Standards FlowWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Standards Flow returned the following results.
RSS What is RSS?
Related Categories

 •   Networks
 •   Network Management
 •   Network Security
 •   Virtualization
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Enterprise Resource Planning (ERP)
 •   Data Center Management
 •   Content Delivery Networks/ Web Application Acceleration
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Directory Standards
 •   Research Standards Flow
 •   Sheet Standards
 •   Standards Conversion
 •   Standards Flow Architecture
 •   Standards Flow Digital
 •   Standards Flow Methods
 •   Standards Flow Trend
 •   Standards Industry
 •   Tool Standards Flow
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Managing the Transition to International Financial Reporting Standards by Oracle Corporation

July 01, 2008 - (Free Research)
This white paper identifies the many challenges companies face when implementing International Financial Reporting Standards (IFRS) in corporate reporting. The Oracle solution provides the high level of analysis and transparency that companies need in today's demanding and uncertain global financial reporting environment. 
(WHITE PAPER) READ ABSTRACT |

Complying with Payment Card Industry Data Security Standards Using SEA System I Solutions by Software Engineering of America, Inc.

February 2008 - (Free Research)
This document highlights how Software Engineering of America's solution for the System i help to ensure PCI Compliance. 
(WHITE PAPER) READ ABSTRACT |

Modelling the Insurance Enterprise by ComputerWeekly.com

February 2013 - (Free Research)
This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Polycom UC Intelligent Core: Scalable Infrastructure for Distributed Video by Polycom, Inc.

July 2011 - (Free Research)
Access this paper to learn of the scalability issues in the core of your UC network. Discover the approaches to creating a scalable, intelligent, distributed video infrastructure that supports today's video-enabled organizations and service providers offering video services. 
(WHITE PAPER) READ ABSTRACT |

Controlling laptop and smartphone access to corporate networks by Dell Software

September 2012 - (Free Research)
Mobile devices are conduits of greater access and information flow, but can serve as a vehicle for malware and other security threats. Companies that rely on RDP solutions are more susceptible, because they may only support weak encryption standards. Find out how your IT department can scan all traffic to ensure network integrity and security. 
(WHITE PAPER) READ ABSTRACT |

Pharmaceutical Services Company Accelerates Virtual Desktops by Cisco Systems, Inc.

July 2012 - (Free Research)
This case study demonstrates how Quintiles Pharmaceutical Services extended WAN optimization to 100 percent of their virtual desktop infrastructure and improved traffic flow with their existing bandwidth, allowing for secure and centralized data and access control, and high levels of employee satisfaction. 
(CASE STUDY) READ ABSTRACT |

Case Study: Traceability for MUMM by Intermec

October 2013 - (Free Research)
MUMM is a global leader in the wines and spirits industry, but they needed a better solution for batch traceability requirements. In order to maintain grape quality for their products, MUMM needed to establish a system to keep their standards in order. 
(WHITE PAPER) READ ABSTRACT |

Data Center Projects: Commissioning by APC by Schneider Electric

November 2009 - (Free Research)
The commissioning process flow is described and critical success factors are discussed. The commissioning process inputs and outputs are also placed in context with other key data center project process phases and steps. 
(WHITE PAPER) READ ABSTRACT |

Introduction to XML Gateways: Best Practices, Benefits & Requirements by Forum Systems

September 2009 - (Free Research)
This paper will give you an overview of enabling virtualization and control, enforcing data-level privacy and integrity and control and audit information flow. You'll learn the best practices, benefits and requirements of XML Gateways. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Password Management: A Guide to Best Practices by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
Passwords are an essential security technique. This white paper reviews best practices to password management and provides contrast methods of dealing with Enterprise Single Sign-On (ESSO) and describes an alternative approach to ESSO. 
(WHITE PAPER) READ ABSTRACT |

RTSP: One of the Foundations of Convergence by F5 Networks

September 2007 - (Free Research)
Real-Time Streaming Protocol (RTSP) is a foundation for the current convergence of communications. When implementing RTSP, the multiple port and protocol nature of RTSP makes streaming audio/video difficult to manage. This white paper explains it. 
(WHITE PAPER) READ ABSTRACT |

The Netflow Next Generation Appliance by Cisco Systems, Inc.

July 2012 - (Free Research)
Learn about Cisco’s NetFlow Generation Appliance (NGA), a high-performing, scalable solution that establishes a new standard for high-performance and crows-device flow visibility in the data center for help with resource optimization, application performance improvement, traffic accounting, and security needs. 
(WEBCAST) READ ABSTRACT |

Geek Speak: A Technical Analysis of NetFlow, J-Flow, sFlow and IPFIX by SolarWinds, Inc.

May 2008 - (Free Research)
Have you ever wanted to know more about how network traffic flow protocols like NetFlow, J-Flow, sFlow, and IPFIX work? 
(WEBCAST) READ ABSTRACT |

z Cisco Catalyst 2950 Series Switches with Standard Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

IDC TOPLINE - Keeping Cash Flow in Focus While Driving Business Performance by SAP America, Inc.

June 2011 - (Free Research)
This IDC Research white paper reveals the dynamics of understanding and utilizing cash flow. 
(ANALYST REPORT) READ ABSTRACT |

Cisco® ONE: The Value of Advanced Flow Control by Cisco Systems, Inc.

May 2013 - (Free Research)
Discover how utilizing the advanced flow control capability in Cisco Open Network Environment (ONE) can help you overcome the complex monitoring challenges you are facing today. 
(WHITE PAPER) READ ABSTRACT |

Can Your Data Center Infrastructure Handle the Heat of High Density by CyrusOne

August 2008 - (Free Research)
High density computing is today's standard in best-in-class performance and availability, and those that fail to keep pace or fall behind will find themselves no longer competitive in today's markets. 
(ANALYST REPORT) READ ABSTRACT |

IFS Enterprise Asset Management - EAM / CMMS by IFS

IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit. 
(SOFTWARE PRODUCT)

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Solving Patient Throughput and Capacity Challenges by StatCom

May 2008 - (Free Research)
This white paper is for hospital decision-makers and those who are evaluating patient flow and capacity management technologies. It examines the challenges healthcare organizations are facing in managing patient throughput and capacity. 
(WHITE PAPER) READ ABSTRACT |

Finance for IT decision makers: Making business cases by ComputerWeekly.com

January 2013 - (Free Research)
This extract from Michael Blackstaff's book, Finance for IT decision makers, teaches you how to make effective business and financial cases for IT projects. 
(BOOK) READ ABSTRACT |

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization by McAfee.

February 2012 - (Free Research)
The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow. 
(WHITE PAPER) READ ABSTRACT |

Gigamon Intelligent Flow Mapping by Gigamon

December 2012 - (Free Research)
A key factor in ensuring application availability and network performance is having a traffic visibility solution that can efficiently handle huge volumes of data in real time and thus deliver relevant traffic to the relevant tool. Access this white paper gain greater insight about traffic visibility solutions and so much more! 
(WHITE PAPER) READ ABSTRACT |

Software Security Analysis: Control Flow Security Analysis with McCabe IQ

by McCabe Software, Inc.

April 2012 - (Free Research)
<p>Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes</p> 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts