White Papers What ArticlesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Papers What Articles returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Data Center Management
 •   Business Process Management (BPM)
 •   Disaster Recovery
 •   Virtualization
 •   Data and Application Distribution
 •   Application Servers
 •   Enterprise Systems Management

Related Searches
 •   Batch White
 •   Call White Papers What
 •   Practices White
 •   Risks White
 •   Samples White Papers What
 •   Time White Papers What
 •   White Papers Graph
 •   White Papers What Concerns
 •   White Papers What Documents
 •   White Papers What Strategy
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Legal Issues of Cloud Forensics by Global Knowledge

April 11, 2013 - (Free Research)
This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud. 
(WHITE PAPER) READ ABSTRACT |

Global Threat Trends: October 2010 by ESET

November 10, 2010 - (Free Research)
Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more! 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Migrating to a New Service Desk Platform by Nimsoft, Inc.

July 05, 2012 - (Free Research)
This white paper offers guidelines and best practices for IT organizations that are in the midst of, or are planning a migration to a new service desk platform. Within, learn how you can effortlessly migrate your tickets, workflow, knowledge articles, and more. 
(WHITE PAPER) READ ABSTRACT |

How To Migrate Your Data In Seven Steps by SAS

March 16, 2009 - (Free Research)
Historically, data migration projects have had a tendency to fail. According to Bloor Research, as many as 60 percent do not succeed. How can you prevent failure when migrating your data? Follow this seven-step process, then download the SAS white paper at the end of this article to learn more. 
(ANALYST REPORT) READ ABSTRACT |

Webcast: BDIG Overview by IBM

September 11, 2013 - (Free Research)
Subscribe today for exclusive access to the latest video content, articles, updates, and white papers from your industry experts and have the opportunity to speak with an IBM representative. Welcome to the community. 
(WEBCAST) READ ABSTRACT |

Tenzing Resource Center by Tenzing Managed IT Services

June 29, 2010 - (Free Research)
Welcome to Tenzing's new Managed Hosting Resource Center. Tenzing's resource center provides information such as news articles, white papers, and webinar broadcasts concerning managed hosting services from in-house and third-party sources that can help you make the right hosting choices for your organization. 
(RESOURCE CENTER) READ ABSTRACT |

Data Mart Consolidation by Hexaware Technologies

September 12, 2011 - (Free Research)
This white paper explores how Data Mart consolidation is an effective tool for saving money when dealing with large volumes of data. 
(WHITE PAPER) READ ABSTRACT |

Upgrading to Windows Vista: Is Your Hardware Ready? Are You? by Global Knowledge Network, Inc.

January 2008 - (Free Research)
Windows Vista is here. This white paper will help you help you determine if your hardware is compatible and which version you should implement. 
(WHITE PAPER) READ ABSTRACT |

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle by iTKO LISA

October 2010 - (Free Research)
This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Information Governance & Compliance by RSD

October 2011 - (Free Research)
Access this exclusive newsletter on best practices and tips of information governance with articles from leaders in enterprise technology. 
(NEWSLETTER) READ ABSTRACT |

Cloud Computing - What is its Potential Value for Your Company? by Google

February 2009 - (Free Research)
This paper examines whether cloud computing makes good business sense for your company. Ultimately, you may find that moving your data to the cloud actually improves security, scalability, access, and disaster recovery. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing - What is its Potential Value for Your Company? by Google Apps

January 2011 - (Free Research)
Content provided by Google. This paper examines whether cloud computing makes good business sense for your company. Ultimately, you may find that moving your data to the cloud actually improves security, scalability, access, and disaster recovery. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

6 Questions to Ask About Your Data Storage-Emily Wojcik byline for ILTA Peer to Peer Magazine by CommVault Systems, Inc.

December 2013 - (Free Research)
In this quick 1-page article, 6 questions are provided to help hash out what data is necessary to store, and what will only add clutter. Read on to discover how your organization can reduce long-term storage costs and improve records management by simply asking the right questions. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

CW Europe - November Edition by ComputerWeekly.com

November 2012 - (Free Research)
The November 2012 edition of CWEurope focuses on what should always be one of your top IT priorities: Disaster recovery. Without a plan B, you risk the continuance of your business in the event of a natural disaster, hardware malfunction, human error or digital threat. It's disaster recovery or disaster devastation - the choice is up to you. 
(EZINE) READ ABSTRACT |

More Than Nothing, a Zero Client Simplifies the Desktop by SearchVirtualDesktop.com

February 2014 - (Free Research)
In this article, you'll find a detailed examination of what zero clients are, how they work, what their primary benefits might be and where their key limitations are to be found. 
(EBOOK) READ ABSTRACT |

Lead Your Enterprise With These Game-Changing Steps by Dell, Inc. and Intel®

December 2013 - (Free Research)
Download this leadership white paper now to find your voice in the C-suite, define a new strategy and change the conversation in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Cyber Heists: What Happened, Mistakes Made, Courts' Reaction, and What You Should Do! by Global Knowledge

July 2013 - (Free Research)
Whether you are the owner or manager of a bank or financial institution, or a business owner concerned about the security of your money in that bank or financial institution, this article contains critical information for you. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Social Media to Drive Retail Sales and Enhance Customer Experience by Wipro Technologies

December 2009 - (Free Research)
Read this article for an examination of three considerations for social media: social media driving revenue, customer experience and tracking and using social media measurement tools. 
(WHITE PAPER) READ ABSTRACT |

Industrial SOA Series by Oracle Corporation

October 2013 - (Free Research)
Access this resource to read a variety of articles on service-oriented architecture (SOA), on topics ranging from SOA blueprints to SOA mobile solutions. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine

July 2010 - (Free Research)
The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more. 
(WHITE PAPER) READ ABSTRACT |

What You Need to Know about Cloud Backup: 10 FAQs Answered by Asigra

June 2013 - (Free Research)
This white paper discusses the ten most common questions that companies are asking about cloud backup. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts