Types ArticleWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Types Article returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Security Policies
 •   Data Center Management
 •   Network Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Application Servers
 •   Network Management
 •   Database Administration

Related Searches
 •   Basics Of Types Article
 •   Find Types Article
 •   Finding Types
 •   Multi Types
 •   Samples Types Article
 •   Types Article Iowa
 •   Types Article Proposal
 •   Types Article Resource
 •   Types Article Screen
 •   Types Scheduling
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 22, 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 11, 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle by iTKO LISA

October 20, 2010 - (Free Research)
This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 1: Capturing the Cloud by IBM

September 21, 2010 - (Free Research)
Read this article from IBM to discover the details behind the definition: cloud computing is an all-inclusive solution in which all computing resources (hardware, software, networking, storage, and so on) are provided rapidly to users as demand dictates. 
(WHITE PAPER) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 22, 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Customer Experience Exchange, Issue 7 by SearchCRM

November 13, 2012 - (Free Research)
This 3-article E-Zine offers analysis and advice for the CEM professional. In the featured article, Cameron Kittle reviews CEM technologies and shares the thoughts of industry observers who stress that a company should first know what it intends to do with its wired connection to customers. Continue on for this article and more. 
(EZINE) READ ABSTRACT |

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 10, 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 09, 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

CPO Rising 2011 -- The State of Spend Analysis by SAP America, Inc.

September 30, 2011 - (Free Research)
Companies that can move high percentages of their spend into managed scenarios will reap much larger returns. This article discusses the importance of visibility in bringing more spend under management, and the types of outcomes one can expect from a strong spend analysis program. 
(WHITE PAPER) READ ABSTRACT |

Cloud computing for the enterprise: Part 1: Capturing the cloud by IBM

May 18, 2011 - (Free Research)
This article discusses cloud computing in general, then dissects the layers of the cloud, presents the different cloud types, along with their benefits and drawbacks, and explains why this movement is important for enterprise developers. 
(WHITE PAPER) READ ABSTRACT |

Information security for SMEs by ComputerWeekly.com

May 23, 2014 - (Free Research)
In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 18, 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 2: WebSphere sMash and DB2 Express-C on the Amazon EC2 Public Cloud by IBM

September 21, 2010 - (Free Research)
Read this article to see how IBM WebSphere sMash and IBM DB2 Express-C Amazon Machine Images can be combined to help you deliver Web applications hosted on the Amazon Elastic Compute Cloud (EC2) infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Survey Shows that SaaS Can Save You Money by GFI Software

December 22, 2010 - (Free Research)
This article discusses the results found during a survey on RMM Software, this is the software IT Company’s/MSP’s use to run their technical operations. A large percentage of RMM software users are saying they generally believe RMM software is over-produced (over-engineered) and they either never or very slowly get round to using it. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Blade Servers Trends by Dell, Inc. and Intel®

November 2008 - (Free Research)
The server type selected for a consolidation or virtualization project lays the foundation for the entire plan, it even impacts the benefits you'll see from the investment. 
(WHITE PAPER) READ ABSTRACT |

eBook: Cloud Computing for Enterprise Developers by Sun Microsystems, Inc.

August 2009 - (Free Research)
If you're an enterprise developer then you're probably familiar with the term "cloud computing," but you may still have questions. In this eBook, you'll learn about the benefits of cloud computing, what it really means to compute in the cloud, some of the different cloud types, and much more! 
(EBOOK) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 2 by Dell, Inc.

February 2012 - (Free Research)
The second edition of BI Trends & Strategies, an e-zine offering advice on business intelligence (BI), analytics and data warehousing, explores whether or not it's the end of enterprise data warehouses as we know them, how to manage multiple business intelligence (BI) tools at once and the potential uses of data virtualization tools. 
(EZINE) READ ABSTRACT |

How to select cloud formations for secure business collaboration by ComputerWeekly.com

November 2010 - (Free Research)
Cloud computing offers massive scalability -  in virtual computing power, storage, and applications resources - all at almost immediate availability and low cost, and business managers are demanding their IT operations assess the benefits this new computing model can represent. 
(WHITE PAPER) READ ABSTRACT |

Ten Signs That You Need a Server by Dell, Inc. and Intel®

December 2009 - (Free Research)
If you'e a small or medium business owner with more than one computer, it's time to consider investing in a server. A server will keep your data secure and organized and will help you run your business more efficiently and professionally. If you've reached one of the 10 thresholds in this article, a server could do your business a world of good. 
(JOURNAL ARTICLE) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 28: Achieving the Right Level of Consolidation in a Virtual Data Center by SearchDataCenter.com

November 2010 - (Free Research)
Virtualization allows organizations to consolidate servers, reduce costs and increase efficiency. But too much of anything is rarely good. In this issue, the downsides of excessive consolidation and strategies for striking the right balance to improve computing efficiency are explained. Plus, how to improve server performance and consolidation. 
(EZINE)

Developing HTML5 Applications for AppUp: Part 1 A Simple Example by Intel

December 2011 - (Free Research)
This is the first in a series of articles covering how to develop HTML5 applications for Intel AppUp. This first article will cover the basics of getting a minimal application packaged using the Encapsulator tool. Later articles will describe some larger example applications that illustrate different features of HTML5. 
(TRAINING GUIDE)

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects by Intermec

March 2009 - (Free Research)
This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts