The ListsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: The Lists returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Mobile Device Management
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Wireless Technologies and Mobile Computing
 •   Endpoint Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Data Protection and Privacy
 •   Application Management and Maintenance

Related Searches
 •   Firm The
 •   Plans The Lists
 •   Record The
 •   Technologies The Lists
 •   The Lists Control
 •   The Lists Development
 •   The Lists Features
 •   The Lists Forms
 •   The Lists Schema
 •   The Schedule
Advertisement

ALL RESULTS
1 - 25 of 414 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

A New Approach to Verifying and Validating Medical Device Development by IBM

December 13, 2010 - (Free Research)
The list of features in medical devices is rapidly rising: Even the simplest of medical devices house more and more system components, which add greater functionality to the device at a low cost. But by adding components, device software becomes complex and burdens compliance testing and premarket certification activities. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 09, 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

Expert Tips for Investing in Energy Efficient Power and Cooling by HP and Intel

June 24, 2011 - (Free Research)
Power and cooling is at the top of the list for data center investments. This expert e- details how to invest in energy-efficient power and cooling technologies for a higher ROI. Gain insight into how much power is needed for a stripped-down, low-power server, and discover best practices for dealing with cooling problems in the data center. 
(EGUIDE) READ ABSTRACT |

Advanced Virtual and Cloud Management for VMware Environments and Beyond by Red Hat

April 10, 2013 - (Free Research)
This whitepaper covers a virtual and cloud management solution that can fix common pain points and prepare you for your future needs. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence to Protect Sensitive Healthcare Data by IBM

December 31, 2013 - (Free Research)
This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats. 
(WHITE PAPER) READ ABSTRACT |

Useful Tips to Help Budget your DCIM Project by Raritan Inc.

March 28, 2014 - (Free Research)
This white paper reveals 2 critical tips to help you plan out an efficient data center infrastructure management (DCIM) project without driving up major costs. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence to Protect Sensitive Healthcare Data by IBM

December 31, 2012 - (Free Research)
This guide explores the importance of end-to-end system visibility and security intelligence for healthcare organizations, and how to combat a full range of security threats. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Migrating to Sharepoint 2013 by Dell Software

January 07, 2013 - (Free Research)
This whitepaper covers five best practices for upgrading to SharePoint 2013. 
(WHITE PAPER) READ ABSTRACT |

Connecting the Clouds: Best Practices for Integrating IT Service Management by BMC Software, Inc.

October 08, 2013 - (Free Research)
This whitepaper covers creating a corporate-wide integration strategy for Software-as-a-Service that meets business needs and improves your quality of service. 
(WHITE PAPER) READ ABSTRACT |

CEO insights: Reinventing the rules of engagement by ComputerWeekly.com

December 04, 2013 - (Free Research)
This major study from IBM, which delves into the views of 884 global CEOs, assess the impact of technology on their organisations and strategy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Leaders and Laggards in the Digital Economy by ComputerWeekly.com

March 28, 2012 - (Free Research)
The digitisation index from Booz & Co reveals the business leaders and laggards in the digital technology and explains why it is vital to embrace it. 
(IT BRIEFING) READ ABSTRACT |

A clearer horizon. Do CIOs have more clarity about cloud computing? by ComputerWeekly.com

December 01, 2011 - (Free Research)
This research from management consultants, Xantus, shows that while there is still a lack of clarity and a reluctance to fully commit to the cloud, there is a general acceptance from CIOs of the benefits and a growing commitment to develop those benefits. 
(IT BRIEFING) READ ABSTRACT |

Your ECM Scorecard by Perceptive Software

July 22, 2010 - (Free Research)
Read this white paper to learn about the five key features your software solution must have to maximize the benefits of enterprise content management. 
(WHITE PAPER) READ ABSTRACT |

ESG Lab Validation Report: Oracle's Sun ZFS Storage Appliance by Oracle Corporation UK Ltd

July 31, 2012 - (Free Research)
This white paper provides insight into Oracles innovative storage appliance to combat ever-growing requirements related to storage environment efficiency. Find out how the appliance allows organizations to increase performance and reduce IT costs. 
(WHITE PAPER) READ ABSTRACT |

Improving Healthcare and Enabling EHR Adoption with Mission Critical Technology by HP & Intel®

April 15, 2010 - (Free Research)
Read this presentation transcript to better understand the best ways to approach and prioritize these needs. Learn how to sell users on the benefits of EHR technology for productivity and patient care. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by eIQnetworks

February 02, 2009 - (Free Research)
"Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Unified Approach to Managing the Virtual Environment by Forsythe

December 04, 2009 - (Free Research)
In this presentation transcript, learn about a unified approach to IT management. Discover how to decrease complexity introduced by virtualization and cloud computing to ensure optimal performance of your virtual and physical environments. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-guide: Integrating video conferencing with UC: What you need to consider by Thawte Inc.

May 19, 2011 - (Free Research)
This SearchUnifiedCommunications.com e-guide discusses why video conferencing integration is a logical addition to your UC system and offers best practices for implementation. 
(EGUIDE) READ ABSTRACT |

Network Evolution February 2013 by SearchNetworking.com

February 01, 2013 - (Free Research)
This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues. 
(EZINE) READ ABSTRACT |

Object-Based Storage Comes of Age by SearchStorage.com

February 17, 2014 - (Free Research)
Object storage systems are considered a necessary building block for efficient cloud storage and big data projects. This handbook offers expert analysis and technical tips. 
(WHITE PAPER) READ ABSTRACT |

How iPads Enter the Workforce by Citrix

February 21, 2011 - (Free Research)
Who could have imagined that a tablet would capture the imagination of employees and IT alike? But the iPad did, and it’s kicked off an arms race for smart mobile devices. This report introduces a simple framework to guide content and collaboration professionals through employee-fueled tablet scenarios and IT-led tablet projects. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Virtual Server Backup: Easy and Economical with Deduplication by ExaGrid Systems, Inc.

March 08, 2010 - (Free Research)
Server virtualisation is a top choice for IT investments in this current economical climate. Learn how it will enable you to reduce cost and maximise utilisation. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Mobile: The Technology Game-Changer in 2013 by Webroot

February 28, 2013 - (Free Research)
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 414 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts