The ListsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: The Lists returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Data Center Management
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Endpoint Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Application Management and Maintenance

Related Searches
 •   Buying The Lists
 •   Free The
 •   Strategic The Lists
 •   The Audit
 •   The Lists Arkansas
 •   The Lists B2C
 •   The Lists Outsourcing
 •   The Lists Tools Software
 •   The Regional
 •   The Top
Advertisement

ALL RESULTS
1 - 25 of 462 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

A New Approach to Verifying and Validating Medical Device Development by IBM

December 13, 2010 - (Free Research)
The list of features in medical devices is rapidly rising: Even the simplest of medical devices house more and more system components, which add greater functionality to the device at a low cost. But by adding components, device software becomes complex and burdens compliance testing and premarket certification activities. 
(WHITE PAPER) READ ABSTRACT |

IT Security Trends 2013: Mobile security concerns tops the list by SearchSecurity.com

November 26, 2013 - (Free Research)
This expert resource takes an in-depth look at the security trends and priorities of 2013, discussing the shift away from old-school defenses and the central role that mobile security has taken in today's strategies. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 09, 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Expert Tips for Investing in Energy Efficient Power and Cooling by HP and Intel

June 24, 2011 - (Free Research)
Power and cooling is at the top of the list for data center investments. This expert e- details how to invest in energy-efficient power and cooling technologies for a higher ROI. Gain insight into how much power is needed for a stripped-down, low-power server, and discover best practices for dealing with cooling problems in the data center. 
(EGUIDE) READ ABSTRACT |

Security Considerations When Undergoing a Network Refresh by Hewlett-Packard Company

April 15, 2014 - (Free Research)
This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure. 
(WHITE PAPER) READ ABSTRACT |

Healthcare Exclusive: Building Future-ready IT Platforms by Dell, Inc.

June 05, 2013 - (Free Research)
This exclusive whitepaper covers the importance of flexible, next-generation IT in the health care industry. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing is on the Rise - Is your Organization Ready for Deployment? by VMware, Inc.

December 06, 2012 - (Free Research)
This exclusive whitepaper covers the transformative power of the cloud as it can improve your organization by aligning IT with business needs and much more. 
(WHITE PAPER) READ ABSTRACT |

CIO Leadership Forum: CIOs Reveal Today's Top 3 Imperatives by ServiceNow

November 26, 2013 - (Free Research)
This whitepaper covers the growing importance of IT to organizations and the need to turn the department into a business enabler. 
(WHITE PAPER) READ ABSTRACT |

Object-Based Storage Comes of Age by SearchStorage.com

February 17, 2014 - (Free Research)
Object storage systems are considered a necessary building block for efficient cloud storage and big data projects. This handbook offers expert analysis and technical tips. 
(WHITE PAPER) READ ABSTRACT |

How Flash Storage Impacts Us Every Second by IBM

June 09, 2013 - (Free Research)
This quick video describes how flash storage is changing the game and impacting users and organizations every second of every day. View now to learn more about one vendor's platform that offers 1 petabye per rack for 22 million IOPS, 38% lower licensing costs, and much more. 
(VIDEO) READ ABSTRACT |

Leverage Security Intelligence to Protect Sensitive Healthcare Data by IBM

December 31, 2013 - (Free Research)
This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats. 
(WHITE PAPER) READ ABSTRACT |

Useful Tips to Help Budget your DCIM Project by Raritan Inc.

March 28, 2014 - (Free Research)
This white paper reveals 2 critical tips to help you plan out an efficient data center infrastructure management (DCIM) project without driving up major costs. 
(WHITE PAPER) READ ABSTRACT |

Mobile: The Technology Game-Changer in 2013 by SearchSecurity.com

February 28, 2013 - (Free Research)
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization. 
(EGUIDE) READ ABSTRACT |

E-guide: Integrating video conferencing with UC: What you need to consider by SearchSecurity.com

May 19, 2011 - (Free Research)
This SearchUnifiedCommunications.com e-guide discusses why video conferencing integration is a logical addition to your UC system and offers best practices for implementation. 
(EGUIDE) READ ABSTRACT |

Network Evolution February 2013 by SearchNetworking.com

February 01, 2013 - (Free Research)
This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues. 
(EZINE) READ ABSTRACT |

How iPads Enter the Workforce by Citrix

February 21, 2011 - (Free Research)
Who could have imagined that a tablet would capture the imagination of employees and IT alike? But the iPad did, and it’s kicked off an arms race for smart mobile devices. This report introduces a simple framework to guide content and collaboration professionals through employee-fueled tablet scenarios and IT-led tablet projects. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Virtual Server Backup: Easy and Economical with Deduplication by ExaGrid Systems, Inc.

March 08, 2010 - (Free Research)
Server virtualisation is a top choice for IT investments in this current economical climate. Learn how it will enable you to reduce cost and maximise utilisation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webroot  Endpoint Security eBook by Webroot

July 25, 2012 - (Free Research)
This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security. 
(EBOOK) READ ABSTRACT |

Top 10 Data Mining Mistakes by SAS

April 07, 2010 - (Free Research)
In the following paper, we briefly describe, and illustrate from examples, what we believe are the “Top 10” mistakes of data mining, in terms of frequency and seriousness. Most are basic, though a few are subtle. All have, when undetected, left analysts worse off than if they’d never looked at their data. 
(WHITE PAPER) READ ABSTRACT |

It's 2008: Do You Know Where Your Talent Is? - Connecting People to What Matters by SAP America, Inc.

July 1967 - (Free Research)
Demand for knowledge workers is rising even as their skills and abilities are falling into short supply. This research report about acquisition and retention strategies questions the "war for talent" approach to these emerging trends. 
(WHITE PAPER) READ ABSTRACT |

Maximize Value from Your SAP Investment with Business Intelligence (BI) & Performance Management (PM) by IBM Cognos

October 2008 - (Free Research)
View this Webcast and join Mark Smith, CEO & EVP Research of Ventana Research to learn more about why a unified performance management platform can be the best means to drive additional value from your SAP investment. 
(WEBCAST) READ ABSTRACT |

How To - Alert a BlackBerry smartphone user from a Background application by BlackBerry

March 2009 - (Free Research)
Read this article to learn how to alert a BlackBerry smartphone user from a Background application. 
(TECHNICAL ARTICLE)

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise by Tripwire, Inc.

February 2011 - (Free Research)
Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 462 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts