The TechnicalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: The Technical returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Operational BI
 •   Application Management and Maintenance
 •   Business Intelligence Solutions
 •   Network Security
 •   Business Process Management (BPM)
 •   Application Integration
 •   Network Management
 •   Storage Management

Related Searches
 •   Company The
 •   Conversions The Technical
 •   Firms The Technical
 •   Reservation The
 •   The Portals
 •   The Server
 •   The Statements
 •   The Technical Assessment
 •   The Technical Contracts
 •   The Technical Retail
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 21, 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

Focus Research Series: Desktop and Application Delivery Landscape Report with All Profiles by Focus

April 2008 - (Free Research)
This excerpt of the Focus Landscape Research Series covers the drivers, trends, technical approaches and available solutions involved in evaluating and implementing desktop and application virtualization and delivery alternatives. 
(WHITE PAPER) READ ABSTRACT |

Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It by Lumension

February 2013 - (Free Research)
This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now. 
(WEBCAST) READ ABSTRACT |

Safeguard the Implementation of New Technology: Reduce Implementation Risk and Optimize Performance by SAP America, Inc.

September 2010 - (Free Research)
Organizations have increasingly complex software, interface, and IT landscapes. This paper explains how the SAP Safeguarding for Integration Validation portfolio of services offers the process, tools, and expertise you need to reduce the technical risk and cost associated with implementing new software solutions. 
(WHITE PAPER) READ ABSTRACT |

SearchServerVirtualization.com EGuide: The Guide to Running Windows on Xen by Novell, Inc.

March 2007 - (Free Research)
Virtualization has the power to consolidate server rooms and extend the life of hardware investments. This E-Guide from SearchServerVirtualization.com provides a comparison of the leading virtualization platforms: Xen, Virtual Server and VMware. 
(WHITE PAPER) READ ABSTRACT |

Emerging Trends in Project Management by Global Knowledge

June 2013 - (Free Research)
The technical aspects of managing projects notwithstanding, project managers are increasingly asked to lead the organization in transformative ways. Read on to uncover the top trends shaping the world of project management. 
(WHITE PAPER) READ ABSTRACT |

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker by i365, makers of Evault

July 2008 - (Free Research)
In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice. 
(WHITE PAPER) READ ABSTRACT |

Service Please: Five Tips for Easy, Affordable Tech Support by Cisco Systems, Inc.

January 2011 - (Free Research)
A dark secret of investing in technology is the substantial cost of not doing the technical support well. You may increase productivity and profits simply by adopting a new strategy for network maintenance and troubleshooting. Read on to learn how three small businesses get technical support that brings them peace of mind at an affordable price. 
(WHITE PAPER) READ ABSTRACT |

Planning for a Pandemic: Turning Office Workers into Mobile Workers for Business Continuity by Fiberlink Communications

July 2009 - (Free Research)
This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers. 
(WHITE PAPER) READ ABSTRACT |

Top Five Reasons to Choose Toad® Over SQL Developer by Dell Software

February 2011 - (Free Research)
Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today. 
(WHITE PAPER) READ ABSTRACT |

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com

April 2012 - (Free Research)
Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. 
(EGUIDE) READ ABSTRACT |

E-Guide: Practical advice and pitfalls to avoid with Big Data in the data warehousing process by SAP America, Inc.

October 2011 - (Free Research)
Gain practical advice and pitfalls to avoid with big data in the data warehousing process. 
(EGUIDE) READ ABSTRACT |

Getting Real about Virtual Management: Managing Complex Infrastructures by CA Technologies.

August 2008 - (Free Research)
This white paper outlines the challenges that virtualization and clustering create for IT and provides techniques for addressing the specific requirements of these environments. 
(WHITE PAPER) READ ABSTRACT |

Collaboration: RFP Technology Decisions Guide by SearchUnifiedCommunications.com

May 2012 - (Free Research)
Part two of SearchUnifiedCommunications.com's three-part guide on collaboration products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the process. 
(EGUIDE) READ ABSTRACT |

Aberdeen Research: BI for LOB Leaders by IBM

July 2011 - (Free Research)
This research presents a demonstrable connection between analytical adoption, and elevated business performance. This report is based on feedback from 222 executives in May and June 2011, across the globe. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Migration by Google Apps

January 2011 - (Free Research)
Whether you're actively considering Google Apps as part of your next generation messaging strategy or just learning about cloud computing, this webcast will provide IT professionals with the knowledge you need to answer the boss's question about the technical details of moving to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Geek Out on the Best Practices of a Google Apps Migration by Google Apps

June 2010 - (Free Research)
Whether you're actively considering Google Apps as part of your next generation messaging strategy or just learning about cloud computing, this webcast will provide IT professionals with the knowledge you need to answer the boss's question about the technical details of moving to the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Citrix Xendesktop : Desktop Virtualization for all – Technical overview by Citrix

August 2013 - (Free Research)
In this whitepaper, you’ll find a discussion of the various options that FlexCast provides to help meet the computing requirements of various user types. 
(WHITE PAPER) READ ABSTRACT |

ESG Report: Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations by EMC Backup and Recovery Solutions

April 2009 - (Free Research)
Data de-duplication offers landscape changing value that is easy to quantify, improves reliability, simplifies management and provides rapid recovery of data. Read this ESG report to learn more about it. 
(WHITE PAPER) READ ABSTRACT |

Deploying Operating System Images on Dell Business Client Systems using Microsoft® Deployment Toolkit (MDT) 2008 by Dell, Inc. and Intel®

June 2009 - (Free Research)
The Microsoft® Deployment Toolkit (MDT) 2008 provides unified processes and tools for desktop and server OS deployment using a common deployment console and a collection of best practices. The toolkit provides a single mechanism for image creation and an automated installation process to reduce deployment time. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization: Overcoming five real-world challenges by Citrix

April 2009 - (Free Research)
Success with server virtualization is leading many firms to explore the next frontier - virtualizing employee desktops. The opportunities are significant, but so are the challenges, both technical and psychological. 
(WHITE PAPER) READ ABSTRACT |

Course: Insecure Temporary Files (CWE-377) by Klocwork

November 2013 - (Free Research)
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377. 
(WEBCAST) READ ABSTRACT |

Course: Improper Validation of Array Index (CWE-129) by Klocwork

November 2013 - (Free Research)
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129. 
(WEBCAST) READ ABSTRACT |

A Geek’s Guide to Presenting to Business People by Citrix Online

June 2012 - (Free Research)
Giving presentations to business stakeholders is often a struggle for IT executives because they don’t know how to speak business executives “language”. Attend this live webcast on June 20th to learn what business-minded individuals need in a presentation and practical tips for how to make your presentations more compelling. 
(WEBCAST) READ ABSTRACT |

Building and maintaining effective cloud computing infrastructures by Circadence

June 2011 - (Free Research)
This white paper explores the nature of today’s technical challenges preventing the widespread adoption of cloud computing infrastructures in the enterprise and offers solutions to overcome them. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts