Technical ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Technical Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data and Application Distribution
 •   Application Management and Maintenance
 •   Application Security
 •   Availability, Performance and Problem Management
 •   Storage Management
 •   Enterprise Systems Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Operating Systems and Subsystems
 •   Data Center Management

Related Searches
 •   Automate Technical
 •   Buy Technical
 •   Technical Applications Case Studies
 •   Technical Applications Demonstration
 •   Technical Applications Guide
 •   Technical Applications Integration
 •   Technical Applications National
 •   Technical Applications Uk
 •   Technical Contacts
 •   Tracking Technical
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

IBM System Storage N6000 Series by IBM

May 11, 2011 - (Free Research)
With IBM System Storage N6000 series systems, you can meet your NAS storage needs and provide high levels of application availability for your critical business operations to technical applications. You can also address NAS and SAN, primary and secondary storage requirements plus get outstanding value. 
(MICROSITE) READ ABSTRACT |

Backup by Panasas, Inc.

August 12, 2010 - (Free Research)
The explosion of unstructured data and the advent of scale out NAS systems has caused backup of these systems to be an ever growing concern. This white paper describes the overall strategy for backup and restore taking into account the tape subsystem, networking, file system workload and administrative policy. 
(WHITE PAPER) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

JBoss Enterprise Middleware, by Red Hat: Technical Support Services Leader by Red Hat

November 01, 2011 - (Free Research)
This white paper discusses the features of JBoss Enterprise Middleware and highlights technical and customer support as the key characteristic that sets this middleware apart from the competition. 
(WHITE PAPER) READ ABSTRACT |

The Role of Technical Computing in IT and Big Data by IBM

November 13, 2013 - (Free Research)
This on-demand webcast examines how technical computing strategies can help you process, manage, and analyze growing data volumes and varieties. Tune in today to uncover the role of technical computing in IT and big data. 
(WEBCAST) READ ABSTRACT |

Focus Research Series: Desktop and Application Delivery Landscape Report with All Profiles by Focus

April 2008 - (Free Research)
This excerpt of the Focus Landscape Research Series covers the drivers, trends, technical approaches and available solutions involved in evaluating and implementing desktop and application virtualization and delivery alternatives. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com

June 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state. 
(EBOOK) READ ABSTRACT |

Oracle Solaris Optimized for Sun x86 Systems in the Enterprise by Oracle Corporation

July 2010 - (Free Research)
This document is intended as a technical guide for developers and system administrators that want to understand the precise details of how Oracle Solaris and Oracle’s Sun x86 systems using Intel Xeon processor 5600 and 7500 series can improve your enterprise application solution environment. 
(WHITE PAPER) READ ABSTRACT |

Oracle Solaris Operating System: Optimized for Sun x86 Systems in the Enterprise by Oracle Corporation

July 2010 - (Free Research)
This document is intended as a technical guide for developers and system administrators that want to understand the precise details of how Oracle® Solaris and Oracle’s Sun x86 systems using Intel® Xeon® processor 5600 and 7500 series can improve your enterprise application solution environment. 
(WHITE PAPER) READ ABSTRACT |

IT Courseware by SkillSoft Corporation

SkillSoft's IT Skills instruction is designed to encourage and prompt frequent learner interaction with the course content. SkillSoft maintains courseware integrity and effectiveness by offering a balance of thorough instruction, challenging practice exercises and quizzes. 
(ASP & SOFTWARE PRODUCT)

Technical Guide on SIM: Moving beyond network security toward protecting applications by SearchSecurity.com

December 2011 - (Free Research)
SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs. 
(EGUIDE) READ ABSTRACT |

Best Practices to Device Control: An In-Depth Technical Webcast by Lumension

May 2013 - (Free Research)
This webcast offers practical steps you can take to implement the device control and encryption technologies that will help you effectively address the vulnerabilities associated with removable storage devices. Watch and learn more about laying the groundwork for data security, technical enforcement, data protection policies and more. 
(WEBCAST) READ ABSTRACT |

Successful Business Guide for Data Migration: Re-engineering Data for Optimized Value by Datanomic

April 2008 - (Free Research)
Up to 75% of new systems fail to meet expectations, often because flaws in the migration process result in invalid data. With an understanding of the challenges, managing the migration as part of the investment is much more likely to... 
(WHITE PAPER) READ ABSTRACT |

Transitioning to LTE: Business and Technical Considerations by Alcatel-Lucent

November 2010 - (Free Research)
LTE evolution is more than a move to a new technology. It encompasses a shift in the service provider’s business model to a more sustainable and profitable one. Read this presentation transcript to learn more!Trackback URL 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report by ComputerWeekly.com

February 2011 - (Free Research)
This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations. 
(WHITE PAPER) READ ABSTRACT |

E-Book: SAP upgrade tips and best practices by Panaya, Inc.

March 2010 - (Free Research)
SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it difficult to make a case for a technical SAP ERP upgrade. Read this paper to learn about six SAP upgrade tips and best practices for global environments which can help avoid costly downtime and issues. 
(EBOOK) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK) READ ABSTRACT |

Best Practices when implementing VMware vSphere in a Dell EqualLogic PS Series SAN Environment by Dell, Inc.

October 2013 - (Free Research)
This technical white paper details a set of best practices for configuring a virtual environment. 
(WHITE PAPER) READ ABSTRACT |

Technical diagrams of SharePoint 2010 Architecture by Microsoft Corporation India Pvt Ltd

November 2009 - (Free Research)
This article contains a number of technical diagrams describing Microsoft SharePoint Server 2010 features, upgrade considerations, and benefits. Many of these resources are visual representations of recommended solutions. They include poster-sized documents available in formats including Microsoft Office Visio 2007 files, PDF files, and XPS files. 
(WHITE PAPER) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Top Five Reasons to Choose Toad® Over SQL Developer by Dell Software

February 2011 - (Free Research)
Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today. 
(WHITE PAPER) READ ABSTRACT |

Feature and Technical Overview: BlackBerry Enterprise Server for Microsoft Exchange by BlackBerry

October 2010 - (Free Research)
The BlackBerry® Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. Continue reading for an overview of the features and technical aspects for the BlackBerry® Enterprise Server for Microsoft Exchange. 
(PRODUCT OVERVIEW) READ ABSTRACT |

A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server by Oracle Corporation

January 2011 - (Free Research)
Businesses today increasingly need to leverage a unified database platform to enable the deployment and consolidation of all applications onto one common infrastructure. Read on to learn the benefits of incorporating Oracle's Exadata based Database Machine into the IT infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts