Who Is Behind ArticlesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Who Is Behind Articles returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Data Center Management
 •   Application Lifecycle Management(ALM)
 •   Application Security
 •   Virtualization
 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Enterprise Systems Management

Related Searches
 •   Migration Who Is
 •   Owning Who
 •   Paper Who Is
 •   Technologies Who Is
 •   Who Diagrams
 •   Who Is Behind Crm
 •   Who Is Behind Office
 •   Who Is Behind Presentation
 •   Who Is Behind Sample
 •   Who Is Size
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Advanced Threat Protection with Dell SecureWorks Security Services by Dell SecureWorks UK

December 31, 2013 - (Free Research)
This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them. 
(WHITE PAPER) READ ABSTRACT |

ZeuS: A Persistent Criminal Enterprise by Trend Micro

March 24, 2010 - (Free Research)
This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more. 
(WHITE PAPER) READ ABSTRACT |

The Rise Of The New Cloud Admin by VMware, Inc.

February 21, 2013 - (Free Research)
In this instructive white paper, Forrester explains the differences between virtualization and a true private cloud environment. Learn more about the rise of a "new cloud administrator" and how this will impact traditional IT roles and responsibilities. 
(WHITE PAPER) READ ABSTRACT |

Application Note: Structured Testing - The Path to Thorough Code Coverage by McCabe Software, Inc.

March 15, 2011 - (Free Research)
Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing for the Enterprise-- Part 1: Capturing the Cloud by IBM

September 21, 2010 - (Free Research)
Read this article from IBM to discover the details behind the definition: cloud computing is an all-inclusive solution in which all computing resources (hardware, software, networking, storage, and so on) are provided rapidly to users as demand dictates. 
(WHITE PAPER) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 1 by SearchBusinessAnalytics

January 27, 2012 - (Free Research)
The inaugural issue of BI Trends & Strategies offers sound advice to help you in ensuring your organization is on track to keep up with the rapidly changing landscape of BI and analytics. In this issue, readers will learn about a big data definition and the impact it will have on BI and data warehousing, agile development methodology and more. 
(EZINE)

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 03, 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Survey Shows that SaaS Can Save You Money by GFI Software

December 22, 2010 - (Free Research)
This article discusses the results found during a survey on RMM Software, this is the software IT Company’s/MSP’s use to run their technical operations. A large percentage of RMM software users are saying they generally believe RMM software is over-produced (over-engineered) and they either never or very slowly get round to using it. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: 10 Gb Ethernet: Evaluating When and Why to Upgrade by Dell, Inc.

February 29, 2012 - (Free Research)
In this E-Guide from SearchNetworking.com, learn more about upgrading to 10 Gigabit Ethernet, and also uncover many of the common misconceptions regarding this technology. 
(EGUIDE) READ ABSTRACT |

The future of digital forensics by ComputerWeekly.com

April 10, 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Journal of Management Excellence: Creating Value, Part II by Oracle Corporation

May 01, 2009 - (Free Research)
This collection of journal articles is focused on the concept of creating value and its importance as the key element for enterprise performance management (EPM). 
(JOURNAL ARTICLE) READ ABSTRACT |

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 09, 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

eBook: Cloud Computing for Enterprise Developers by Sun Microsystems, Inc.

August 20, 2009 - (Free Research)
If you're an enterprise developer then you're probably familiar with the term "cloud computing," but you may still have questions. In this eBook, you'll learn about the benefits of cloud computing, what it really means to compute in the cloud, some of the different cloud types, and much more! 
(EBOOK) READ ABSTRACT |

E-Book: Mobile Application Development: Making it Easier for Developers by IBM

February 09, 2011 - (Free Research)
Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. This e-book will explain what all the fuss is about. 
(EBOOK) READ ABSTRACT |

Managing the digital innovation process by ComputerWeekly.com

May 30, 2014 - (Free Research)
Rob Lambert, visiting fellow at Cranfield School of Management, offers advice to CIOs who want to drive digital innovation in this presentation. 
(PRESENTATION) READ ABSTRACT |

Customer Experience Exchange, Issue 7 by SearchCRM

November 13, 2012 - (Free Research)
This 3-article E-Zine offers analysis and advice for the CEM professional. In the featured article, Cameron Kittle reviews CEM technologies and shares the thoughts of industry observers who stress that a company should first know what it intends to do with its wired connection to customers. Continue on for this article and more. 
(EZINE) READ ABSTRACT |

E-Guide: Cloud Backup Solutions by Idera

February 06, 2014 - (Free Research)
This expert e-guide takes a look at the different cloud backup options for your customers. Read on to learn the adoption motivators and triggers behind your customer's need for cloud backup, and find out what solutions align perfectly with their organization. 
(EGUIDE) READ ABSTRACT |

Procurement Lessons Learned from the Economic Downturn (SAP Insider Article) by SAP America, Inc.

September 30, 2011 - (Free Research)
Read this paper to discover the top four tactics employed by best-in-class companies of varied sizes and industries to elevate procurement proficiencies in today's recalcitrant economy, along with the metrics they use to measure their success. 
(WHITE PAPER) READ ABSTRACT |

Windows 8 Product Guide for Developers by Microsoft

December 31, 2012 - (Free Research)
In this white paper, discover the essentials behind Windows 8 development. Read on for more information on the broad reach of the Windows Store, versatile input methods, cloud connection, and more. 
(WHITE PAPER) READ ABSTRACT |

IBM Eye: Security Detective for Hire by PowerTech

September 25, 2009 - (Free Research)
This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (Part 1) by Intel Software Network

June 2009 - (Free Research)
This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors. 
(WHITE PAPER)

An Agile Approach to "Metrics": Applied Macromeasurements to Ensure On-Time Delivery by CollabNet

January 2011 - (Free Research)
This article challenges the value of traditional metrics for managing product development schedules and presents an alternative compatible with Agile approaches such as Scrum and XP. It is written for development managers or Scrum Product Owners who want to make decisions based on empirically derived schedule forecasts instead of shots in the dark. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by Information Security Magazine

January 2009 - (Free Research)
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it. 
(EZINE)

Modern Infrastructure August 2013 by SearchDataCenter.com

August 2013 - (Free Research)
Let this expert ezine, Modern Infrastructure, brief you important issues in cloud computing and virtualization infrastructure today.  Articles cover everything from probable issues one may face while implementing a hybrid cloud to how social networking may help IT to network and reach out to a wider customer base. 
(EZINE) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts