ABSTRACT |

The Business Drivers for Data Center Excellence by Liquid Computing

October 2008 - (Free Research)
The Data Center Excellence Executive Leadership Report Series provides executives with an approach to align the investment and support of their data centers into the organization's overall strategic goals and objectives. 
(WHITE PAPER) READ ABSTRACT |

Supply Chain Management in Kraft by Board International

June 2008 - (Free Research)
In order to maintain its market leadership, Kraft Food's products should reach their destinations faster and faster, but in the most effective way. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts