Using On-LineWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Using On-Line returned the following results.
RSS What is RSS?
Related Categories

 •   On-line Customer Support
 •   Customer Relationship Management (CRM)
 •   Customer Service (General)
 •   Customer Experience Management (CEM)
 •   Business Intelligence Solutions
 •   Enterprise Systems Management
 •   Customer Interaction Management
 •   Help Desk and Call Management
 •   Network Security
 •   Application Management and Maintenance

Related Searches
 •   Cases Using
 •   Conversion Using
 •   Implementing Using On-Line
 •   Using On-Line Implement
 •   Using On-Line Pos
 •   Using On-Line Templates
 •   Using Programming
 •   Using Vendor
 •   Utility Using
 •   White Papers Using On-Line
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Collaborative Efforts: Survey Revealse Clear Business Acceleration Using On-Demand Collaboration Technology by CA Technologies.

September 2008 - (Free Research)
This summary report explores different market trends with commentary from key respondents as well as WebEx’s Knight, an industry expert. 
(WHITE PAPER) READ ABSTRACT |

E-Prescribing Software Use on the Rise Across the U.S. by Imprivata

April 2014 - (Free Research)
In this expert e-guide from SearchHealthITExchange.com, explore the reasons behind increasing popularity in e-prescribing software, and learn how it can reduce medical records. 
(EGUIDE) READ ABSTRACT |

Redbooks: Connect Cloud and On-premise Applications Using WebSphere Cast Iron Integration by IBM

November 2013 - (Free Research)
Download the following e-book and gain expert advice on what you need to know about connecting to the cloud and using on-premise applications to help drive your enterprise forward. 
(EBOOK) READ ABSTRACT |

Outsourcing the problem of software security by ComputerWeekly.com

July 2012 - (Free Research)
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. 
(ANALYST REPORT) READ ABSTRACT |

InfiniBand for Storage Applications by Mellanox Technologies

March 2008 - (Free Research)
InfiniBand defines an industry-standard implementation of remote direct memory access, protocols and kernel bypass to minimize CPU overhead allowing computing resources to be fully used on application processing rather than network communication. 
(WHITE PAPER) READ ABSTRACT |

Liebert Monitoring by Liebert Corporation

The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD.... 
(HARDWARE PRODUCT)

Trend Micro Deep Security 7.5 vs. McAfee and Symantec by Trend Micro, Inc.

February 2011 - (Free Research)
Server and desktop virtualization are essential elements of any IT strategy that seeks to decrease capital and operational expenditures. In the rush to implement virtualization technologies, many organizations simply deploy the same anti-virus solution that is in use on their physical server and desktop systems. 
(TEST RESULTS) READ ABSTRACT |

Securing  Android, iOS and Windows Tablets and Smartphones by Citrix

February 2014 - (Free Research)
This exclusive resource examines the common security challenges that managing various mobile platforms can pose, and discusses a solution that can allow you to deliver enterprise information securely to mobile devices regardless of platform. 
(WHITE PAPER) READ ABSTRACT |

Agile Development: Five Steps to Continuous Integration by Electric Cloud

September 2008 - (Free Research)
This whitepaper illustrates the real impact of continuous integration on build managers and development teams, and describes practical "stepping stones" to make the transition to agile builds. 
(WHITE PAPER) READ ABSTRACT |

EMC Solutions at Microsoft: Optimizing Exchange Backup and Recovery with VSS (Volume Shadowcopy Service) Technology Integration by EMC Corporation

November 2011 - (Free Research)
This case study highlights the best practices learned from developing and deploying the VSS solution for Exchange using EMC CLARiiON storage technologies and EMC Replication Manager/SE. 
(WHITE PAPER) READ ABSTRACT |

How to tackle information classification by ComputerWeekly.com

November 2010 - (Free Research)
The aim of this paper is to demonstrate how information classification can be used to enhance security within a Collaboration Oriented Architecture. 
(WHITE PAPER) READ ABSTRACT |

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks by M86 Security

October 2009 - (Free Research)
Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively. 
(WHITE PAPER) READ ABSTRACT |

Demystifying Switch-based ACLs by Global Knowledge

February 2013 - (Free Research)
This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Scheduling, Facility, Hoteling Software: Sharing Desks, Offices, Conference Rooms, and Even Parking Spaces by DeskFlex

August 2008 - (Free Research)
Desk sharing among mobile workers is known by several names, hoteling, hot-desking, virtual office, etc. Read this paper to learn how to increase office productivity with scheduling, facility, and hoteling software. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 24 January 2012: Has Microsoft succeeded with Trustworthy Computing? by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we mark the 10th anniversary of Microsoft’s Bill Gates announcing the Trustworthy Computing initiative, and ask if it has made IT more secure. We look at what Oracle’s latest developments mean for its software users running rivals’ servers, and conclude our Buyer’s Guide to IT consumerisation. Download the issue now. 
(EZINE) READ ABSTRACT |

What if? Unleashing the Potential of Digital Signage by Insight

December 2012 - (Free Research)
In this presentation transcript, Principle Analyst Zeus Kerravala of ZK Research reveals the secrets of utilizing digital signage to its fullest potential. Learn the transformations this technology has gone through, where it's going, and how businesses have successfully leveraged its power. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Managing Mobile Application Security in the BYO Device Era by SearchSecurity.com

January 2013 - (Free Research)
Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now! 
(EGUIDE) READ ABSTRACT |

Best Practices for Architecting a Lustre-Based Storage Environment by DataDirect Networks

June 2008 - (Free Research)
This document details a number of design implications and provides the reader with information to make informed decisions to scale a high-performance cluster file I/O. 
(WHITE PAPER) READ ABSTRACT |

HIPAA Compliance in a BYOD Environment by Imprivata

April 2014 - (Free Research)
Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations. 
(EGUIDE) READ ABSTRACT |

Virtualizing Tier 1 Applications: A Critical Step on the Journey Toward the Private Cloud by VMware, Inc.

January 2010 - (Free Research)
This IDC white paper explains how much of the Enterprise IT community is at a crossroads in extending their journey to the private cloud: Companies must virtualize their business critical applications in order to reap the benefits of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

SonicWALL TZ Series by SonicWALL

February 2011 - (Free Research)
Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls. 
(WHITE PAPER) READ ABSTRACT |

Hosted Security IT Manager's Guide by Symantec Hosted Services

July 2009 - (Free Research)
Hosted security, such as MessageLabs, provides companies with protection against email and web malware plus spam and content filtering, email archive and continuity. Read this guide to learn more about your hosted security options. 
(WHITE PAPER) READ ABSTRACT |

Advanced Authentication Methods: Software vs Hardware by CA Technologies.

June 2011 - (Free Research)
View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner. 
(WEBCAST) READ ABSTRACT |

Activity based working: The Hybrid Organisation: Buildings by ComputerWeekly.com

June 2010 - (Free Research)
The way we work is now open to wide-ranging review. The concept of the office as the ‘dumb’ container for work, housing the corporation and its infrastructure assets, will be challenged by a number of factors explored in this paper. Work, in the future, will only be a verb. It is becoming a process, not a place. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts