Web-Based StudyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Web-Based Study returned the following results.
RSS What is RSS?
Related Categories

 •   Web-Based Training and eLearning
 •   Network Security
 •   Data Security
 •   Computer-Based Training
 •   Application Security
 •   Security Monitoring
 •   Wireless Security
 •   Application Management and Maintenance
 •   Security Policies
 •   Intrusion Prevention Solutions

Related Searches
 •   Content Web-Based Study
 •   Designing Web-Based
 •   Monitor Web-Based
 •   Printable Web-Based
 •   Specialist Web-Based
 •   Web-Based Manager
 •   Web-Based Questions
 •   Web-Based Study Crm
 •   Web-Based Study Practices
 •   Web-Based Study Proposals
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye by FireEye

December 31, 2013 - (Free Research)
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system. 
(WHITE PAPER) READ ABSTRACT |

IDC ROI Paper: Determining the Return on Investment of Web Application Acceleration Managed Services by Akamai Technologies

April 02, 2009 - (Free Research)
To assess and quantify the business benefits of Akamai's Web Application Accelerator (WAA), IDC conducted in-depth interviews with IT staff members of eight organizations using WAA. This paper presents the results of that study. 
(ANALYST REPORT) READ ABSTRACT |

Hosting for the Next Billion Users: Hostway handles growth with Intel® Xeon® processor 5600 and 7500 series by Intel

March 28, 2011 - (Free Research)
Read this case study to learn how Intel® server technologies and Intel® Xeon® processors 5600 and 7500 series helped global leader in application hosting and infrastructure, Hostway, get ahead of rising demand and thrive in a dynamic market segment. 
(CASE STUDY) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Online Training Case Study by SyberWorks, Inc.

December 2008 - (Free Research)
The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license. 
(CASE STUDY) READ ABSTRACT |

2006 Global Information Security Workforce Study by ISC2

October 2006 - (Free Research)
Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required. 
(WHITE PAPER) READ ABSTRACT |

SecureAnywhere Web Security service by Webroot

May 2013 - (Free Research)
This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users. 
(CASE STUDY) READ ABSTRACT |

The Total Economic Impact of Microsoft Exchange 2010 by HP & Intel®

November 2009 - (Free Research)
This study illustrates the financial impact of deploying Microsoft Exchange 2010 for a retail and distribution organization of 1,500 employees and $450 million in annual revenue. 
(ANALYST REPORT) READ ABSTRACT |

SocialText Case Study: Boston College by Socialtext

February 2008 - (Free Research)
Boston College evaluated various options for increasing communication and collaboration in the classroom, including staying with Facebook, but in October 2006 ultimately decided to use the Socialtext hosted service for wikis. 
(CASE STUDY) READ ABSTRACT |

Virtualization - Aligning IT Supply With Business Demand by Arrow ECS HP Group and Intel

October 2005 - (Free Research)
Virtualization allows you to dynamically allocate and manage resources in a utility-like way. It helps you break down the rigid IT structures that inhibit business agility. Virtualization also helps you increase utilization of valuable computing resources. 
(WHITE PAPER) READ ABSTRACT |

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats by Webroot

September 2009 - (Free Research)
This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats. 
(WHITE PAPER) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by SonicWALL

February 2011 - (Free Research)
This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

Intuit QuickBase: Increase Visibility with Web-based Project Management by Intuit QuickBase

Web-based QuickBase from Intuit offers a refreshingly powerful, flexible and affordable solution for busy teams to better manage projects, information and processes. With QuickBase, you can get and keep everyone -- team members, clients, vendors, freelancers -- on the same page with better visibility and accountability for everyone. 
(ASP)

crystalreports.com: Web-Based Reporting & Information Sharing by Business Objects

crystalreports.com is a web-based report-sharing service that allows organizations to instantly share crucial business information with the right people - simply and securely. There is nothing to install, and places no additional workload on IT. It improves decision makers’ ability to make key business decisions based on timely and accurate data. 
(SOFTWARE PRODUCT)

Weighing the pros and cons of a web-based EHR system by VMware, Inc.

December 2012 - (Free Research)
This e-guide from SearchHealthIT.com highlights many of the pros and cons of a web-based EHR system. Additionally, get a break-down of health care application delivery options, and learn what methods would align with your business model. 
(EGUIDE) READ ABSTRACT |

WebFOCUS Business Intelligence Application Development & Deployment by Information Builders Inc. (E-mail this company)

WebFOCUS development and deployment solutions provide easy-to-use Web-based applications for unlimited numbers of users, tailored to their skill level and preferences regardless of location, as well as flexible and intuitive development tools for building applications. 
(SOFTWARE PRODUCT)

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

Evolving IT security threats: Inside Web-based, social engineering attacks by Websense, Inc.

September 2011 - (Free Research)
In order to adequately defend IT infrastructure, organizations must have a solid understanding of the various attack methods that are effective today. This expert e-guide takes an in-depth look into the latest IT security threats and provides strategic recommendations on how to deal with them. 
(EGUIDE) READ ABSTRACT |

Distributed Caching: Why It Matters For Predictable Scalability on the Web, and Where It’s Proving Its Value by Oracle Corporation

December 2010 - (Free Research)
This paper explains why it’s imperative for any Web-based organization to learn about the distributed caching technology and Oracle Coherence Data Grid technology to combat the increasing demand on the database. 
(WHITE PAPER) READ ABSTRACT |

Top 5 Considerations for Choosing a Next-Generation Firewall: SonicWALL vs. Palo Alto Networks and Fortinet by SonicWALL

March 2011 - (Free Research)
Thanks to Web 2.0 and an explosion of Web-based applications, nearly two-thirds of today's traffic is HTTP and HTTPS. Collaboration, increased productivity and improved insights into customers and prospects are all key benefits of Web 2.0.  But with these benefits come new security threats as well as dramatic increases in network bandwidth consumed 
(WHITE PAPER) READ ABSTRACT |

5 Steps to Get Your Team on the Same Page - An Introduction To QuickBase by Intuit QuickBase

July 2005 - (Free Research)
In 30 minutes, we'll introduce you to QuickBase, the leading, hosted workgroup application platform. 
(WEBCAST) READ ABSTRACT |

Multi-Modal Learning by SkillSoft Corporation

Multi-Modal Learning™, from SkillSoft Corporation, represents a powerful new web-based solution that significantly enhances learning and day-to-day productivity for business professionals in their use of core desktop software technologies. 
(SOFTWARE PRODUCT)

Increase Your Company IQ with Web-Based Reporting by Business Objects

August 2007 - (Free Research)
Intranets and portals are too complex for everyone in your company to adopt - not to mention the costs to build and maintain them. This webcast explains how to store your critical business information in one location, share confidential information with the right people, and empower business users with the ability to access the data they need. 
(WEBCAST) READ ABSTRACT |

Three Best Practices for Today's Profitable Contact Centers: Three Best Practices for Contributing to the Bottom Line by Avaya Inc.

July 2008 - (Free Research)
This white paper provides the three best practices for today's profitable contact centers. 
(WHITE PAPER) READ ABSTRACT |

2011 Second Annual Ponemon Cost of Cybercrime Study by ArcSight, an HP Company

August 2011 - (Free Research)
This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organization determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts