Voice/data Technologies SamplesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Voice/data Technologies Samples returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Application Servers
 •   Web Servers
 •   Virtualization
 •   Website Design and Development
 •   Database Planning and Implementation
 •   Anti-Virus Solutions
 •   Database Administration
 •   Entry Level Servers
 •   Vulnerability Assessment

Related Searches
 •   Find Voice/data Technologies
 •   Intranet Voice/data
 •   Resource Voice/data Technologies
 •   Voice/data Configuration
 •   Voice/data Find
 •   Voice/data Technologies Alabama
 •   Voice/data Technologies Ecommerce
 •   Voice/data Technologies Metrics
 •   Voice/data Technologies Repair
 •   Voice/data Technologies Samples Standard
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Converged Video Network Security by Alcatel-Lucent

August 2008 - (Free Research)
Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself. 
(WHITE PAPER) READ ABSTRACT |

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

Customer Experience Exchange, Issue 7 by SearchCRM

November 2012 - (Free Research)
This 3-article E-Zine offers analysis and advice for the CEM professional. In the featured article, Cameron Kittle reviews CEM technologies and shares the thoughts of industry observers who stress that a company should first know what it intends to do with its wired connection to customers. Continue on for this article and more. 
(EZINE) READ ABSTRACT |

Total Economic Impact of Oracle Enterprise Manager Database Management Packs by Oracle Corporation

February 2008 - (Free Research)
This study highlights the benefits and costs of deploying the Oracle Enterprise Manager Diagnostic Pack and Tuning Pack across the enterprise of a sample organization. The study examines the estimated ROI for the sample organization and presents aggregate findings derived from the interview and analysis process and Forrester's independent research. 
(WHITE PAPER) READ ABSTRACT |

Pervasive Data Profiler v4 by Pervasive Integration

January 2008 - (Free Research)
Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact™ of Dell's Server Virtualization Solutions by Dell, Inc. and Intel®

February 2009 - (Free Research)
In late 2008, Forrester Research commenced work on a research project commissioned by Dell, Inc., that focused on examining the potential return on investment (ROI) enterprises may realize by adopting Dell's server virtualization solutions in conjunction with VMware's ESX server and virtualization platform. Read this study to discover key findings. 
(ANALYST REPORT) READ ABSTRACT |

Excerpts from Virus Bulletin Comparative Reviews August-December 2010 by ESET

March 2011 - (Free Research)
The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files. 
(WHITE PAPER) READ ABSTRACT |

A sample travel and expense policy template for large companies by Concur Technologies (E-mail this company)

December 2013 - (Free Research)
This resource outlines 12 considerations for creating an effective travel and expense policy, and offers recommendations to help you move forward. 
(WHITE PAPER) READ ABSTRACT |

ESET: Threat Center by ESET

September 2010 - (Free Research)
IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types. 
(PRODUCT DEMO) READ ABSTRACT |

Dell Microsoft Windows Server 2008 Hyper-V Reference Architecture by Dell and Microsoft

June 2011 - (Free Research)
This paper proposes several sample virtualisation architectures based on Dell's server and storage products. Architectures are divided into three main categories: Small, Medium, and Large. These categories are based on the features and capacity of each product, as well as the complexity of the overall architecture. 
(WHITE PAPER) READ ABSTRACT |

Developing WS-Management Solutions for Intel® Active Management Technology by Intel

October 2009 - (Free Research)
This article describes how to develop flexible WS Management-based solutions for Intel® Active Management Technology using the .NET development environment. The basic ingredients and building blocks of a WSMan-based solution will be presented. We've included some coding samples (written using Windows 2008) to help illustrate this information. 
(TECHNICAL ARTICLE)

Presentation Transcript: Five Reasons to Offload Analytics from Your Data Warehouse by ParAccel

December 2011 - (Free Research)
Traditional data warehouse infrastructure struggles to keep up with the expanding demand for a wide and changing variety of analytic workloads.  The result is growing frustration as end-users are forced to use sample data, aggregate data and even restricted in their access to information in standalone or enterprise data warehouses. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Duet Implementation: How to leverage SAP applications through your Microsoft Office Environment by Duet for Microsoft Office and SAP

May 2007 - (Free Research)
Attend this Webcast to learn the various components that make up a Duet environment--a bridge between SAP applications and the Microsoft environment--as well as scalability and high availability options. 
(WEBCAST) READ ABSTRACT |

JReport 9 by Jinfonet Software

June 2009 - (Free Research)
Enterprises rely on timely, accurate information to manage business operations, identify risk, improve productivity, and increase profitability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Self-Management of Passwords (SMOP) Version 1.1 by turbo-IT Corporation

May 2011 - (Free Research)
Active Directory users often have their accounts locked out or forget their passwords.  This download empowers users to perform self service password resets and unlock their accounts eliminating helpdesk calls resulting in increased productivity and reduced costs. 
(DEMO) READ ABSTRACT |

SharePoint 2010 Beta SDK by Microsoft Corporation India Pvt Ltd

December 2009 - (Free Research)
The Microsoft SharePoint 2010 (Beta) Software Development Kit (SDK) contains conceptual overviews, programming tasks, samples, and references to guide you in developing solutions based on SharePoint 2010 products and technologies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Dell Compellent Storage Center SAN & Citrix XenDesktop 1,000 Desktop Reference Architecture by Dell Compellent

August 2011 - (Free Research)
Dell tested a sample of 1,000 virtual desktops and simulated real-world workloads using a Dell Compellent Storage Center SAN in a Citrix XenDesktop VDI environment with Microsoft Hyper-V 2008 R2 as the hypervisor. 
(WHITE PAPER) READ ABSTRACT |

Enhance Business Insight and Scalability of XML Data with New DB2 9.7 pureXML Features by IBM

March 2011 - (Free Research)
This is a developerWorks article. This article summarizes the new pureXML capabilities, explains how they can be used, and discusses sample application scenarios. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Hands-on Oracle Application Express security by ComputerWeekly.com

November 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

Cloud Backup: Expert Overview of Available Services by Asigra

June 2013 - (Free Research)
This e-guide follows the evolution and maturity of cloud backup and explores several changes prompting its recent attention and adoption. It also provides a sampling of available services and a list of key section criteria you need to consider when evaluating various approaches and vendor offerings. 
(EGUIDE) READ ABSTRACT |

Global Data Deduplication Results with NetBackup PureDisk by Symantec Corporation

February 2008 - (Free Research)
At the heart of NetBackup PureDisk customers will find flexible deduplication technology, a highly scalable software-based storage system, and integration with NetBackup for greater functionality. 
(WHITE PAPER) READ ABSTRACT |

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

The Google/TechTarget Research Project by TechTarget

November 2008 - (Free Research)
Google and TechTarget teamed up to research the usage and interactions between search and online media during the IT purchase process. This research offers insights on making the right choices of keywords and online content for your online marketing plan. 
(WEBCAST)

FAQ: Gain Business Advantages through Operational Analytics: Empowering Near Realtime Decision Making by IBM

July 2013 - (Free Research)
In this Q and A, Dr. Barry Devlin, Founder, 9sight Consulting, will discuss the business value and technological foundations of operational analytics. He'll also explore how to bridge the business need for operational analytics with technology capabilities, as well as the business drivers for immediate decision making and action taking. 
(TRANSCRIPT) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts