White Papers Who Is BehindWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Papers Who Is Behind returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Enterprise Systems Management
 •   Disaster Recovery
 •   Data Center Management
 •   Network Security
 •   Social Networks and Community Management
 •   Data Security
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Facts White
 •   Implementing White Papers Who
 •   Importing White Papers
 •   Industries White Papers
 •   Monitor White
 •   Open White
 •   White Java
 •   White Papers Guidelines
 •   White Papers Who Problem
 •   White Webcast
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Windows 8 Product Guide for Developers by Microsoft

December 31, 2012 - (Free Research)
In this white paper, discover the essentials behind Windows 8 development. Read on for more information on the broad reach of the Windows Store, versatile input methods, cloud connection, and more. 
(WHITE PAPER) READ ABSTRACT |

API Management is the SOA Renaissance by IBM

December 31, 2013 - (Free Research)
Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 08, 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

The Rise Of The New Cloud Admin by VMware, Inc.

February 21, 2013 - (Free Research)
In this instructive white paper, Forrester explains the differences between virtualization and a true private cloud environment. Learn more about the rise of a "new cloud administrator" and how this will impact traditional IT roles and responsibilities. 
(WHITE PAPER) READ ABSTRACT |

Mass Personalization: How relevance engines are revolutionizing mass communications by xMatters, Inc.

September 08, 2010 - (Free Research)
Mass personalization eliminates the need to send the same message en masse at the same time. By reducing communication “noise,” mass personalization enables recipients to focus on what’s relevant to them at the moment that it matters. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 12, 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

Web Exploits: There’s an App for That by M86 Security

May 27, 2010 - (Free Research)
The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them. 
(WHITE PAPER) READ ABSTRACT |

ZeuS: A Persistent Criminal Enterprise by Trend Micro

March 24, 2010 - (Free Research)
This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more. 
(WHITE PAPER) READ ABSTRACT |

Effective Enterprise Java Virtualization with Oracle WebLogic Suite by Oracle Corporation

December 20, 2010 - (Free Research)
This technical white paper explores in detail the technology behind a new virtualized deployment paradigm for Java EE applications, describing not only the technology behind these advances, but also the benefits and usage. 
(WHITE PAPER) READ ABSTRACT |

The Innovation Barrier: Has Testing Fallen Behind Development? by Fanfare

February 2007 - (Free Research)
Constant product innovation has contributed to a thriving equipment-manufacturing industry, however, fewer time-saving tools are available to QA than developer groups. As a result, testing is becoming an innovation barrier. This paper examines the innovation barrier: its causes, effects, & what’s needed to restore the vigorous pace of innovation. 
(WHITE PAPER) READ ABSTRACT |

Microsoft SQL Server in a VMware Environment on Dell PowerEdge Blades and Dell EqualLogic Storage by Dell and VMware

April 2009 - (Free Research)
This white paper provides an overview for deploying SQL Server in a virtualized environment for VMware ESX 3.5 Update 4 (U4) running on the latest PowerEdge M610 and M710 blade servers and EqualLogic PS6000XV iSCSI storage arrays. 
(WHITE PAPER) READ ABSTRACT |

CRM Analytics: Making the Most of Salesforce data to increase sales efficiency by SearchCRM

April 2013 - (Free Research)
View this white paper to unlock the power behind CRM analytics. It explains how you can develop a view of the customer by analyzing social media data. Find out how to make the most of tweets and Facebook postings by reading this resource now. 
(WHITE PAPER) READ ABSTRACT |

Laying the Groundwork for Public and Private Clouds by Dell, Inc. and Intel®

January 2012 - (Free Research)
As cloud computing continues to gain ground in the enterprise, businesses must decide how to handle this IT revolution: To take the plunge now or wait and risk falling behind. Access this white paper to review the various types of cloud computing deployment models and services. 
(WHITE PAPER) READ ABSTRACT |

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Enhancing SQL Reporting Services with Double-Take by Double-Take Software

February 2008 - (Free Research)
Information stored on SQL Servers is important, so being able to protect this data at all times is extremely critical. Read this white paper to learn about solutions and strategies that can help protect and recover your critical SQL data no matter what. 
(WHITE PAPER) READ ABSTRACT |

Social analytics: Finding opportunity in chaos by IBM

May 2013 - (Free Research)
Today, all organisations are engaged in social media. Enterprises can no longer escape the need to monitor and analyse social media outlets such as Facebook, Twitter and other news outlets. Enterprise need to adjust to this change quickly or they risk falling behind. 
(WHITE PAPER) READ ABSTRACT |

The Innovation Barrier, Part 2: Symptoms, Solutions, and the Impact on Equipment Manufacturers by Fanfare

November 2007 - (Free Research)
This paper is the second in a two-part series exploring the innovation barrier – the point at which testing can no longer keep pace with development in the equipment manufacturing industry. It examines the innovation barrier’s symptoms – from slowdowns in development to mounting quality issues – and the potential impact on equipment manufacturers. 
(WHITE PAPER) READ ABSTRACT |

Seven Strategies for Identifying Who’s Behind Advanced Cyber Attacks by FireEye

December 2013 - (Free Research)
This informative guide breaks down the nature of malware attacks and what they reveal about the culprit, including their location, ties to other malware attacks, and connections to common threat factors. 
(WHITE PAPER) READ ABSTRACT |

Is Your Back Office Behind the Times? Evaluate Three Key Areas by Concur Technologies (E-mail this company)

June 2014 - (Free Research)
The following white paper provides readers with the practical knowledge on how to evaluate the 3 most common slowdown areas in the office back end. Learn what technology is available to help and more. 
(WHITE PAPER) READ ABSTRACT |

See What CDI Success Looks Like by Nuance

December 2012 - (Free Research)
This informative white paper provides a documentation management solution that helps bridge the clinical and coding gap by offering peer-to-peer instruction for your physicians, nurses, coders, and administrators. 
(WHITE PAPER) READ ABSTRACT |

Affinity Credit Union chooses HP Fortify on Demand - Cloud-based security assessment service for mobile remote deposit capture application by Hewlett-Packard Limited

November 2013 - (Free Research)
This resource shows the benefits associated with cloud-based security assessment services and how you can apply them to your business. 
(CASE STUDY) READ ABSTRACT |

IBM Social Analytics: The science behind social media marketing by IBM

December 2011 - (Free Research)
Access this white paper to learn how savvy marketing professionals are using new technologies to learn about their customers' attitudes, preferences and buying habits from what they say publically, available on social media and through the full range of interactions that can be recorded, measured, and analyzed. 
(WHITE PAPER) READ ABSTRACT |

Switching Essentials: An Introduction to Network Switching by Global Knowledge

October 2008 - (Free Research)
In this white paper, we will address the basics of this Layer 2 technology and help you get your network switch up and running. For our examples, we will use Cisco's 2950 switch. 
(WHITE PAPER) READ ABSTRACT |

Who's Got the Talent? Build an A-List Backup Team by Iron Mountain

February 2012 - (Free Research)
The key to a successful disaster recovery strategy is planning. Read this white paper to learn about the importance of being proactive about potential problems, discover how you can properly rehearse for disaster and understand the importance of knowing who's in charge of what when the time comes. Read on for more. 
(WHITE PAPER) READ ABSTRACT |

HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper by Hewlett-Packard Company

December 2008 - (Free Research)
This white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts