Usage Accounting KnowledgeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Usage Accounting Knowledge returned the following results.
RSS What is RSS?
Related Categories

 •   Usage Management and Monitoring
 •   Storage Management
 •   Data Center Management
 •   Data Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Identity Management/ User Provisioning
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Content Management (ECM)

Related Searches
 •   Conferencing Usage Accounting Knowledge
 •   Graph Usage
 •   Researching Usage
 •   Usage Accounting Calendar
 •   Usage Accounting Capacities
 •   Usage Accounting Colorado
 •   Usage Accounting Knowledge Free
 •   Usage Importing
 •   Usage Top
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Selecting a Practical Enterprise Content Management Solution: Critical Considerations by Xerox DocuShare

May 2008 - (Free Research)
Learn how to put together your content management strategy from the ground up, taking into account business needs, organizational structure and strategic objectives. 
(WHITE PAPER) READ ABSTRACT |

Gone in 30 Days: Exchange, Retention, and Regulatory Compliance by Sherpa Software

September 2009 - (Free Research)
In this white paper, we will discuss how to discover, manage, and archive information within your Exchange enterprise to successfully limit your legal exposure and protect your corporate information. 
(WHITE PAPER) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Performance and Scalability Benchmark: Oracle Communications Billing and Revenue Management by Sun Microsystems, Inc.

July 2008 - (Free Research)
The Oracle Communications BRM application suite is a Tier 1, convergent billing framework that is architected for leading service providers. This white paper describes the performance and scalability results of Oracle Communications BRM 7.3.1 from the recent benchmark conducted at Sun Solutions Center in Paris and France. 
(WHITE PAPER) READ ABSTRACT |

IBM Multiform Master Data Management: The Evolution of MDM Applications by IBM

June 2007 - (Free Research)
IBM Multiform Master Data Management manages master data domains - customers, accounts, products - that have significant impact on the most important business processes and realize the promise of Service Oriented Architecture (SOA). 
(WHITE PAPER) READ ABSTRACT |

The Application Usage and Risk Report by Palo Alto Networks

June 2010 - (Free Research)
The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period. 
(WHITE PAPER) READ ABSTRACT |

Dell Software Inventory & Usage Management by Dell, Inc. and Intel®

October 2009 - (Free Research)
The Dell Software Inventory & Usage Management service automates software and hardware asset discovery and reporting, monitors software usage and helps simplify software license compliance helping managers to control IT costs, reduce software license compliance risks, and make informed decisions regarding software purchasing... 
(DATA SHEET) READ ABSTRACT |

Save Money on Mainframe Hardware and Software: Five Simple Steps to Managing MIPS by Compuware Corporation

September 2009 - (Free Research)
This paper will detail how to control and manage MIPS usage by employing a systematic, repeatable approach that uses powerful technology and a proven process and expertise. 
(WHITE PAPER) READ ABSTRACT |

Better Manage Your Operations to Reduce Costs and Support Environmental Sustainability by CA Technologies.

December 2008 - (Free Research)
With cost improvements, businesses can stay more competitive and profitable, especially in intensive energy-use industries such as IT and retail. 
(WHITE PAPER) READ ABSTRACT |

Simplifying the Collection of Laptop and Desktop Data for eDiscovery by Iron Mountain

June 2010 - (Free Research)
Enterprises today are confronting a dramatic increase in litigation, regulations, and compliance scrutiny. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine

May 2009 - (Free Research)
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more. 
(EGUIDE) READ ABSTRACT |

Confidently maximize virtual investments with Integrated Service Management by IBM

August 2011 - (Free Research)
IBM IT service management solutions help control costs, enhance performance and increase security in the virtual environment, with software for IT provisioning, IT monitoring, virtual storage, IT security, usage and accounting, software license management and more. 
(WHITE PAPER) READ ABSTRACT |

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

Pulling the Plug on Legacy Log Management by Tripwire, Inc.

April 2010 - (Free Research)
When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh. 
(ANALYST BRIEF) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

Mission impossible? Data governance process takes on ‘big data’ by SAP America, Inc.

December 2012 - (Free Research)
The importance of governing big data environments is just starting to take hold, and there are few prescriptions for how to do it right, let alone cost-effectively. This e-guide sheds light on the data governance process for big data and offers new insights from leading data management experts. 
(EGUIDE) READ ABSTRACT |

Full Automation through ERP Helps Streamline Manufacturing Operations by Increasing Efficient Usage of Money, Manpower and Time by ECi Software Solutions - M1 ERP System for Manufacturers

April 2010 - (Free Research)
This paper discusses how a fully integrated, state-of-the-art ERP system provides the solution to the many challenges facing manufacturers. You will also learn what to look for when selecting an ERP solution provider. 
(WHITE PAPER) READ ABSTRACT |

A Functional Model for Data Management by Baseline Consulting

May 2009 - (Free Research)
This paper examines how organizations are using a holistic data management perspective to optimize data usage regardless of where the information resides. It shows how when information is shared across the enterprise, business decisions are more robust, and decision makers have access to the widest array of input, with the greatest quality. 
(WHITE PAPER) READ ABSTRACT |

eBook: Energy Efficient IT-Chapter 3: Principles of Data Center Infrastructure Efficiency by SearchDataCenter.com

February 2010 - (Free Research)
Chillers, air handlers, power distribution, backup power - all of the mechanical processes that keep servers running smoothly account for more than half of an IT energy bill. But this is changing. Energy-efficiency best practices and equipment designs are available to help enterprises reduce their data center energy usage. 
(EBOOK) READ ABSTRACT |

Performance testing for mobile applications by Hewlett-Packard Company

August 2012 - (Free Research)
This white paper reviews key mobile trends and analyzes how performance testers must change their testing methodologies to ensure they are accounting for thechanges caused by mobile usage. 
(WHITE PAPER) READ ABSTRACT |

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance by BeyondTrust Corporation

October 2009 - (Free Research)
This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system. 
(WHITE PAPER) READ ABSTRACT |

Inside Data Center Power by SearchDataCenter.com

July 2013 - (Free Research)
The world of IT may be changing rapidly, but every data center still needs power. Improve your data center's energy efficiency with updates to power usage measurement, cooling and electrical design. 
(EBOOK) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Cloud Strategies Evolving by Dell, Inc.

June 2013 - (Free Research)
This E-Guide examines new cloud applications beyond backup and analyzes the usage of public, private, and hybrid models. 
(EGUIDE) READ ABSTRACT |

Expert Considerations For Cloud-Based Disaster Recovery by CommVault Systems, Inc.

July 2013 - (Free Research)
This E-Guide offers expert advice on incorporating the cloud into your DR strategy and presents the latest trends around the adoption and usage of these services. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts