Techniques What Is MediaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Techniques What Is Media returned the following results.
RSS What is RSS?
Related Categories

 •   Application Lifecycle Management(ALM)
 •   Business Intelligence Solutions
 •   Backup Systems and Services
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Marketing Management
 •   Databases
 •   Social Networks and Community Management
 •   Virtualization
 •   Application Management and Maintenance

Related Searches
 •   Standards Techniques What
 •   Techniques Conferences
 •   Techniques Experts
 •   Techniques Find
 •   Techniques What Is Evaluation
 •   Techniques What Is Problem
 •   Techniques What Learning
 •   Techniques What North Carolina
 •   Techniques What Supplier
 •   Types Techniques
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Presentation Transcript: Big Data Analytics: Emerging Techniques and Technology for Growth and Profitability by Endeca Technologies, Inc.

December 07, 2011 - (Free Research)
This transcript of a webcast with Forrester Research principal analyst, Boris Evelson, will answer all your pressing questions about the value of your unstructured data and how you can successfully manage it. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Become a Social Business: Tap Into Social Data Insights by IBM

January 09, 2014 - (Free Research)
Access the following webcast to uncover what you need to know to become a successful social business. Learn about the tools and techniques and how to properly use them to turn social data into the actionable insights you need to be competitive. 
(WEBCAST) READ ABSTRACT |

Coaching Techniques for Dealing with Underperformers by Global Knowledge Network, Inc.

May 2004 - (Free Research)
People do not perform at their job for one of two reasons: either they can't or they won't. The second type of employee is the one we will address in this paper- the employee who chooses not to do his or her job for whatever reason. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Personal skills for professional success: influencing by ComputerWeekly.com

September 2013 - (Free Research)
This chapter from The Human Touch: Personal Skills for Professional Success, gives you the key facts you need to develop and grow your influence in the workplace. 
(BOOK) READ ABSTRACT |

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox by Global Knowledge

July 2006 - (Free Research)
Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Emerging Media Series, Issue Two: Blogs and Real Simple Syndication Report by KnowledgeStorm Webinars (E-mail this company)

September 2006 - (Free Research)
This podcast will focus on the content of a new KnowledgeStorm research report, the second in a series of studies looking at the impact emerging online applications have on B2B technology marketing. The research finds that blogs and Real Simple Syndication (RSS) are catching on more quickly than previously thought. 
(PODCAST) READ ABSTRACT |

Smart Techniques for Application Security: Whitebox + Blackbox Security Testing by IBM

March 2010 - (Free Research)
Join us for a one-hour Web seminar where members of our security research team will discuss whitebox and blackbox application security testing techniques, highlight how their approaches to vulnerability detection compliment one another and share best practices for embedding application security testing across the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

The Definitive Guide to Windows Application Server and Backup 2.0 - Chapter 3: Whole Server Backups by AppAssure Software, Inc.

September 2009 - (Free Research)
Ready to start ensuring solid backups in your environment, the Backup 2.0 way? That's what this chapter is all about, and what I call "whole server backups" is definitely the right place to begin. In this chapter, we'll discuss all the most common types of servers, what their native solutions look like, and assemble a Backup 2.0 wishlist. 
(WHITE PAPER) READ ABSTRACT |

Five Myths of Agile Development by VersionOne Inc.

September 2008 - (Free Research)
In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization. 
(WHITE PAPER) READ ABSTRACT |

2008 Verizon Business Data Breach Investigations Report by Verizon Business

June 2008 - (Free Research)
Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks. 
(WEBCAST) READ ABSTRACT |

Virtualization 2.0 Is All about Manageability - What You Should Look for in a Monitoring Solution by eG Innovations, Inc.

November 2008 - (Free Research)
This document outlines the key management challenges that must be overcome as the use of virtualization continues to increase in production enterprise environments. 
(WHITE PAPER) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Network Evolution University: Cloud Networking- Designing the Hybrid Cloud by SearchNetworking.com

May 2013 - (Free Research)
This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Being Agile in a non agile world by Ivar Jacobson Consulting

March 2008 - (Free Research)
Learn how to effectively combine agile development techniques with traditional SDLC and other software engineering techniques. Explore the basic concepts behind agile thinking and the three perspectives associated with this process. 
(WEBCAST) READ ABSTRACT |

Connecting Through Content, Issue Two by KnowledgeStorm, Inc (E-mail this company)

May 2007 - (Free Research)
Connecting Through Content, Issue Two examines how technology buyers search for content and how marketers deliver content to them. Content distribution channels, user search techniques, content registration behavior and other aspects of content distribution and syndication are evaluated. 
(ANALYST REPORT) READ ABSTRACT |

E-Book: Understanding SaaS/Cloud Application Integration: Tips, Techniques and Getting Started by Dell Boomi

May 2010 - (Free Research)
Integrating cloud applications with in-house legacy applications can be a difficult undertaking. The good news is that there are more options than ever that allow organizations to do all the integration themselves. This e-book examines what you need to know to develop the right cloud application integration strategy for your organization. 
(EBOOK) READ ABSTRACT |

Data Modeling: A Necessary and Rewarding Aspect of Data Management by Burton Group

July 2008 - (Free Research)
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling to... 
(WHITE PAPER) READ ABSTRACT |

CA White Paper: Evolving the Maturity Level of Your Project Management Office (PMO) by CA Technologies.

September 2007 - (Free Research)
In the pursuit of improving IT project delivery, many companies tend to focus primarily on the process but might overlook a crucial step: benchmarking effectiveness. 
(WHITE PAPER) READ ABSTRACT |

IT Excellence: Achieving Optimised Business Outcomes by SAP AG

February 2007 - (Free Research)
Information technology is ubiquitous in organizations, but what distinguishes top-notch IT from merely adequate IT? Read this article written by the Economist, to learn how leading companies enable IT to perform optimally. 
(WHITE PAPER) READ ABSTRACT |

Storage Efficiency: The Key to Green Storage Operation by Xiotech Corporation

August 2008 - (Free Research)
While energy consumption of overall data center operations and server-related equipment is generally understood, the story is quite different when it comes to storage systems. This paper offers practical advice on how to measure storage system efficiency and compares the efficiency numbers of several common storage solutions. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions Ezine Volume 4: Disaster Recovery and Unified Communications by CIO Decisions

December 2008 - (Free Research)
This eguide explains how Midmarket companies are embracing server virtualization and updating their disaster recovery strategies to ensure they minimize risk-affordably. 
(EZINE)

Erick Steffens on 1st, middle, last mile and symmetric/asymmetric acceleration by Limelight Networks, Inc.

May 2014 - (Free Research)
In the following FAQ, expert Erick Steffens reveals how innovative businesses are optimizing their systems, strategies and processes, leveraging content delivery networks, and implementing techniques such as symmetric/asymmetric acceleration to vastly improve content delivery to the end user. 
(VIDEO) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts