Technology World AssessmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Technology World Assessment returned the following results.
RSS What is RSS?
Related Categories

 •   Vulnerability Assessment
 •   Data Security
 •   Network Security
 •   Application Security
 •   Business Process Management (BPM)
 •   Application Lifecycle Management(ALM)
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Building Technology World Assessment
 •   Operating Technology World Assessment
 •   Rfq Technology World Assessment
 •   Statements Technology
 •   Technology Practice
 •   Technology World Assessment File
 •   Technology World Assessment Functions
 •   Technology World Assessment Migration
 •   Technology World History
 •   Technology World Web
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Key Strategies for IT Success in Today's Distribution Environment by Epicor Software Corporation

October 21, 2011 - (Free Research)
This white paper provides high level definitions, opportunity identification, and future potentials for: Service Oriented Architecture (SOA), Software as a Service (SaaS), Enterprise Resource Planning (ERP) Anytime, Anywhere Availability, Mobile Devices, Web 2.0, and Report Cards or Balanced Scorecards as a Business Intelligence (BI) capability. 
(WHITE PAPER) READ ABSTRACT |

First Class Mobile Application Performance Management by SOASTA, Inc

September 12, 2012 - (Free Research)
This 2012 Aberdeen group report outlines some of the most common challenges that organizations are facing when it comes to performance of their mobile applications. Read more inside to learn how companies are tackling these challenges and the new and evolved tools that are helping them. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Information Governance Takes the Next Step Forward by SearchCompliance.com

July 16, 2010 - (Free Research)
The growing adoption of enterprise contentmanagement tools for e-discovery, log managementand integrated content archiving is advancinginformation governance strategies. 
(EBOOK) READ ABSTRACT |

Supercomputers: A Computer Weekly guide by ComputerWeekly.com

May 17, 2012 - (Free Research)
This special Computer Weekly report analyses the market for supercomputers, peripherals and applications, the supercomputer community, developments in technology, and offers a country by country comparison. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Complete Network Assessment by Dorado Software

November 2008 - (Free Research)
This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network. 
(WHITE PAPER) READ ABSTRACT |

EBAY, Inc. - Securing the World's Online Marketplace with QualysGuard by Qualys, Inc.

May 2008 - (Free Research)
The automation built into QualysGuard immediately allowed eBay to do vulnerability assessments on demand, including rapid scans for the most recent vulnerabilities anywhere in its own network and in partner networks. 
(CASE STUDY) READ ABSTRACT |

Business Continuity Self-Assessment Tool by IBM Software Group

April 2007 - (Free Research)
The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas. 
(WHITE PAPER) READ ABSTRACT |

Information Agenda Assessment Tool by IBM

October 2009 - (Free Research)
The cost and complexity of managing increasing volumes of data and content, plus the need to provide trusted information to all users, are driving CIOs to rethink approach to information delivery. This quick self-assessment is the first step to find out how IBM's Info Agenda approach can help your company unlock the business value of information. 
(ASSESSMENT TOOL)

Assess your mobile infrastructure by IBM

February 2014 - (Free Research)
This informative resource provides a helpful self-assessment so you can identify areas where you can improve the IT infrastructure that supports mobility within your organization so you can enhance your mobile environment. 
(ASSESSMENT TOOL) READ ABSTRACT |

The global state of the project management office by ComputerWeekly.com

May 2011 - (Free Research)
This global benchmarking study from ESI international identifies the key challenges and successes experienced by project and programme management offices (PMO) and draws recommendations for the future. 
(IT BRIEFING) READ ABSTRACT |

Reliability Analysis of the APC InfraStruXure Power System by Schneider Electric

October 2011 - (Free Research)
This white paper presents a case study comparing a new power system with traditional central UPS architecture. 
(CASE STUDY) READ ABSTRACT |

The Challenges of Automated Application Assessments in a Web 2.0 World by Hewlett-Packard Company

February 2010 - (Free Research)
This white paper describes the challenges of automated penetration testing or application scanning of Web 2.0 applications. The features that security experts should expect in a black box or dynamic application scanner are also outlined here. 
(WHITE PAPER) READ ABSTRACT |

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension

September 2012 - (Free Research)
Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Reliability Analysis of the APC InfraStruXure Power System by APC by Schneider Electric

January 2010 - (Free Research)
The APC InfraStruXure product line offers an alternative architecture to the central UPS. This paper summarizes the key findings of MTechnology's quantitative risk assessment and discusses their implications for facility managers and designers. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

E-Book: Optimizing BI and Analytics in Healthcare by Tableau Software

May 2010 - (Free Research)
BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare. 
(EBOOK) READ ABSTRACT |

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

CW Special report on Capgemini by ComputerWeekly.com

August 2012 - (Free Research)
This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The 10 Critical Steps to Selecting an EHR by HP & Intel®

March 2013 - (Free Research)
Don't be another statistic in the failed world of EHR. This e-guide from SearchHealthIT.com outlines the critical objectives that must be met in order to ensure a thorough EHR assessment. Read now for ten steps sure to guide you in the right direction during your EHR selection stage. 
(EGUIDE) READ ABSTRACT |

P2V Benefits: Moving Servers From the Physical to the Virtual World Cuts Costs, Saves Space and Parallels Green Initiatives by CDW Corporation

September 2009 - (Free Research)
Virtualization basically means inserting a software layer between your hardware and your operating system. This decouples the operating system from the hardware and allows you to run many operating systems at the same time on top of that same physical piece of hardware. Read this short paper to learn about the benefits of using virtual servers. 
(WHITE PAPER) READ ABSTRACT |

Comprehensive Business Intelligence Market Study: Summary Results from the BI Survey 7 by MicroStrategy Incorporated

June 2008 - (Free Research)
The BI Survey 7, the leading independent survey of real-world BI implementations, provides unique, statistically significant insight into actual BI implementations and customer experiences with various BI products. 
(WHITE PAPER) READ ABSTRACT |

Optimize Data Management for Smarter Healthcare E-Book by IBM

March 2011 - (Free Research)
This e-book will examine the challenges healthcare organizations face today — and how data management techniques can help them deliver better care now and in the future. 
(EBOOK) READ ABSTRACT |

Putting Security First in the Newly Virtualized World by Lumension

July 2008 - (Free Research)
At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches 
(WHITE PAPER) READ ABSTRACT |

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World by Symantec Corporation

January 2014 - (Free Research)
This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts