Utility KeyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Utility Key returned the following results.
RSS What is RSS?
Related Categories

 •   Grid/ Utility Computing
 •   Virtualization
 •   Integrated Human Resources Utilities
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Human Resource Management
 •   Business Process Management (BPM)
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Data Security
 •   Storage Management

Related Searches
 •   Benefits Utility Key
 •   Buying Utility Key
 •   Calendar Utility Key
 •   Integration Utility Key
 •   Specialist Utility
 •   Utility Displays
 •   Utility Key Migration
 •   Utility Key Retail
 •   Utility Scheduling
 •   White Papers Utility Key
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

IBM Service Management for the Intelligent Utility Network by IBM

December 06, 2010 - (Free Research)
The current utilities environment requires companies to decrease costs while increasing the ability to control utility assets. One key challenge is how to take advantage of new technologies to better manage the delivery of service to customers today and into the future. IBM Service Management for the IUN provides a blueprint for getting started. 
(WHITE PAPER) READ ABSTRACT |

Free Software – Solve Common LAN problems with Switch Port Monitor Utility by Fluke Networks

October 12, 2010 - (Free Research)
For the majority of enterprises, the switch is the key network device, so visibility into the switch is necessary to thoroughly understand what’s actually happening on the network. Fluke Networks' free Switch Port Monitor software provides detailed information by port such as interface name, speed, status, packet activity and so much more. 
(DOWNLOAD) READ ABSTRACT |

Transforming Insight Into Action With Business Event Processing by IBM

December 31, 2009 - (Free Research)
This white paper explores key business event processing capabilities that are helping energy and utilities organizations to manage instrumented and intelligent utility networks detect outages, improve grid security, and prevent fraudulent use of energy. 
(WHITE PAPER) READ ABSTRACT |

Key Considerations for Power and Cooling in the Data Center by APC by Schneider Electric

March 20, 2014 - (Free Research)
Access this exclusive resource and discover how data center managers can conquer power and thermal challenges, without putting a data center sized hole in your pocket. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Inside The Cloud, Key Security Factors When Considering Managed Services by AT&T Corp

December 14, 2009 - (Free Research)
This Presentation Transcript offers an overview of the cloud computing landscape as it relates to information security. Few organizations realize the vast and inherent risks that cloud computing presents, including data exposure, data loss, and a compromised infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IDC White Paper: Making the Business Case for IT Consolidation by Hewlett-Packard Company

April 01, 2008 - (Free Research)
IDC believes that IT organizations are constantly being asked to do more with less. This analyst report will look at some of the key triggers CIOs look for when deciding to consolidate as well as getting started with consolidation and its impact on the business. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 17 January 2012: featuring the future of IT education; G-Cloud in action; networking challenges by ComputerWeekly.com

January 17, 2012 - (Free Research)
In this week’s issue of Computer Weekly, we look at the future of computer science education now the government has scrapped the current ICT curriculum, and what this means for the IT industry. We talk to an early adopter of the government G-Cloud plan; and we examine the key challenges for network architects. Download the new issue now. 
(EZINE)

Protect Your Data like a Fortune 500 Company by SafeData, LLC

July 2008 - (Free Research)
This white paper explores the types of world-class data protection and business continuity solutions that are available for businesses and how the utility model makes them easy and affordable. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security: Emerging Threats, Essential Strategies by Juniper Networks, Inc.

February 2012 - (Free Research)
In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution. 
(WHITE PAPER) READ ABSTRACT |

5 Keys to Developing an Awareness Program by Polivec

April 2008 - (Free Research)
Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program. 
(WEBCAST) READ ABSTRACT |

Simplifying SharePoint Backup and Recovery by Dell Software

October 2008 - (Free Research)
Safeguarding your valuable SharePoint data is critical, but native tools are limited. In this new Quest white paper, discover the strengths and weaknesses of native tools, and how you can extend them. Read this white paper today. 
(WHITE PAPER) READ ABSTRACT |

Expert E-Book: Data Security and the Cloud by SearchSecurity.com

February 2011 - (Free Research)
This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing. 
(EBOOK) READ ABSTRACT |

Oracle Grid Computing by Oracle Corporation

June 2009 - (Free Research)
The Oracle Grid computing architecture features many powerful techniques that improve energy efficiency and data center productivity. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Five Keys to Building a Successful Cloud Services Business by CA Technologies.

March 2011 - (Free Research)
The market for cloud computing is growing and the service providers that have the ability to adapt to market changes that will continually grab the most market share. This paper will help you do just that: understand what it takes to succeed as service providers move aggressively to cloud services. Read on to learn more about the five keys. 
(WHITE PAPER) READ ABSTRACT |

Hosted Contact Center Market Report: DMG Consulting by LiveOps

March 2011 - (Free Research)
Hosted contact center adoption is increasing rapidly. Solutions provide quick deployment, quantifiable ROI, scalability, ongoing investment protection, reduced maintenance burden and minimal cash outlays. DMG Consulting, a leading contact center firm, has just released this new report discussing key market trends, ROI benefits, and key players. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: The Private Cloud Starts Today with HP Storage by Hewlett-Packard Limited

January 2011 - (Free Research)
This webcast and accompanying podcast explore the reasons to move to a utility-based cloud computing model and outline the requirements every CIO and IT manager should keep in mind when looking to build their own private cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

E-book: Key trends in SAP managed hosting environments - is your provider keeping pace? by Freudenberg IT

December 2009 - (Free Research)
In this e-book, learn more about key trends affecting SAP managed hosting environments. Find out how the emergence of cloud computing is impacting the managed hosting market. Learn more about virtualization and find out important considerations when assessing managed hosting providers. 
(EBOOK) READ ABSTRACT |

HR Technology Key Trends 2014 by ComputerWeekly.com

January 2014 - (Free Research)
HR Directors and leading IT suppliers give their take on the HR technology trends for 2014 in this analysis from HR Zone. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Q-EKM: Quantum Encryption Key Manager: Enterprise Proven Security for Your Valuable Data at Rest by Quantum Corporation

July 1967 - (Free Research)
Quantum's Encryption Key Manager (Q-EKM) is an Enterprise proven, easy-to-use solution for managing encryption keys across multiple Quantum libraries. 
(WHITE PAPER) READ ABSTRACT |

Securing Data Stored on Tape with Encryption: How to Choose the Right Encryption Key Management Solution by Quantum Corporation

October 2008 - (Free Research)
Q-EKM software, is designed to generate and communicate encryption keys and it is a proven, easy-to-use, library-managed encryption solution designed to protect sensitive data throughout the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Effective Risk Management in a Collaboration Driven Enterprise by AvePoint, Inc.

August 2008 - (Free Research)
How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability. 
(WHITE PAPER) READ ABSTRACT |

Achieve True Collaboration in Global Development by Telelogic, An IBM Company

December 2008 - (Free Research)
This paper explains the effective management of human capital, which includes not just the organization's own employees, but also members of the outsourcing team as well, is a key success factor. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Social Collaboration: What's HR Got to Do With It? by Jive Software

February 2014 - (Free Research)
Consult the following white paper to explore the facts and numbers from 600 organizations and the role ESC plays for them. Discover the tools and practices they use to meet business and talent goals, ultimately giving you valuable insights to where your collaborative imitative should be in the near future. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Key components to a virtual disaster recovery solution by Dell Compellent

October 2011 - (Free Research)
In businesses nationwide, IT infrastructures have been growing rapidly – leading to extensive sprawl. In terms of disaster recovery, this spells mayhem. This e-guide suggests virtualization as a potential solution and explains why hot sites, bandwidth, and testing are essential components of any virtual disaster recovery plan. 
(EGUIDE) READ ABSTRACT |

Quantum Encryption Solutions by Quantum Corporation

July 1967 - (Free Research)
Quantum Encryption Key Manager (Q-EKM) is an easy-to-use solution for protecting valuable data at rest across the enterprise. 
(VIDEOCAST) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts