Types StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Types Study returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Business Intelligence Solutions
 •   Data Center Management
 •   Virtualization
 •   Business Process Management (BPM)
 •   Enterprise Systems Management
 •   Security Policies
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Availability, Performance and Problem Management
 •   Laptops/ Notebooks/ Tablet PCs

Related Searches
 •   Architecture Types
 •   Configurations Types
 •   Linux Based Types Study
 •   Mac Types Study
 •   Portals Types Study
 •   Types Solutions
 •   Types Study Budgeting
 •   Types Study Capture
 •   Types Study Conversions
 •   Types Study Manual
Advertisement

ALL RESULTS
1 - 25 of 489 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

JReport Solution Study: KANA Software by Jinfonet Software

July 28, 2009 - (Free Research)
This case study looks at the Success KANA has had after implementing JReport from Jinfonet. KANA needed a reporting solution that could provide easy setup, intuitive reports for end-users, and the ability to run ad hoc reports and change settings like report type, date, etc. Read on to learn more about this great reporting solution. 
(CASE STUDY) READ ABSTRACT |

7 Types of Hard CISSP Exam Questions and How To Approach Them by Global Knowledge Network, Inc.

March 2006 - (Free Research)
Throughout the CISSP preparation course offered by Global Knowledge, we cover the various security mechanisms, principles, concepts, and facts that will be included on the CISSP exam. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

The Unofficial Official VCAPS5-DCA Study Guide by Veeam Software

January 2014 - (Free Research)
Take a look at this extensive study guide to find the answers to any questions you may have about these IT technologies. 
(EGUIDE) READ ABSTRACT |

Faster, Higher, Stronger: In-Memory Computing Disruption and What SAP HANA Means for Your Organization by SAP America, Inc.

November 2011 - (Free Research)
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper. 
(WHITE PAPER) READ ABSTRACT |

Study Reveals Cloud Expectations, Concerns and Experiences by Cisco Systems, Inc.

October 2013 - (Free Research)
There is no doubt that cloud computing is changing the IT landscape, but it may also be changing IT's position within business dynamics and objectives. This comprehensive whitepaper presents the findings of a recent survey of IT decision makers on the impact of cloud computing business-wide. 
(WHITE PAPER) READ ABSTRACT |

Percept Technology Labs: RDX Removable Archivability Study by ProStor Systems

December 2007 - (Free Research)
This case study by Percept Technology Labs provides an overview of ProStor System's RDX removable disk product. Download this white paper to learn how RDX can safely and effectively store your critical data. 
(WHITE PAPER) READ ABSTRACT |

Ponemon Study: The State of Advanced Persistent Threats by Trusteer

December 2013 - (Free Research)
Enterprises are unprepared to deal with APT attacks. According to a new Ponemon Institute study, APTs are changing the threat landscape, rendering current security controls ineffective. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: How Client Devices Affect the User Experience by Intel

October 2010 - (Free Research)
This white paper compares various client devices within the context of cloud computing. Find out which platform was most responsive to customers accessing a variety of cloud-based applications. 
(WHITE PAPER) READ ABSTRACT |

Case Study: New York Philharmonic Digital Archives to Preserve and Make Accessible Worldwide Over 160 Years of American Cultural Heritage with the help of Technology Services Group and Alfresco Software by Alfresco Software

May 2012 - (Free Research)
This resource examines how the New York Philharmonic digitized their enormous collections to provide universal online access with a robust, scalable document management system. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: How to Minimize the Risk of Attacks by Qualys

July 2012 - (Free Research)
This informative white paper outlines the importance of Web application security. With over 55 percent of vulnerabilities in 2010 resulting in attacks, a solution is necessary. Learn more about the different types of Web application vulnerabilities as well as how to detect vulnerabilities more efficiently. 
(WHITE PAPER) READ ABSTRACT |

Consolidating Service Provider Points of Presence Using Virtualization to Optimize and Consolidate Networks by Juniper Networks, Inc.

March 2010 - (Free Research)
This white paper outlines the challenges that service providers are facing in the points of presence (POP), and presents the results of the NSP study quantifying the operational and capital savings possible through POP consolidation with virtualization. Read this white paper to learn how to improve the efficiency of POPs through virtualization. 
(WHITE PAPER) READ ABSTRACT |

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment by ComputerWeekly.com

February 2012 - (Free Research)
This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Business Analytics Buying Criteria: The Three Maxims by IBM

August 2012 - (Free Research)
When evaluating business analytics systems, IT leaders must consider the performance and scalability requirements of the underlying infrastructure. This paper examines the types of business analytics software available, highlights the analytical workload demands, and buying criteria to consider for various types of business analytics software. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Sunrise Health Improves Patient Care with VDI by Citrix

January 2014 - (Free Research)
Read on to learn how Sunrise Health remedied their failing IT environment and digital health record system with VDI. 
(WHITE PAPER) READ ABSTRACT |

IT governance: enabling high performance in turbulent times by IBM

February 2009 - (Free Research)
This paper explains how CIOs can use governance best practices to mitigate the depth and duration of performance declines that often accompany periods of change and innovation. It will clarify what governance is - and isn't - and articulate how CIOs can begin to improve governance within their organizations. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – February Edition by ComputerWeekly.com

February 2013 - (Free Research)
Many analysts are predicting that tablets will outsell laptops, this year, and become the most popular type of portable computer device. In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing. 
(EZINE) READ ABSTRACT |

2013 Fourth Annual Cost of Cyber Crime Study by Hewlett-Packard Limited

October 2013 - (Free Research)
This guide explores the state of cybercrime in today's IT landscape and provides global statistics on the high costs of security breaches. 
(WHITE PAPER) READ ABSTRACT |

Analytics - the new path to value by IBM

November 2011 - (Free Research)
To better understand how today's organizations are using analytics, a survey was conducted amongst a global sample of nearly 3,000 executive managers and analysts. Based on the results, this study offers recommendations on how organizations can strengthen their analytics capabilities to achieve a long-term advantage. 
(EBOOK) READ ABSTRACT |

The Importance of Real-Time Executive Dashboards by ASG Software Solutions

March 2011 - (Free Research)
According to a recent study by an independent research firm, "90 percent of IT executives surveyed think that a real-time, customized dashboard will improve service levels and problem remediation." 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

International Mobile Security: Research Highlights and Considerations for Enterprise IT by Cisco (E-mail this company)

July 2013 - (Free Research)
This study reveals how today's organizations are approaching mobility and the consumerization of IT, and what this means for the development of security measures fit for a more diverse and flexible business environment. 
(WHITE PAPER) READ ABSTRACT |

The Benefits of VMware’s vCenter Operations Management Suite by VMware, Inc.

September 2012 - (Free Research)
This resource presents the results from a recent study interviewing 200 of your peers on the impact that VMware's vCenter Operations Management Suite had on their business. 
(WHITE PAPER) READ ABSTRACT |

ITIL® v3: What It Is and Why You Should Care by Global Knowledge

October 2008 - (Free Research)
This paper explains ITIL by describing its benefits, where it comes from, why you need to know about it, which types of IT organization can benefit from using it, and how to get started. 
(WHITE PAPER) READ ABSTRACT |

How Verification Services Fortify Your Software Escrow Solution by Iron Mountain

December 2011 - (Free Research)
This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them. 
(WHITE PAPER) READ ABSTRACT |

Driving Operational Innovation with Lean Six Sigma by IBM Line of Business

January 2007 - (Free Research)
Learn how industry leaders such as the companies profiled in this study are using Lean Six Sigma approaches to enable significant innovation opportunities that have far-reaching impacts on their businesses. 
(WHITE PAPER) READ ABSTRACT |

CPO Rising 2011 -- The State of Spend Analysis by SAP America, Inc.

September 2011 - (Free Research)
Companies that can move high percentages of their spend into managed scenarios will reap much larger returns. This article discusses the importance of visibility in bringing more spend under management, and the types of outcomes one can expect from a strong spend analysis program. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 489 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts