Techniques Sumtotal ActivitiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Techniques Sumtotal Activities returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Vulnerability Assessment
 •   Business Process Management (BPM)
 •   Enterprise Performance Management/ Balanced Scorecard
 •   Data Security
 •   Security Policies
 •   Business Activity Monitoring (BAM)
 •   Enterprise Dashboards
 •   Intrusion Prevention Solutions
 •   Anti-Virus Solutions

Related Searches
 •   B2C Techniques Sumtotal
 •   Consults Techniques Sumtotal Activities
 •   Intranet Techniques
 •   Need Techniques Sumtotal Activities
 •   Techniques Network
 •   Techniques Sumtotal Activities Demo
 •   Techniques Sumtotal Activities Diagram
 •   Techniques Sumtotal Activities Kentucky
 •   Techniques Sumtotal Activities Quality
 •   Techniques Sumtotal Monitor
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Garnering Executive Support: Building Your Business Plan for Strategic Meetings Management by StarCite

March 09, 2009 - (Free Research)
In this white paper, brought to you by StarCite, corporate travel and meetings professionals will learn why executive support is vital to a strategic meetings management effort and how to garner that support - even if it requires investment and resources from upper management. 
(WHITE PAPER) READ ABSTRACT |

World-Class EA: The Agile Enterprise by ComputerWeekly.com

February 11, 2013 - (Free Research)
Agile is about more than software development, it's a mindset. This report from the Open Group explains how to apply agile techniques and best practices to the enterprise. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Technology value matrix: Human Resources solutions by ComputerWeekly.com

October 19, 2012 - (Free Research)
Recent developments in programming languages and platforms made HR solutions more user friendly and easier to deploy and manage, says analyst Nucleus Research. 
(ANALYST REPORT) READ ABSTRACT |

Gartner: The role of the IT department in mergers and acquisitions by ComputerWeekly.com

July 13, 2010 - (Free Research)
Mergers and acquisitions (M&As) are among the biggest challenges for enterprises and their IT organisations to navigate. Conventional leadership and management techniques often are not enough. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: 2010 by Sophos, Inc.

March 02, 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 16, 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Security Threat Report: 2010 by Sophos UK

May 25, 2010 - (Free Research)
The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users. 
(ANALYST REPORT) READ ABSTRACT |

Integrating Use Cases, Storyboarding and Prototyping by Ivar Jacobson Consulting

June 2008 - (Free Research)
This white paper discusses how to optimize requirements gathering and documentation through the integration of use case, storyboarding and prototyping. 
(WHITE PAPER) READ ABSTRACT |

Management Excellence: Leveraging Technology and Techniques by Oracle Corporation UK Ltd

November 2008 - (Free Research)
One in a series of white papers about management excellence, this white paper describes the techniques and technologies that organizations should master on their way to management excellence. 
(WHITE PAPER) READ ABSTRACT |

Improving Tools and Techniques to Combat Malware Evolution by Webroot

October 2012 - (Free Research)
Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes. 
(WHITE PAPER) READ ABSTRACT |

Management Excellence: Leveraging Technology & Techniques by Oracle Corporation

November 2008 - (Free Research)
This white paper describes a set of six management processes that lead organizations to become smarter, more agile, and better aligned—the key attributes of management excellence. 
(WHITE PAPER) READ ABSTRACT |

CW+ Open Group: Supporting requirements management in TOGAF by ComputerWeekly.com

October 2010 - (Free Research)
This White Paper discusses methodology and language support for requirements management in TOGAF. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Uniting SIM and IAM to Boost Security by SearchSecurity.com

April 2011 - (Free Research)
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender. 
(EGUIDE) READ ABSTRACT |

Expert Insight: Backup, DR and Archiving—What's the Real Difference? by EMC Corporation

October 2013 - (Free Research)
This e-guide highlights the connection points and key differences between each of these data protection activities. It also examines your peers' top backup and recovery pain points and highlights the latest tools and techniques that can help to address them. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Obstructed View by Information Security Magazine

September 2006 - (Free Research)
Encryption may be good for securing data, but it blinds network-based IDSes. While there aren't any surefire fixes, these techniques will steer you in the right direction. 
(JOURNAL ARTICLE)

Information Security Magazine by SearchSecurity.com

February 2014 - (Free Research)
In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year. 
(EGUIDE) READ ABSTRACT |

Managing the Virtualization Maturity Lifecycle by CA Technologies.

June 2010 - (Free Research)
This CA Technologies video provides an introduction to a simple 4-step virtualization lifecycle maturity model, and introduces the key management disciplines and activities needed to drive virtualization maturity — and success — at every stage of the virtualization lifecycle. 
(VIDEO) READ ABSTRACT |

2010: Cybercrime Coming of Age by ESET

January 2010 - (Free Research)
In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out. 
(WHITE PAPER) READ ABSTRACT |

Hot Knives Through Butter: Evading File-Based Sandboxes by FireEye

February 2014 - (Free Research)
This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick. 
(WHITE PAPER) READ ABSTRACT |

ITIL V3 and the PMBOK® - Distinct but Complementary by Global Knowledge

December 2008 - (Free Research)
This white paper examines the IT Infrastructure Library Version 3® (ITIL V3®) and the Project Management Body of Knowledge (PMBOK). 
(WHITE PAPER) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

Improved Software Testing Using McCabe IQ Coverage Analysis by McCabe Software, Inc.

March 2009 - (Free Research)
This paper introduces coverage analysis as an important direction in the management of software testing. Specifically, this paper covers test assessment and improvement using McCabe IQ coverage analysis in the areas of functional testing, incremental testing, and unit level testing. 
(WHITE PAPER) READ ABSTRACT |

Application Security Assessment Options by Security Innovation

December 2010 - (Free Research)
This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect the enterprise against application threats. Read this e-guide to learn how to solve these types of problems. 
(EGUIDE) READ ABSTRACT |

Is a Data Warehouse the Only Option for Business Intelligence? by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
While data warehouses are important for many types of analytical systems, they aren’t always necessary. Building a data warehouse can dramatically increase the cost of a BI project. This paper describes data warehouses, along with many other options for placing relevant, timely information in the hands of business users. 
(WHITE PAPER) READ ABSTRACT |

Competing on Analytics by SAS

June 2007 - (Free Research)
Use insight produced through analytics to improve performance and gain a strategic advantage. Learn how you can employ an enterprise-wide approach for maintaining data and using analytics for improved decision making. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts