Techniques Law ComputingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Techniques Law Computing returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Storage Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Data Center Management
 •   Mobile Device Management
 •   Security Policies
 •   Wireless Technologies and Mobile Computing
 •   Storage Security

Related Searches
 •   Network Techniques
 •   Softwares Techniques Law Computing
 •   Strategies Techniques Law Computing
 •   Techniques Capacity
 •   Techniques Conferences
 •   Techniques Law Enterprise
 •   Techniques Law Facts
 •   Techniques Solutions
 •   Us Techniques Law
 •   What Is Techniques Law
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Winning Strategies for the Evolving Legal Marketplace by BlackBerry

October 05, 2009 - (Free Research)
Law firms have had to develop new strategies to compete and win in a legal market that contains greater uncertainty than any that has come before it. This paper will briefly outline strategies for success in the evolving legal marketplace. 
(WHITE PAPER) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 23, 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Why Data Protection Law Supports the Use of Managed Security Services by Dell SecureWorks UK

August 31, 2013 - (Free Research)
This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws. 
(WHITE PAPER) READ ABSTRACT |

Enforcing IT Change Management Policy by Tripwire, Inc.

March 18, 2009 - (Free Research)
Read this white paper to learn how to enforce IT Control Management policies effectively by fostering a culture of change and enforcing change management processes resulting in greater auditability, improved quality, and IT infrastructure integrity. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Global Law Firm Solves Privilege Management Issues with User Virtualization by AppSense

July 19, 2013 - (Free Research)
In this case-study, you’ll discover how a global, highly regulated law firm was able to eliminate end-user management issues with a people-centric user virtualization solution. 
(CASE STUDY) READ ABSTRACT |

Supercomputers: prestige objects or crucial tools for science and industry ? by ComputerWeekly.com

April 19, 2012 - (Free Research)
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. 
(PRESENTATION) READ ABSTRACT |

DATA Act Protection: Effects of a Federal Breach Notification Law by CDW Corporation

December 07, 2010 - (Free Research)
This E-Guide examines new reporting requirements and how your organization will have to report a breach to the FTC and what new steps you’ll have to institute to comply. 
(EGUIDE) READ ABSTRACT |

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 18, 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

Data Privacy: Where Should I House My Data? by IntraLinks, Inc

April 17, 2014 - (Free Research)
This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders. 
(WHITE PAPER) READ ABSTRACT |

What You Should Know about E-Signature Law by DocuSign, Inc.

January 19, 2012 - (Free Research)
Read this brief white paper to familiarize yourself with eSignature laws so that your company can gain a competitive edge and increase your business's productivity. 
(WHITE PAPER) READ ABSTRACT |

European IT Law Briefing:  Practical steps for companies using social media by ComputerWeekly.com

May 20, 2013 - (Free Research)
Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

European IT Law Briefing: Taking action on misuse of social media by employees by ComputerWeekly.com

May 20, 2013 - (Free Research)
Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

European IT Law Briefing: Monitoring employees' use of social media by ComputerWeekly.com

May 20, 2013 - (Free Research)
Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

European IT Law Briefing: Recruitment and social media by ComputerWeekly.com

May 20, 2013 - (Free Research)
Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones by BlackBerry

September 16, 2011 - (Free Research)
Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption. 
(CASE STUDY) READ ABSTRACT |

Data Security Laws in the US by Quantum Corporation

July 01, 2009 - (Free Research)
This list features a selection of Data Security laws in the US. As Quantum is a computer storage company, we cannot be held responsible for the accuracy of this list. Please check with your local government or legal advisors on the laws in your own location. Thank you. 
(ASSESSMENT TOOL) READ ABSTRACT |

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches by Boldon James

July 20, 2011 - (Free Research)
In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – September Edition by ComputerWeekly.com

September 04, 2013 - (Free Research)
In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised. 
(EZINE) READ ABSTRACT |

HPC Storage: Taming the Data Torrent by Dell, Inc. and Intel®

August 01, 2011 - (Free Research)
Check out this latest issue of HPC source to learn about the current state of high performance computing and what top experts predict for the coming decade. 
(EZINE)

CW Europe – February Edition by ComputerWeekly.com

February 04, 2013 - (Free Research)
Many analysts are predicting that tablets will outsell laptops, this year, and become the most popular type of portable computer device. In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing. 
(EZINE) READ ABSTRACT |

Oracle Grid Computing by Oracle Corporation

June 01, 2009 - (Free Research)
The Oracle Grid computing architecture features many powerful techniques that improve energy efficiency and data center productivity. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Ecomanage Network Corporation Develops a Service Offering for Manufacturers to Fully Manage Wastes and Meet Disposal Regulations by IBM

October 26, 2009 - (Free Research)
Read this case study to see how IBM Global Services implemented and is operating the Wastes and Resources Circulation Management System, a hybrid solution of private and public cloud computing. 
(CASE STUDY) READ ABSTRACT |

Intel Architecture and Silicon Cadence: The Catalyst for Industry Innovation by Intel Corporation

February 12, 2008 - (Free Research)
The Intel multi-core processors enable faster, more connected, trusted, personalized and natural computing experiences than ever before. Read this paper to learn more about current and future multi-core processor architectures. 
(WHITE PAPER) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 24, 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts