Techniques Terms IndianWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Techniques Terms Indian returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions
 •   Storage Management
 •   Data Center Management
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Availability, Performance and Problem Management
 •   Backup Systems and Services

Related Searches
 •   Enterprise Techniques Terms Indian
 •   Functions Techniques Terms Indian
 •   Pro Techniques Terms Indian
 •   Recovery Techniques Terms Indian
 •   Requirements Techniques Terms
 •   Techniques Configuration
 •   Techniques Employee
 •   Techniques Network
 •   Techniques Terms Indian Risks
 •   Techniques Terms Operate
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 07, 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

CW Special Report on Cognizant by ComputerWeekly.com

February 21, 2013 - (Free Research)
This 7 page special report from Computer Weekly gives you the facts on Cognizant, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Indian Express Group by Limelight Networks, Inc.

May 02, 2014 - (Free Research)
This guide explores one company's success at increasing their network performance and accelerating their web content delivery. 
(CASE STUDY) READ ABSTRACT |

Inside India: Indians View Their Automotive Future by IBM Line of Business

June 2008 - (Free Research)
A study of the Indian auto industry from University of Michigan Transportation Research Institute's Automotive Analysis Division and the IBM Institute for Business Value. 
(WHITE PAPER)

CW Special report on Wipro by ComputerWeekly.com

November 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

CW+ Open Group: Supporting requirements management in TOGAF by ComputerWeekly.com

October 2010 - (Free Research)
This White Paper discusses methodology and language support for requirements management in TOGAF. 
(WHITE PAPER) READ ABSTRACT |

2010: Cybercrime Coming of Age by ESET

January 2010 - (Free Research)
In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out. 
(WHITE PAPER) READ ABSTRACT |

Next Generation Network Management Techniques by SearchSecurity.com

February 2012 - (Free Research)
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles! 
(EZINE) READ ABSTRACT |

E-Book: Understanding SaaS/Cloud Application Integration: Tips, Techniques and Getting Started by Dell Boomi

May 2010 - (Free Research)
Integrating cloud applications with in-house legacy applications can be a difficult undertaking. The good news is that there are more options than ever that allow organizations to do all the integration themselves. This e-book examines what you need to know to develop the right cloud application integration strategy for your organization. 
(EBOOK) READ ABSTRACT |

E-Guide: Uniting SIM and IAM to Boost Security by SearchSecurity.com

April 2011 - (Free Research)
When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender. 
(EGUIDE) READ ABSTRACT |

Credit Issuers: Stop Application Fraud At The Source With Device Reputation by iovation, Inc.

June 2009 - (Free Research)
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process. 
(WHITE PAPER) READ ABSTRACT |

Using Data Reduction Solutions to Manage More Data With Less Infrastructure by IBM

October 2011 - (Free Research)
This white paper explains how data growth has created a storage management gap that is exacerbated by increased availability requirements and the risks of downtime. Find out why purchasing more storage is not a viable long-term solution to this problem and get advice on how to significantly reduce your storage footprint. 
(WHITE PAPER) READ ABSTRACT |

Improved Software Testing Using McCabe IQ Coverage Analysis by McCabe Software, Inc.

March 2009 - (Free Research)
This paper introduces coverage analysis as an important direction in the management of software testing. Specifically, this paper covers test assessment and improvement using McCabe IQ coverage analysis in the areas of functional testing, incremental testing, and unit level testing. 
(WHITE PAPER) READ ABSTRACT |

Solid State Storage - A New Standard for Enterprise-Class Reliability by Fusion-IO

February 2009 - (Free Research)
With throughput and seek times faster than disk arrays, data centers are including NAND flash as part of their server infrastructure. Fusion-io offers solid state storage solutions with NAND flash that provides integrity for data exceeding today's solid state storage solutions and surpasses enterprise-class rotating magnetic storage devices. 
(WHITE PAPER) READ ABSTRACT |

MPEG-4 Over IP Networks by Motorola, Inc.

December 2008 - (Free Research)
This paper describes the technology behind the efficiency gains that are realized using MPEG-4 as a video compression technology for real time content distribution networks. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of an IPv6 Unicast Address by Command Information

June 2008 - (Free Research)
IPv6 is the next generation Internet protocol. It was designed to replace the current version, IPv4, and will bring superior reliability, flexibility and security to the Internet. 
(WHITE PAPER) READ ABSTRACT |

Modern Malware Threats and Countermeasures by Sunbelt Software

November 2008 - (Free Research)
Many of the early mass-infection events were highly publicized and very obvious events to the user, modern malware is usually designed to be much more subtle in its behaviors. learn about the newest methods and practices hackers are using. 
(WHITE PAPER) READ ABSTRACT |

Database Archiving Software by Storage Magazine

October 2006 - (Free Research)
Are bloated data stores slowing down your database applications? Database archivers can trim the fat, improve performance and protect historical data. 
(JOURNAL ARTICLE)

Garnering Executive Support: Building Your Business Plan for Strategic Meetings Management by StarCite

March 2009 - (Free Research)
In this white paper, brought to you by StarCite, corporate travel and meetings professionals will learn why executive support is vital to a strategic meetings management effort and how to garner that support - even if it requires investment and resources from upper management. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Archiving Storage Solutions by Dell, Inc.

April 2011 - (Free Research)
To help you make the right data archiving decision, we've collected our top tips, tutorial and podcasts on long-term data archiving. Whether you are choosing data archiving software, considering cloud archiving, or are a small business, we have the answers for you here. 
(EGUIDE) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

Cost Effective Techniques for Designing the Data Warehouse by Embarcadero Technologies, Inc.

November 2010 - (Free Research)
A cost effective data warehouse project doesn't have to be an oxymoron. Rather than committing to a full-fledged waterfall style approach, it is possible to build a data warehouse incrementally and inexpensively, while at the same time preserving high-level architectural goals that lead to a true enterprise data warehouse. View this webcast now. 
(WEBCAST) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts