White Papers Single Source ViewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Papers Single Source View returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Open Source
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Application Management and Maintenance
 •   Security Policies
 •   Business Intelligence Solutions

Related Searches
 •   Advanced White Papers
 •   Benefits White Papers
 •   Consults White Papers Single
 •   Expert White Papers Single
 •   Implementing White Papers Single
 •   Learning About White Papers
 •   White Computer
 •   White Importing
 •   White Papers B2B
 •   White Papers Single Introduction
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Single Source of Truth by SOASTA, Inc

January 07, 2014 - (Free Research)
With real user measurement (RUM), you can measure perceived load time for your users at the exact point of engagement, so you know exactly where to improve performance for better outcomes. In this white paper, get an overview of the business and technical aspects of measuring performance with RUM. 
(WHITE PAPER) READ ABSTRACT |

How One Health Ohio doubled its billing rate with GBS solution by HP & Intel®

June 19, 2012 - (Free Research)
this white paper demonstrates how One Health Ohio doubled its billing rate and achieved faster payment for services by implementing  GBS' Integrated Medical Information Solutions from HP and NextGen. 
(WHITE PAPER) READ ABSTRACT |

Secure Internet Single Sign-On (SSO) 101 by Ping Identity Corporation

June 08, 2009 - (Free Research)
Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Is an Open Source BPM Solution Right for You? by Red Hat

July 31, 2013 - (Free Research)
Consult this white paper to find out if open source BPM is right for your organization. You'll get an in-depth look at the benefits of open source software and BPM tools, and learn how using a single platform for BPM and business rules management (BRM) can benefit you. 
(WHITE PAPER) READ ABSTRACT |

Evolve SiteMinder With RadiantOne by Radiant Logic, Inc.

December 31, 2013 - (Free Research)
This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Internet Single Sign-On (SSO) by Ping Identity Corporation

June 05, 2009 - (Free Research)
This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on. 
(WHITE PAPER) READ ABSTRACT |

Strengthening Enterprise Security through Notebook Encryption by Intel Corporation

December 01, 2008 - (Free Research)
Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner. 
(WHITE PAPER)

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing by nCircle

March 02, 2009 - (Free Research)
Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Apache Hadoop: the Swiss Army Knife of IT by Global Knowledge

April 02, 2013 - (Free Research)
In this white paper, discover why Apache Hadoop is being credited with holding the key to the future of big data analytics. From its open-source cost-efficiency to its additive processes, this white paper details the versatility and power of Hadoop. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Developing and Optimizing Threaded Applications by Intel Corporation

June 06, 2007 - (Free Research)
Threading continues to be a challenge for many organizations today. This white paper presents a methodology that has been used to successfully thread many applications and discusses tools can assist in developing multi-threaded applications. 
(WHITE PAPER)

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Navigating Backup and Recovery in VMware Environments - Technical White Paper by HP

July 22, 2011 - (Free Research)
This white paper explores the problems faced by IT administrators when managing the physical and VMware virtual infrastructure, and shows how HP Data Protector simplifies backup and recovery. 
(WHITE PAPER) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 24, 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Standardize the Application Release Process by OpenMake Software

May 30, 2014 - (Free Research)
Improving the process of application packaging and deployment is a top priority for businesses working with distributed applications, such as Java. Without a centralized, standardized approach, enterprises with a large number of development teams and heterogeneous environments will continue to suffer from inefficiencies. 
(WHITE PAPER) READ ABSTRACT |

Dispelling the Vapor Around Cloud Computing: Drivers, Barriers and Considerations for Public and Private Cloud Adoption by IBM

December 03, 2010 - (Free Research)
IBM conducted a survey in June and July of 2009 of 1,090 IT and line-of-business decision makers around the world. The purpose of this white paper is to share the survey findings, and to provide the IBM point of view regarding key steps and considerations for cloud adoption. 
(WHITE PAPER)

Data Integrity and Recoverability: 4 Essential Elements by EMC Corporation

July 19, 2013 - (Free Research)
This white paper explores a disk-based backup solution with deduplication that provides the ultimate protection and assurance of recovery. 
(WHITE PAPER) READ ABSTRACT |

Law & The Data Explosion by Symantec Corporation

September 30, 2010 - (Free Research)
This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Red Hat Enterprise Linux-7: Path to the Open Hybrid Cloud by Global Knowledge

April 02, 2014 - (Free Research)
Check out this exclusive white paper to discover how Red Hat Enterprise Linux 7 can help your organization establish an open, vendor-independent, hybrid cloud. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Data Management by SAS

March 19, 2008 - (Free Research)
The key enterprise risk management (ERM) issue for many financial institutions is to get enriched data in a single place in order to report on it. Learn best practices for data management that are critical for ERM. 
(WHITE PAPER) READ ABSTRACT |

SAP System Build and Landscape Management Activities by Cisco Systems, Inc.

June 30, 2010 - (Free Research)
Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components. 
(WHITE PAPER) READ ABSTRACT |

Deploying Operating System Images on Dell Business Client Systems using Microsoft® Deployment Toolkit (MDT) 2008 by Dell, Inc. and Intel®

June 01, 2009 - (Free Research)
The Microsoft® Deployment Toolkit (MDT) 2008 provides unified processes and tools for desktop and server OS deployment using a common deployment console and a collection of best practices. The toolkit provides a single mechanism for image creation and an automated installation process to reduce deployment time. 
(WHITE PAPER) READ ABSTRACT |

Cooling Audit for Identifying Potential Cooling Problems in Data Centers by APC by Schneider Electric

February 01, 2005 - (Free Research)
Routine cooling system checks on blade server and other compact units help identify problems before they result in costly downtime. Download this checklist and learn how to assess ten common problem areas that can adversely affect server room cooling. 
(WHITE PAPER) READ ABSTRACT |

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.

April 14, 2010 - (Free Research)
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Outsourcing Software Testing to a Separate Vendor by LogiGear Corporation

January 2006 - (Free Research)
This whitepaper will explore the single-source, and the multi-source approach to application development, highlighting the advantages and disadvantages of each, and pointing out the distinct advantages that multi-sourcing has over single-sourcing. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts