Source TopWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Source Top returned the following results.
RSS What is RSS?
Related Categories

 •   Open Source
 •   Databases
 •   Data Center Management
 •   Application Security
 •   Vulnerability Assessment
 •   Data Security
 •   Virtualization
 •   Business Intelligence Solutions
 •   Automated Security Auditing/ Source Code Analysis
 •   Network Security

Related Searches
 •   Ecommerce Source
 •   Source Applications
 •   Source Function
 •   Source Java
 •   Source Top Advertising
 •   Source Top Budgeting
 •   Source Top Colorado
 •   Source Top Examples
 •   Source Top South Dakota
 •   Source Top Sql
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Lowering the Cost of Business Intelligence With Open Source: A Comparison of Open Source and Traditional Vendor Costs by Pentaho Corporation

June 03, 2010 - (Free Research)
Many of the top reasons given for the use of open source BI software is "lower costs." The question is whether commercial open source actually matters when it comes to lowering license and support costs. Read this analyst report for comparison of the software and support costs of traditional BI vendors versus commercial open source BI from Pentaho. 
(ANALYST REPORT) READ ABSTRACT |

How to Meet the Top 5 Data Integration Requirements with Oracle by Oracle Corporation

January 31, 2013 - (Free Research)
Combining various sources of data is often challenging, so many businesses today are turning to data integration technologies to gain visibility into all business-critical data. This white paper outlines five fundamental requirements of a successful data integration strategy, and presents a family of products that can help you meet these needs. 
(WHITE PAPER) READ ABSTRACT |

Middleware that Puts Open Source to the Test by Red Hat

April 01, 2008 - (Free Research)
This paper is intended primarily for senior IT managers responsible for enterprise architecture, application development, and application operations. Managers evaluating middleware solutions will gain a deeper understanding of how JBoss Enterprise Middleware products are developed and why they offer an ideal platform for the development... 
(WHITE PAPER) READ ABSTRACT |

Top Data Integration Trends and Best Practices by Talend

April 11, 2011 - (Free Research)
Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations. 
(EBOOK)

Top Reasons To Choose Red Hat Enterprise Linux by Red Hat and Intel

August 10, 2009 - (Free Research)
You probably already know that some of the largest and most demanding companies trust Red Hat to drive the IT infrastructure behind their successful businesses. This whitepaper will list and discuss the top reasons you should choose Red Hat Enterprise Linux to power the demanding applications you rely on to run your company. 
(WHITE PAPER) READ ABSTRACT |

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 01, 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

Top 10 Reasons Customers Choose SAP for Business Transformation by SAP America, Inc.

January 01, 2006 - (Free Research)
SAP is a customer’s company, whose organization is designed for, and encouraging of, innovation in all its aspects - from product development to product delivery to product implementation. Read this white paper to discover the top 10 reasons why customers choose SAP for their business transformation. 
(WHITE PAPER) READ ABSTRACT |

Top Signs of an Analytics gap and how to Address Them by IBM

April 01, 2014 - (Free Research)
In this expert e-guide from SearchHealthIT.com, uncover the 3 major signs of an analytics gap within your healthcare organization. Click through to explore the repercussions if you fail to address the gap. 
(EGUIDE) READ ABSTRACT |

Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security by Lumension

May 2008 - (Free Research)
Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter. 
(WHITE PAPER) READ ABSTRACT |

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

2013 Impact Awards Reveal Industry Top Players by SearchDataCenter.com

December 2013 - (Free Research)
The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery. 
(WHITE PAPER) READ ABSTRACT |

Postgres Plus 8.4 vs. MySQL 5.5: Feature Comparison and Commentary by EnterpriseDB Corporation

September 2010 - (Free Research)
This paper compares Postgres Plus Standard Server and Postgres Plus Advanced Server 8.4 against MySQL 5.5. The comparison is broken down into a number of sections with a short commentary following each section. Read on to learn how the Postgres Plus 8.4 stacks up against MySQL 5.5 on all the above topics and learn which one comes out on top. 
(WHITE PAPER) READ ABSTRACT |

Standardize the Application Release Process by OpenMake Software

May 2014 - (Free Research)
Improving the process of application packaging and deployment is a top priority for businesses working with distributed applications, such as Java. Without a centralized, standardized approach, enterprises with a large number of development teams and heterogeneous environments will continue to suffer from inefficiencies. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Top Considerations for Selecting a Deduplication Solution by CommVault Systems, Inc.

August 2011 - (Free Research)
In this SearchDataBackup.com E-Guide, storage pros Alan Earls and Rich Cook will cover some key issues to consider when selecting a deduplication solution. Included in this expert E-Guide – the advantages of deduplication software vs. appliances, dedupe vendors, source vs. target products and much more. 
(EGUIDE) READ ABSTRACT |

File Archive: the next big thing? by EMC Corporation

October 2013 - (Free Research)
Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more. 
(VIDEO) READ ABSTRACT |

The next big idea: integrating innovation and portfolio management by IBM

December 2010 - (Free Research)
Organizations that can continually deliver innovative products and services often garner majority marketplace share, premium profit margins and an industry-leading status. This white paper focuses on controlling that innovation with a portfolio management solution that will support sourcing, prioritization, process support, and more. 
(WHITE PAPER) READ ABSTRACT |

Extending Xen with Intel® Virtualization Technology by Intel Corporation

August 2006 - (Free Research)
For Linux servers, Xen acts as the virtual machine monitor which can offer support to unmodified and paravirtualized guest operating systems. Read this white paper to get a better understanding of Xen and recent changes that enhance virtual perform... 
(WHITE PAPER)

Special Report on Steria by ComputerWeekly.com

September 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Steria, its strategy, products and services and reviews its financial performance. 
(WHITE PAPER) READ ABSTRACT |

OpenStack Hype vs. Reality by Red Hat

May 2014 - (Free Research)
This whitepaper examines the results of an IDG Quick Poll of CIOs regarding their stance on OpenStack deployment, highlighting the ways in which these companies plan to use this technology and the top barriers to OpenStack deployment. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Top Five Reasons to Use the RadiantOne Federated Identity System With SharePoint by Radiant Logic, Inc.

June 2014 - (Free Research)
This resource highlights the benefits of a federated identity service for organizations with scalable user environments. 
(WHITE PAPER) READ ABSTRACT |

Expert Handbook: Top Strategies for Managing Data Growth by SearchDataManagement

February 2013 - (Free Research)
An organization's unstructured and semi-structured information is not typically a good fit for relational databases. And it also adds to the data integration workload- and challenges- for IT managers and staff. Access this guide for insight and practical advice on managing integration projects involving large amounts of data- specifically big data. 
(EBOOK) READ ABSTRACT |

Best Practices for Building Private Cloud Architecture by Citrix

November 2013 - (Free Research)
This comprehensive webinar reviews everything you need to consider, from hardware to software, when designing and developing your private cloud architecture. 
(WEBCAST) READ ABSTRACT |

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders by Imperva

October 2009 - (Free Research)
For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts