Study ITWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Study IT returned the following results.
RSS What is RSS?
Related Categories

 •   Social Networks and Community Management
 •   Data Security
 •   Endpoint Security
 •   Authentication / Password Management
 •   Content Delivery Networks/ Web Application Acceleration
 •   Virtualization
 •   Application Security
 •   Business Process Management (BPM)
 •   Service Oriented Architecture (SOA)
 •   Security Policies

Related Searches
 •   Employee Study IT
 •   Industry Study
 •   Order Study IT
 •   Storage Study
 •   Study Capacity
 •   Study Computer
 •   Study Conversion
 •   Study IT Georgia
 •   Study India
 •   Study Wisconsin
Advertisement

ALL RESULTS
1 - 25 of 454 | Next Page

Case Study: IT Informatik - Leveraging Linux on IBM Power by IBM

April 30, 2013 - (Free Research)
Explore this exclusive case study to find out how a Germany-based business partner of IBM utilizes these technologies to create an efficient data center, and fuel business productivity. 
(CASE STUDY) READ ABSTRACT |

TOPS-HP Video Case Study: IT Infrastructure Migration by Hewlett-Packard Limited

December 31, 2010 - (Free Research)
In this on-demand video case study, learn how the right technology partner enabled grocery store retailer TOPS Markets to seamlessly migrate its IT infrastructure during the busy retail season. Tune in to learn more now. 
(WEBCAST) READ ABSTRACT |

SOA and BPM: Aligning Business Needs with Your Architecture by SoftwareAG Inc., USA

May 2008 - (Free Research)
This document presents best practices in composing SOA-enabled business processes and a case study of how to create a configurable business architecture. 
(WHITE PAPER) READ ABSTRACT |

It's Not "If" You Collaborate, But "How" by Cisco Systems, Inc.

September 2009 - (Free Research)
To learn more about who collaborates and why, Cisco recently conducted one of the first comprehensive studies of the personal and cultural factors associated with successful adoption of network based collaboration. Read the full report, and find out more about how collaboration transforms business. 
(VIDEO)

Web Application Security: How to Minimize the Risk of Attacks by Qualys

July 2012 - (Free Research)
This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Streaming and Virtual Hosted Desktop Study by Intel

November 2008 - (Free Research)
Read this paper to learn what Intel IT found when they compared the impact on servers and the network for both streaming software and virtually hosted computing models. 
(WHITE PAPER) READ ABSTRACT |

Podcast--Connecting Through Content Issue One: How Technology Marketers Meet Buyers' Appetite For Content by KnowledgeStorm, Inc (E-mail this company)

May 2007 - (Free Research)
This report discusses content strategies and preferences from the unique perspectives of both the B2B technology buyers and marketers. 
(PODCAST) READ ABSTRACT |

Connecting Through Content: Issue One by KnowledgeStorm, Inc (E-mail this company)

March 2007 - (Free Research)
This report, Issue One: How Technology Marketers Meet Buyers' Appetite for Content is the first in the Connecting Through Content series, which explores content creation, distribution and lead nurturing through the dual marketers' and technology buyers' perspectives. 
(ANALYST REPORT) READ ABSTRACT |

The InfoPro end-user storage study highlights shifts in data protection by The 451 Group (E-mail this company)

October 2012 - (Free Research)
In this Spotlight report, we analyze the data protection findings from the latest TIP Storage Wave study. Among mid-large sized enterprises, the hot spots are de-duplication appliances and backup/recovery for virtual servers – not cloud storage. 
(WHITE PAPER) READ ABSTRACT |

Case Study: How John Lewis Conquered the Web by ComputerWeekly.com

March 2014 - (Free Research)
Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business. 
(BOOK) READ ABSTRACT |

What's Working in HR Today, and the Biggest Gaps to Fill by Oracle Corporation

November 2012 - (Free Research)
This study explores talent management tactics that are working for companies today and the extent to which companies have been able to integrate talent management applications and move toward a holistic process. Read on to learn about current talent management pros as well as areas that could use some improvement. 
(WHITE PAPER) READ ABSTRACT |

Desktops: Corporate IT Buying Behavior & Customer Satisfaction Survey by Dell, Inc. and Intel®

June 2009 - (Free Research)
This Technology Business Research (TBR) study examines the results of the corporate desktop satisfaction competition for Q1 of 2009, for which Dell ranked in the top position. Read this to learn about each brand's competitive strengths, weaknesses, challenges, and overall satisfaction rankings. 
(ANALYST REPORT) READ ABSTRACT |

Improving IT Economics and Gaining Business Value with CA Enterprise IT Management Software: An ROI Study by CA Technologies.

November 2008 - (Free Research)
This paper details a study that used standard IDC ROI methodology to calculate the costs of performing common IT administrative, operational, and support functions. With the recent dislocations in the world economy, the findings here can guide your company to increased productivity, cost savings, and revenue. 
(WHITE PAPER) READ ABSTRACT |

Global lessons in eHealth implementation by ComputerWeekly.com

April 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study by Sybase, an SAP company

November 2010 - (Free Research)
This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence. 
(WHITE PAPER) READ ABSTRACT |

The Unofficial Official VCAPS5-DCA Study Guide by Veeam Software

January 2014 - (Free Research)
Take a look at this extensive study guide to find the answers to any questions you may have about these IT technologies. 
(EGUIDE) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Two-Dimensional Computational Fluid Dynamics Analysis of Blanking Panel Solutions by Upsite Technologies, Inc.

February 2008 - (Free Research)
This white paper discusses a study showing the effect of blanking (filler) panels on airflow patterns and IT equipment intake temperatures within equipment (server) cabinets. 
(WHITE PAPER) READ ABSTRACT |

Binary Option: Neustar SiteProtect Case Study by Neustar®

March 2014 - (Free Research)
This exclusive case study examines how an independent trading website was able to utilize a security service that protects against DDoS attacks 24/7, mitigating the attack when it occurs and escalating when needed. 
(CASE STUDY) READ ABSTRACT |

Case Study: Secure BYOD With an SDN Application by Hewlett-Packard Limited

April 2014 - (Free Research)
This exclusive case study examines how an educational institution was able to take advantage of an SDN application to leverage existing hardware and allow users to connect their personal devices to the network securely, allowing for a remarkable increase in productivity. 
(CASE STUDY) READ ABSTRACT |

Case Study: Protection and Replication for Remote Data Sources by Iron Mountain

May 2011 - (Free Research)
Employees sometimes lose track of their laptops, either through misplacing them or through theft. One of the main concerns of IT was to protect vital business data on laptops, to prevent that data from falling into the wrong hands, and also to get the employee's system working again. Read this case study to learn one company's solution. 
(CASE STUDY) READ ABSTRACT |

Case Study: OhioHealth eliminates hours of time in managing its storage environment by IBM

December 2011 - (Free Research)
OhioHealth must be able to recover and produce medical records at any point in time for medical and legal reasons. Fortunately there is a storage manager available to help OhioHealth recover data if it is needed. 
(CASE STUDY) READ ABSTRACT |

Case Study: Housing Works reduces backup and restore times by more than 90 percent by IBM

June 2012 - (Free Research)
When a tape backup failed after a small electrical fire damaged a file server, 3 IT staff members had to spend more than two weeks re-inputting data - which delayed other projects. Read this case study to learn about this organization benefited from deploying an instant restore appliance. 
(CASE STUDY) READ ABSTRACT |

Changing Times, Changing Business: Why Finance Management is Moving to Cloud by Workday

June 2013 - (Free Research)
A new study from Saugatuck Technology shows 51% of finance and IT executives feel their existing systems limit their ability to reach strategic goals. The culprits? No flexibility, siloed systems, poor access to information, and the high cost of maintenance. Read the report for the fascinating conclusions from the study. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Inside Hitachi Global Storage Technologies' Rapid Supply Chain Deployment by E2open

January 2005 - (Free Research)
Read this case study to learn provide how Hitachi builds an integrated face to all of its business partners and customers to make it simple for suppliers and customers to do business with Hitachi. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 454 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts