Standard CaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Standard Case returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Storage Management
 •   Security Monitoring
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Access Control
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Demos Standard Case
 •   Functions Standard Case
 •   Programs Standard Case
 •   Reservation Standard
 •   Standard Case Capture
 •   Standard Case Computerized
 •   Standard Case Intrastructures
 •   Standard Case Presentation
 •   Standard Webinars
 •   Tutorial Standard Case
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Case Study: Providing Top-Notch Customer Service With the Latest Communications Technologies by Cisco Systems, Inc.

July 15, 2013 - (Free Research)
This informative case study examines how a full-service financial institution utilized a collaboration platform to meet a broad set of requirements, including high availability and scalability, intelligent call routing and integration with email and existing solutions. 
(WHITE PAPER) READ ABSTRACT |

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 20, 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

Using XML and Databases: W3C Standards in Practice by EMC Corporation

August 14, 2008 - (Free Research)
This paper describes the challenges faced in managing information in robust systems that enable reuse of XML-encoded data objects and support their efficient processing. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 13 November 2012: Government commits to open standards by ComputerWeekly.com

November 13, 2012 - (Free Research)
In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now. 
(EZINE) READ ABSTRACT |

How Microsoft Designs the Virtualization Host and Network Infrastructure by Microsoft Corporation India Pvt Ltd

December 22, 2009 - (Free Research)
This case study provides IT professionals and technical decision makers working in large enterprises with the information they need to plan and deploy server virtualization by using Windows Server 2008 Hyper-V. 
(CASE STUDY) READ ABSTRACT |

Security Assertion Markup Language (SAML) - the Essential Guide by Ping Identity Corporation

September 14, 2011 - (Free Research)
This white paper introduces identity federation and the predominant standard, Security Assertion Markup Language, or SAML, to a non-technical audience. Describes why standards like SAML are necessary for implementing scalable, secure federated identity across organizational boundaries. And more! 
(WHITE PAPER) READ ABSTRACT |

Analyst Report: Case Management Automation - Facilitating Compliance by EMC Corporation

September 30, 2010 - (Free Research)
Read this white paper to learn about the compliance implications of case-based process automaiton. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Standardizing Business Continuity by IBM

December 15, 2010 - (Free Research)
Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more! 
(EBOOK) READ ABSTRACT |

The Best PCI Audit of Your Life by Lumension

August 13, 2009 - (Free Research)
This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life. 
(WHITE PAPER) READ ABSTRACT |

City of Ulm Case Study by Centennial-Software

July 2008 - (Free Research)
The City of Ulm turns to Enteo v6 to rollout Windows Vista and applications on all clients with minimal effort and high degree of reliability. 
(CASE STUDY) READ ABSTRACT |

The Business Case for Automating Document Driven Business Processes by Kofax, Inc.

October 2009 - (Free Research)
This white paper provides the compelling case for taking an enterprise approach to automating document driven business processes. Find out how document capture is quickly moving toward mainstream adoption and how the shift from scan-to-archive to scan-to-process is profoundly changing the strategic importance of capture as an enterprise standard. 
(WHITE PAPER) READ ABSTRACT |

LTFS Is a Game-Changing Technology: Extends Use Cases for Tape-Based Archiving by Iron Mountain

May 2013 - (Free Research)
This informative white paper discusses LTFS by exploring its benefits and use cases for tape-based archiving. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Enterprise VoIP by Intel Corporation

January 2008 - (Free Research)
This white paper reviews a recent study which integrated voice over Internet protocol (VoIP) into the production enterprise environment, giving employees av opportunity to experience the benefits that VoIP and unified messaging bring to the workplace. 
(WHITE PAPER) READ ABSTRACT |

Modelling the Insurance Enterprise by ComputerWeekly.com

February 2013 - (Free Research)
This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Case Study: HyTrust Helps a Regional Nature and Science Museum Gain the Benefits of Virtualization by HyTrust

July 2011 - (Free Research)
With a series of servers that must comply with all the PCI standards, a regional museum needed a tool that assisted with securing and documenting PCI compliance. Access this resource for a case study of the museum's implementation of the HyTrust Appliance and reduced the burden of PCI compliance. 
(CASE STUDY) READ ABSTRACT |

Vblock Becomes the Credit Agricole Corporate Standard by VCE (E-mail this company)

December 2013 - (Free Research)
Take a look at this brief case study to learn about the challenges and results Credit Agriocle - the biggest retail bank in France and one of the largest financial services groups in Europe - encountered when deploying their private cloud system. 
(CASE STUDY) READ ABSTRACT |

Case Study: Microsoft® Technology Center Reduced SharePoint 2010 Migration by Two Months with DocAve® by AvePoint, Inc.

June 2011 - (Free Research)
Migrating from SharePoint 2007 to the 2010 platform comes with a host of challenges. This brief case study shows how a leading New York City technology center saved time and money with a migration solution. 
(CASE STUDY) READ ABSTRACT |

Case Study: Traceability for MUMM by Intermec

October 2013 - (Free Research)
MUMM is a global leader in the wines and spirits industry, but they needed a better solution for batch traceability requirements. In order to maintain grape quality for their products, MUMM needed to establish a system to keep their standards in order. 
(WHITE PAPER) READ ABSTRACT |

Case Study: University College London Hospitals (UCLH) by IBM

December 2010 - (Free Research)
This case study explains how UCLH implemented a patient tracking system (PTS) with Lombardi Teamworks at its core, which alerts them when a patient is delayed in their treatment pathway before they go over their 18wkRTT and allows them to only have to enter patient information once into the system instead of multiple times. 
(CASE STUDY) READ ABSTRACT |

Bluewater Power Prepares for Smart Metering with SAP and IBM Solutions by IBM

November 2010 - (Free Research)
Bluewater Power implemented a set SAP and IBM solutions to help deal with new regulations and mandates in the energy sector. Read this case study to learn all the benefits Bluewater experienced by choosing this set of SAP and IBM solutions and learn how your organization can experience these same benefits as well. 
(CASE STUDY) READ ABSTRACT |

King County by NetApp

June 2013 - (Free Research)
In this case study, you will discover how a county government located in Puget Sound built a shared infrastructure on an innovative storage platform to migrate departments to a standard, virtualized environment that is more cost effective, secure, and reliable. Find out how they were able to improve and enhance service delivery to citizens. 
(CASE STUDY) READ ABSTRACT |

Case History of Data Center Ground Fault Protection Optimization by Schneider Electric

January 2011 - (Free Research)
Read this case history of data center ground fault protection optimization to learn how to build the ideal ground fault protection system with easy to follow instructions and diagrams. Read on for more information on electrical power distribution and control. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: ISACA PCI Compliance Symposium by Intel

May 2011 - (Free Research)
Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Secure Cloud Access Reference Architecture & Use Model by Intel

March 2011 - (Free Research)
This session presents a simple use case and reference architecture and layers how each of these standards & technologies can play a role: AuthN: SAML, Open ID, OAuth, Pledge (OTP), AuthZ: XACML, Platform Connectors: IdM & Provisioning, Client & Server: TXT, IPT (Identity Protection). 
(WEBCAST) READ ABSTRACT |

Dirk Hohndel on Intel and the Linux Foundation by Intel

November 2010 - (Free Research)
In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel. 
(VIDEO)

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts