Usage IssuesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Usage Issues returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Data Center Management
 •   Network Security
 •   Enterprise Systems Management
 •   Network Management
 •   Security Monitoring
 •   Virtualization
 •   Usage Management and Monitoring
 •   Content Delivery Networks/ Web Application Acceleration
 •   Application Security

Related Searches
 •   Format Usage Issues
 •   Group Usage Issues
 •   Linux Based Usage Issues
 •   Measure Usage Issues
 •   Security Usage Issues
 •   Storage Usage
 •   Template Usage Issues
 •   Usage Issues Canada
 •   Usage Issues Procurement
 •   Usage Issues Workflow
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Teamstudio Usage Monitor by Teamstudio, Inc.

August 01, 2006 - (Free Research)
A Domino Application Usage Audit pinpoints issues with your application inventories, empowering you with the information you need to confidently select and remove all unused applications. 
(DATA SHEET)

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Presentation Transcript: The Future of Energy Efficiency in the Data Center by Viridity Software

September 07, 2010 - (Free Research)
Join Michael Rowan, Co-Founder and CTO, Viridity Software, and Michelle Bailey, Senior Research Analyst, IDC as they discuss why it’s important to accurately measure how power is being consumed by IT equipment, impending legislation affecting energy usage, and other issues related to the future of energy efficiency in the data center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Future of Energy Efficiency in the Data Center by Viridity Software

August 31, 2010 - (Free Research)
Join Michael Rowan, Co-Founder and CTO, Viridity Software, and Michelle Bailey, Senior Research Analyst, IDC and as they discuss why it’s important to accurately measure how power is being consumed by IT equipment, impending legislation affecting energy usage, and other issues related to the future of energy efficiency in the data center. 
(WEBCAST) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

Guidance for Calculation of Efficiency (PUE) in Data Centres by APC by Schneider Electric

December 2011 - (Free Research)
The efficiency ratings of a data centre can vary substantially depending on what methodologies are applied. Access this exclusive resource to discover the importance of measuring data centre efficiency and learn about the issues companies face when establishing the PUE of an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Video collaboration usage policies should consider user experiences by SearchSecurity.com

July 2012 - (Free Research)
Evaluate the pros and cons of video collaboration in this expert e-guide, and discover how businesses can overcome key user experience challenges with the right policies and management tactics. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine: March 2009 - Sky-High Risk? by Information Security Magazine

March 2009 - (Free Research)
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more. 
(EZINE)

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

Virtualization Solutions from Sun Microsystems: I Remember When Being Green Meant Compromise by LEGACY - DO NOT USE - Insight

June 2008 - (Free Research)
For every area of your datacenter, Sun Professional Services has created a tailored assessment service. 
(WHITE PAPER) READ ABSTRACT |

Data stewardship program: Quality booster, but a hard step for many by SAP America, Inc.

December 2012 - (Free Research)
Data stewards are central to the success of data governance programs. Without data stewards to facilitate the communications about data issues between IT and the business side, diverging data definitions, policies and quality controls can easily get out of control. This e-guide offers tips and best practices. 
(EGUIDE) READ ABSTRACT |

CW Europe – March Edition by ComputerWeekly.com

March 2013 - (Free Research)
Never have we been so open about the information we share online, without so little concern for our privacy. In this issue of CW Europe read how the increase in social media usage has created new privacy concerns for businesses. 
(EZINE) READ ABSTRACT |

Examining SSL-encrypted Communications by Netronome Systems

October 2007 - (Free Research)
SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine

May 2009 - (Free Research)
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more. 
(EGUIDE) READ ABSTRACT |

E-Guide: Cloud Strategies Evolving by Dell, Inc.

June 2013 - (Free Research)
This E-Guide examines new cloud applications beyond backup and analyzes the usage of public, private, and hybrid models. 
(EGUIDE) READ ABSTRACT |

Genius Project4Domino Versus Microsoft Project Server 2007 by Genius Inside

October 2007 - (Free Research)
The goal of this white paper is to demonstrate that Genius Project4Domino has a stronger ROI, is better integrated, is rich in features, and is a more cost effective (TCO) alternative - especially for Domino and Lotus Notes users. The comparison benefits for Exchange and other platforms are similar. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Emerging Media Series, Issue Two: Blogs and Real Simple Syndication Report by KnowledgeStorm Webinars (E-mail this company)

September 2006 - (Free Research)
This podcast will focus on the content of a new KnowledgeStorm research report, the second in a series of studies looking at the impact emerging online applications have on B2B technology marketing. The research finds that blogs and Real Simple Syndication (RSS) are catching on more quickly than previously thought. 
(PODCAST) READ ABSTRACT |

Two Sides of the Same Coin: The Convergence of Security and Compliance by Imperva.

October 2008 - (Free Research)
Security and compliance issue will continue to dominate IT initiations as long as valuable on customer, employees, patients and business financials is exchanged and stored. 
(WHITE PAPER) READ ABSTRACT |

Breaking the Disk Barrier with In-Memory DBMS Technology: Sybase Adds a Big Performance Boost for ASE 15.5 by Sybase, an SAP company

June 2010 - (Free Research)
This paper discusses the growing need for high-performance database management, without disrupting applications and the operations of the datacenter. It discusses issues of performance versus durability and how an in-memory database strategy can be used to provide better high-speed, high-volume data management without sacrificing data integrity. 
(ANALYST REPORT) READ ABSTRACT |

SharePoint E-zine Volume 12: SharePoint Taxonomies That Stand the Test of Time by SearchWinIT

July 2009 - (Free Research)
In this month's issue, learn ways to accommodate permanent departments and business functions as well as ad hoc collaboration when building out your SharePoint taxonomies. 
(EZINE)

Course: Insecure Temporary Files (CWE-377) by Klocwork

November 2013 - (Free Research)
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377. 
(WEBCAST) READ ABSTRACT |

Practical Considerations When Instrumenting Applications with JMX by SL Corporation

May 2008 - (Free Research)
This paper discusses practical issues regarding data content and design of MBeans for optimal use in such systems. Some commonly overlooked requirements are explored and recommendations made for minimizing client-side development efforts. 
(WHITE PAPER) READ ABSTRACT |

Simpler Database Migrations Have Arrived! IBM, ANTs Software, And EnterpriseDB Offer Innovative New Options by IBM

June 2011 - (Free Research)
Application developers and DBAs looking to migrate databases due to cost concerns, staffing problems, or technology issues should consider this new database compatability layer option to mitigate risk, lower migration cost, and speed the migration process. 
(WHITE PAPER) READ ABSTRACT |

GFI WebMonitor 2012 by GFI Software

March 2012 - (Free Research)
Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues. 
(TRIAL SOFTWARE) READ ABSTRACT |

Citrix XenClient Virtual desktops… to go by Citrix Systems, Inc. (E-mail this company)

August 2012 - (Free Research)
This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology. 
(PRODUCT OVERVIEW) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts