Top Where GeneralWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Top Where General returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Data Security
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Access Control
 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Application Security
 •   Enterprise Data Protection and Privacy
 •   Database Administration

Related Searches
 •   Computer Top Where
 •   Knowledge Top Where
 •   National Top Where
 •   Organization Top Where
 •   Printable Top
 •   Top Corporation
 •   Top Latest
 •   Top Where Firm
 •   Top Where General Example
 •   Top Where General Office
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Retail’s Mobility Imperative: A Measured Approach to the Emerging Channel by BlackBerry

July 27, 2010 - (Free Research)
This study examines what's driving retailers' mobile strategies, where they're focusing their time and money, and how they plan to measure their performance. In addition, view results of an exclusive survey of more than 300 executives at top U.S. retailers. Continue reading to learn more! 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: State of the Threat by Websense, Inc.

July 29, 2009 - (Free Research)
The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Taming Transactional Email: Tips to Gain Control and Determine If Outsourcing Makes Sense by Silverpop Systems Inc.

January 2007 - (Free Research)
This white paper reviews the key steps necessary to implement a transactional email marketing campaign. It also recommends methods to ease the pain of implementation while improving the results. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

The 5 Levels of Corporate Performance Management (CPM) Maturity: Climbing to the Top Floor by Prophix Software

April 2014 - (Free Research)
Tune into this webcast to discover the 5 levels of CPM maturity, and learn how to get from spreadsheet chaos to the precise alignment of business strategy with CPM initiatives that drive business growth. 
(WEBCAST) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Deciding Where to Deploy Solid-State Storage Devices by TechTarget

March 2014 - (Free Research)
Thinking about jumping on the SSD bandwagon? Participate in our members-only SSD/Flash Technologies Research Program to share your thoughts, and get instant access to two exclusive reports, including our e-handbook on tips for deploying solid-state storage devices! 
(RESOURCE)

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

How to tackle identity management and federated identity by ComputerWeekly.com

November 2010 - (Free Research)
The majority of user authentication schemes today still use userid and password. The burden to users of managing large numbers of userids and passwords has led to proposals for Federated Identity systems, where a single set of credentials can be used to authenticate with several organisations, which have agreed to work together as a federation. 
(WHITE PAPER) READ ABSTRACT |

Price comparison: 2 top app platforms by Red Hat

November 2012 - (Free Research)
Red Hat and Oracle both offer application platforms on the Java EE v6, which means these tools share many capabilities and features -- but what about when it comes to price? See how the two technologies stack up when it comes to acquisition and support costs, and find out how much money you could potentially save by choosing one over the other. 
(WEBCAST) READ ABSTRACT |

2013 Impact Awards Reveal Industry Top Players by SearchDataCenter.com

December 2013 - (Free Research)
The Modern Infrastructure Impact Awards recognize technology products in the areas of data center infrastructure, cloud computing, enterprise mobility management, hybrid storage and desktop and application delivery. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

September 2010 - (Free Research)
For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

How Do You Measure Up Against Top IT Service Provider Benchmarks? 13 Must See Charts by Autotask Corporation

February 2014 - (Free Research)
This graphic whitepaper features 13 charts that will show you how your IT department compares to some of the top service providers. 
(WHITE PAPER) READ ABSTRACT |

Worst Practices in BI: Why Business Intelligence (BI) Applications Succeed Where BI Tools Fail by Information Builders Inc. (E-mail this company)

June 2007 - (Free Research)
Tthis paper provides insight into the top-four worst practices for BI. It also provides guidance on how to avoid and/or overcome worst practices in order to tap into the true power of BI. By reading this paper, you will have a solid understanding of how to avoid BI failure and achieve success with your BI initiatives. 
(WHITE PAPER) READ ABSTRACT |

RFID Reader Options for Better RFID Solution Design by Motorola, Inc.

July 2008 - (Free Research)
This white paper provides an in-depth look at the three types of Radio Frequency Identification (RFID) readers: handheld, mobile, and fixed. These readers provide solutions that enable enterprises to truly maximize the value of RFID technology. 
(ANALYST REPORT) READ ABSTRACT |

The year of Application Performance Management (APM) by ComputerWeekly.com

February 2013 - (Free Research)
Bob Tarzey and Clive Longbottom  explain why IT executives are prioritising Application Performance Management  to address demands for better performance and to meet business goals. 
(ANALYST REPORT) READ ABSTRACT |

Security Primer: Top Tips for Protecting Your System i by Bytware, Inc.

March 2008 - (Free Research)
This E-Guide from TechTarget's Search400.com explores the many components of System i security. 
(WHITE PAPER) READ ABSTRACT |

Top Use Cases for Desktop Virtualization by Citrix

January 2014 - (Free Research)
Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Best Practices for vSphere Application Backups by Veeam Software

May 2014 - (Free Research)
Explore this informative resource to learn about the top ten best practices for VMware vSphere Application backups as well as some smaller tips you might consider implementing in order to protect your virtual environment. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Considerations for Getting Started with VMware Virtualization by VMware, Inc.

March 2013 - (Free Research)
This whitepaper covers the top 10 considerations you need to keep in mind when getting started with virtualization. 
(WHITE PAPER) READ ABSTRACT |

5 Top Reasons to Consider Flash Storage for the Enterprise by Dell, Inc.

February 2013 - (Free Research)
In this white paper, you will gain insight into the top five reasons why you should consider flash technology for your enterprise. 
(WHITE PAPER) READ ABSTRACT |

A Roadmap To Driving Top-Down Alignment Between Business & IT Strategy by Innotas

January 2011 - (Free Research)
IT Governance solutions enable CXOs to align their business strategy with their IT strategy. However,in order for these solutions to realize their maximum impact, they require business stakeholders to be engaged in the transformation process. 
(EBOOK) READ ABSTRACT |

Vendor Landscape: Disk Backup by ExaGrid Systems, Inc.

August 2013 - (Free Research)
This informative paper explores the top ten players in today's disk backup marketplace. Find out how it got to where it is, see where it's headed in the future and discover which vendor's solution rises above the rest. 
(WHITE PAPER) READ ABSTRACT |

Deduplication -- Sorting through the Hype by LEGACY - DO NOT USE - Datalink.

August 2008 - (Free Research)
Attend this webcast, led by seasoned Datalink storage experts, to learn exactly what deduplication can do for you-what's real and what's hype. 
(WEBCAST) READ ABSTRACT |

Top 10 Tips for Optimizing SQL Server Performance by Dell Software

September 2011 - (Free Research)
In this new white paper, discover the top 10 tips to get the most from SQL Server. Learn the things you need to know about SQL Server performance and how these optimization tricks and strategies will help take mediocre SQL performance to new heights. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts