Using Contractor AgreementsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Using Contractor Agreements returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Systems Management
 •   Business Process Management (BPM)
 •   Application Management and Maintenance
 •   Business Intelligence Solutions
 •   Business Process Automation
 •   Quality Control
 •   Network Management
 •   Networks
 •   Data Security
 •   Virtualization

Related Searches
 •   Access Using
 •   Demonstration Using
 •   Monitoring Using Contractor Agreements
 •   Source Using Contractor Agreements
 •   Study Using
 •   Supply Using Contractor Agreements
 •   Using Contractor Agreements Costing
 •   Using Contractor Agreements Kentucky
 •   Using Contractor Agreements Service
 •   Using Contractor B2B
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

OFCCP Compliance: Understanding the OFCCP's New Ruling on Internet Applicants by iCIMS

July 2008 - (Free Research)
The Internet Applicant final rule, issued by the Office of Federal Contract Compliance Programs (OFCCP), addresses recordkeeping by Federal contractors and subcontractors about the Internet hiring process and the solicitation of race. 
(WHITE PAPER) READ ABSTRACT |

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm by AVG Technologies USA, Inc.

March 2010 - (Free Research)
R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges. 
(CASE STUDY) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

Securing Network Access for Guests and Contractors by Bradford Networks

December 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Top Use Cases for Desktop Virtualization by Citrix

January 2014 - (Free Research)
Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

Top Five Reasons to Use the RadiantOne Federated Identity System With SharePoint by Radiant Logic, Inc.

June 2014 - (Free Research)
This resource highlights the benefits of a federated identity service for organizations with scalable user environments. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Visual COBOL Application Development Environment for Visual Studio by Micro Focus

August 2012 - (Free Research)
Visual COBOL provides the most modern integrated COBOL application development environment in the industry. It combines the leading development environments (Eclipse and/or Visual Studio) with the most significant COBOL update of the last decade. 
(DOWNLOAD) READ ABSTRACT |

Flexible Storage Enables Growth by Dell | EMC

June 2008 - (Free Research)
The AX4-5 has allowed McNeil to stand shoulder-to shoulder with much larger enterprises when it comes to data storage sophistication and efficiency. 
(CASE STUDY) READ ABSTRACT |

Oracle E-Business Suite: Boost Reporting and BI Capabilities (use for podcast, webcast and PT) by Noetix Corporation

October 2012 - (Free Research)
In this transcript, hear first-hand from Noetix customers and they divulge how the reporting and business intelligence (BI) tool saves IT time and resources by enabling end users to get at Oracle E-Business Suite data themselves. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Anatomy of a Database Attack by Imperva

November 2009 - (Free Research)
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures. 
(WEBCAST) READ ABSTRACT |

Do More with Less: The Five Strategies used by Successful SMB Manufacturers by Infor

September 2008 - (Free Research)
A common issue facing small and medium-sized business (SMB) manufacturers today is how to increase revenue and grow their business without significantly adding staff. Read this paper to learn five strategies used by successful SMBs. 
(WHITE PAPER) READ ABSTRACT |

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Windows Licensing for VDI: Quick reference guide by Dell and Microsoft

March 2014 - (Free Research)
This whitepaper walks you through 7 unique licensing scenarios that provides an overview of what to expect when preparing to deploy Windows-based desktops in the datacenter. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Requirements of DoD Directive 8570.1 by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The Department of Defense's manual, DoD 8570.01-M Information Assurance Workforce Improvement Program, supports DoD Directive 8570.1, which requires all individuals possessing privileged access to a DoD Information System (IS) to be trained and certified in the secure operation of computer systems used throughout the DoD's Global Information Grid. 
(WHITE PAPER) READ ABSTRACT |

The High Cost of Low-Cost Cable Testers by Fluke Networks

July 2010 - (Free Research)
It can be hard to figure the total cost of purchasing a new certification tester for network cabling. A low-cost cable tester might save a few thousand dollars in the original purchase, but can cost significantly more in lost productivity throughout the life of the tool. Read on to find the hidden costs that can come along with a “low-cost” tester. 
(WHITE PAPER) READ ABSTRACT |

Observing Data Quality Service Level Agreements: Inspection, Monitoring, and Tracking by DataFlux Corporation

December 2008 - (Free Research)
This paper discusses how implementing a DQ SLA via formalized processes can transform data quality management from a constant "fire-fighting" mode to a more consistent, proactive approach. 
(WHITE PAPER) READ ABSTRACT |

Collaborative software delivery: improving software quality with better lifecycle management by IBM

November 2011 - (Free Research)
Read this white paper and learn how an IBM Rational solution can help your company build better software faster, using an integrated application lifecycle management (ALM) solution designed to support collaboration across distributed agile development teams. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions E-Zine: The New BPM by SearchCIO.com

December 2013 - (Free Research)
Enterprise BPM is about more than battling bottlenecks. CIOs are looking to business process management to help grow the business and hone a competitive edge. 
(EZINE) READ ABSTRACT |

The Capital Delivery Revolution and Technology: Connecting Capital Planning, Construction, and Everything in Between by Oracle Corporation

January 2009 - (Free Research)
This white paper recognizes three principal solution areas in the capital project delivery lifecycle: project design, project execution, and organizational governance. In particular, it addresses the area of project execution and the means available today to drive successful project delivery on a consistent basis. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts