Systems Request ManagersWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Systems Request Managers returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Network Management
 •   Enterprise Systems Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Data Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Content Management (ECM)
 •   Change and Configuration Management

Related Searches
 •   Measurement Of Systems Request Managers
 •   Outsourcing Systems
 •   Systems Creation
 •   Systems Request Managers Based
 •   Systems Request Managers Concerns
 •   Systems Request Managers Financial
 •   Systems Request Managers Global
 •   Systems Request Managers Solution
 •   Systems Request Managers Standard
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Riverbed Stingray Traffic Manager VA Performance on vSphere 4 by Riverbed Technology, Inc.

January 04, 2012 - (Free Research)
Cloud infrastructure platforms like VMware vSphere 4.0 can benefit from load balancers that connect users to the most suitable datacenter. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance compared to a Linux install. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Service Request Manager White Paper by IBM

January 15, 2010 - (Free Research)
This IBM white paper will show you how you can help your organization manage incidents and problems, restore critical services, and minimize service desk calls in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Stingray Traffic Manager Virtual Appliance Performance on vSphere 4 by Riverbed Technology, Inc.

November 07, 2011 - (Free Research)
Cloud infrastructure platforms like VMware vSphere 4.0 can significantly benefit from load balancers that connect users to the most suitable data center. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance figures compared to a Linux install. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Unlocking the value in SAP Solution Manager by Cisco Systems, Inc.

December 17, 2010 - (Free Research)
In this e-book, readers will learn how to uncover the value in Solution Manager, and use the tool not only to benefit IT operations, but help advance business goals as well. 
(EBOOK)

Serena Service Management: Free Trial by SERENA Software, Inc.

April 05, 2012 - (Free Research)
Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year. 
(TRIAL SOFTWARE) READ ABSTRACT |

The Total Economic Impact of CA Identity Manager by CA Technologies.

February 19, 2010 - (Free Research)
In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found. 
(WHITE PAPER) READ ABSTRACT |

SAP ERP: Delivering Employee and Manager Self-Services by SAP AG

September 20, 2010 - (Free Research)
See how SAP ERP allows employees and managers to create and approve leave requests, empowering staff and boosting productivity and efficiency. Watch the demo. 
(VIDEO) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Chalk Talk: Simplify User Access with NetIQ Solutions by NetIQ

April 2014 - (Free Research)
View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications. 
(WHITE PAPER) READ ABSTRACT |

Getting Control of Electronic Discovery by FTI Technology

December 2008 - (Free Research)
This ESG analyst paper discusses the challenges posed by electronic discovery processes, current methods of dealing with these issues, and the potential cost savings that companies could achieve if they choose to invest in technology to help expedite the entire operation. 
(ANALYST REPORT) READ ABSTRACT |

Password Management Survey by LEGACY - DO NOT USE - Siber Systems

September 2008 - (Free Research)
This report shows how RoboForm Enterprise password management solution, can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs. 
(WHITE PAPER) READ ABSTRACT |

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap by SearchExchange.com

June 2009 - (Free Research)
Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process. 
(EBOOK) READ ABSTRACT |

Password Management Survey by RoboForm Enterprise

September 2008 - (Free Research)
This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs. 
(WHITE PAPER) READ ABSTRACT |

Integrate Rational ALM applications with SAP Solution Manager by IBM

December 2012 - (Free Research)
To support effective collaboration, IT teams need to unify and expedite the delivery of SAP and other critical business systems. In this resource, learn how to leverage an ALM platform and other tools that help your respond to the difficulty of managing change in SAP environments quickly and without breaking the bank. 
(WHITE PAPER) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

Gilt Groupe Triples Web Traffic within a year with Riverbed Stingray by Riverbed Technology, Inc.

November 2011 - (Free Research)
With over 5,000 requests per second during peak periods, online retailer Gilt Groupe could lose a large percentage of its daily profits in just 10 minutes of downtime. After choosing the Riverbed Stingray Traffic Manager as its load balancing solution, visits to the site have increased thanks to improved customer satisfaction. 
(CASE STUDY) READ ABSTRACT |

Establish a Strategic Advantage in Managing Change by IBM

August 2010 - (Free Research)
Join Sue Green, Market Manager for IBM Rational Systems at this webcast as she shows you a structured approach to seizing opportunity and managing change amid the fast pace world and complexity of smarter product development. 
(WEBCAST)

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD by SearchSecurity.com

May 2012 - (Free Research)
Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization. 
(EBOOK) READ ABSTRACT |

SecurStor 2500 RAID by Excel Meridian Data, Inc.

SecurStor 2500 RAID is designed as a high-performance and high-availability solution, with multiple configuration options providing available No Single Point of Failure redundancy for up-to 64 TB of multi-host cluster-capable storage. 
(HARDWARE PRODUCT)

Computer Weekly – 4 March 2014: How IT brings aid to refugees by ComputerWeekly.com

March 2014 - (Free Research)
In this week's Computer Weekly, we talk to the CIO at the UN High Commission for Refugees about the vital role that technology plays in supporting its aid programmes. We hear from IT leaders who are ditching BlackBerry – but moving to Windows Phone instead. And we look at how to choose the best hybrid cloud provider. Read the issue now. 
(EZINE) READ ABSTRACT |

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

BIG-IP Application Security Manager™ by F5 Networks

The BIG-IP Application Security Manager delivers the industry’s foremost comprehensive application delivery security solution with the option to deliver both application delivery and security together. The ASM provides application layer protection from targeted and generalized application attacks to ensure that applications are always available. 
(HARDWARE PRODUCT)

Mobility XE Increases Utility Worker Efficiency by NetMotion Wireless

June 2008 - (Free Research)
Using a mobile VPN, workers in the field can quickly and easily access customer information, speeding the time for delivery of service. 
(CASE STUDY) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts