Systems InformationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Systems Information returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Resource Planning (ERP)
 •   Data Security
 •   Security Monitoring
 •   Databases
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Application Security
 •   Security Policies
 •   Information Lifecycle Management
 •   Customer Service (General)

Related Searches
 •   Access Systems
 •   Automated Systems Information
 •   Backups Systems Information
 •   Contract Systems
 •   Procurement Systems
 •   Product Systems Information
 •   Small Systems
 •   Solutions Systems
 •   Systems Information Problems
 •   Systems Information Web
Advertisement

ALL RESULTS
1 - 25 of 494 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

An Introduction to Windows Server 2008 Server Manager by Global Knowledge Network, Inc.

January 2008 - (Free Research)
This white paper introduces the Server Manager console and will help you find your way around it, so that you can get up to speed with Server 2008 quickly. 
(WHITE PAPER) READ ABSTRACT |

Information Governance in Action: Success Factors and Best Practices by SearchContentManagement

October 2013 - (Free Research)
Consult this expert resource to learn more about information governance. It explains why it's a key component of effective content and data management. It outlines how to make the business case for an information governance initiative. 
(EBOOK) READ ABSTRACT |

Wireless Push Email for the Smaller Business: A Comparison by J. Gold Associates, LLC

February 2009 - (Free Research)
This whitepaper explores the requirements and use of mobile extensions to email and PIM systems in companies that have selected the popular Microsoft Exchange environment as their email solution. 
(WHITE PAPER) READ ABSTRACT |

One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology by IntraLinks, Inc

June 2010 - (Free Research)
This white paper discusses the driving forces that have made enterprise application integration so critical, reviews available integration approaches and outlines areas of consideration when selecting the best methodology for individual enterprise requirements. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497) by Klocwork

November 2013 - (Free Research)
Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security. 
(WEBCAST) READ ABSTRACT |

LogMeIn Rescue Case Study: Improving Remote Assistance Efficiency at Sophos by LogMeIn, Inc.

July 2011 - (Free Research)
Sophos chose LogMein Rescue to help them improve their remote assistance efficiency .LogMeIn Rescue has made the job of administering their remote assistance tool much easier, but it also impacts the tech and the end customer. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Information for Innovation and Competitive Advantage by IBM

January 2007 - (Free Research)
This paper by Hurwitz & Associates provides an overview of what is required to create an environment that leverages information dynamically in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Specialty Analytics Servers by Sybase, an SAP company

April 2010 - (Free Research)
Businesses are constantly producing complex that needs to be analyzed quickly for critical business needs and decisions. Watch this videocast to learn how Specialty Analytics Servers outperform traditional transaction processing systems in managing the deluge of data and information that is swamping businesses all around the world. 
(VIDEOCAST) READ ABSTRACT |

JobClock by Exaktime

JobClock is a rugged battery-powered timeclock that is locked down at each jobsite 24 hours a day, rain or shine. Each worker carries keytabs on their own keyring that identifies them in the system. 
(HARDWARE PRODUCT)

Security Information and Event Management: Unique McAfee data management technology by McAfee, Inc.

March 2012 - (Free Research)
This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements. 
(WHITE PAPER) READ ABSTRACT |

FISMA Compliance: A Holistic Approach to FISMA and Information Security by IBM

January 2011 - (Free Research)
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Dealing with Chaos: 4 Steps to Manufacturing Success by Infor

September 2008 - (Free Research)
Manufacturers must be prepared to recognize impending change as early as possible, assess the potential impact, determine the optimum strategy for dealing with the change, and implement that strategy in the most effective way possible. In this white paper you'll learn 4 steps toward developing chaos-tolerant business processes. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Secret to Maximizing Virtualization ROI in the Dynamic Data Center by Akorri

November 2009 - (Free Research)
This presentation transcript details an approach to optimize your virtualized infrastructure performance. Learn how to leverage key performance indicators and cross-domain analytics to plan for future capacity demands and improve service levels. Discover the secret to managing your VMware infrastructure performance for optimal resource utilization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Virtual workspaces liberate caregivers from slow terminals reclaiming 6,250 hours a year for patient care by Dell, Inc.

August 2011 - (Free Research)
Holyoke Medical Center needed to transition from handwritten records to a digital workflow. With a mix of aging desktops and newer endpoints, Holyoke wanted to deliver faster system access to medical staff while increasing security and mobility. Learn how Holyoke transitioned to virtual workstations for improved workflow. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Questions about Solid State Storage Technology by Sun Microsystems, Inc.

December 2008 - (Free Research)
This document is based on a Sun Microsystems/TechTarget Webcast entitled "Questions About Solid State Storage Technology." 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM PureApplication System Brochure by IBM

January 2013 - (Free Research)
This resource explores how you can realize a smarter computing approach by embracing expert integrated systems. Inside, learn how these systems can deliver key benefits, including increased efficiency, simplified management, greater control, and more. 
(WHITE PAPER) READ ABSTRACT |

Applying the Four Standards of Security-Based CIA by Global Knowledge

October 2013 - (Free Research)
High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats. 
(WHITE PAPER) READ ABSTRACT |

Empowering Information Security with Desktop Virtualization by Citrix

November 2013 - (Free Research)
This whitepaper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth. 
(WHITE PAPER) READ ABSTRACT |

Information Governance Strategy: Developing a Roadmap for Managing Corporate Info by SearchContentManagement

September 2012 - (Free Research)
Most organizations are looking for ways to better manage their structured and unstructured data – and information governance has the potential to do so. But implementing an effective program can be tricky. Review this e-book to gain practical tips on how to implement an information governance program, learn 5 pitfalls to avoid, and more. 
(EBOOK) READ ABSTRACT |

Importance of Information Governance for Business Users by RSD

April 2014 - (Free Research)
The following white paper explores the importance of information governance of business users and provides technology recommendations that can meet with the compliance and data needs of today's market. 
(WHITE PAPER) READ ABSTRACT |

Iron Mountain Customers Share Compliance, Litigation and Discovery Best Practices by Iron Mountain

August 2012 - (Free Research)
This paper showcases how customers of the world's largest records management consulting practice address their own compliance and discovery requirements with the help of this company's intellectual property, practical advice and best practices. Read on to access short testimonials and descriptions of the services available. 
(WHITE PAPER) READ ABSTRACT |

Maximize the business value of your information by Iron Mountain

March 2012 - (Free Research)
Your company's information is the most valuable asset you have, so protecting it and getting the most business value possible from it is vital to your enterprise's success. Read this white paper to learn how to maximize the value of your physical and digital data to reduce costs, improve efficiency, and reduce risk. 
(WHITE PAPER) READ ABSTRACT |

Get Smart About Big Data by CommVault Systems, Inc.

February 2014 - (Free Research)
This white paper to get more information on a solution that can help you extract maximum value from your information by converging backup and archiving. 
(WHITE PAPER) READ ABSTRACT |

Fidelity Information Services and IBM Storwize V7000 with IBM System Storage Easy Tier by IBM

March 2012 - (Free Research)
This paper describes the benchmark results of a leading server/storage configuration. Obtain detailed information on the unique configuration that was tested as well as the specific architectural components. 
(WHITE PAPER) READ ABSTRACT |

Information Security E-Zine – June 2014 by SearchSecurity.com

June 2014 - (Free Research)
Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios? 
(EZINE) READ ABSTRACT |

1 - 25 of 494 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts