Who Is Behind ConsultsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Who Is Behind Consults returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Virtualization
 •   Application Management and Maintenance
 •   Enterprise Data Protection and Privacy
 •   Application Integration
 •   Embedded Application Development
 •   Treasury / Cash / Risk Management
 •   Data Center Management
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Computerized Who Is Behind
 •   Disk Who Is
 •   Small Who
 •   Who Billing
 •   Who Conversion
 •   Who Is Device
 •   Who Is Firm
 •   Who Is Licenses
 •   Who Is Parts
 •   Who Researching
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Advanced Threat Protection with Dell SecureWorks Security Services by Dell SecureWorks UK

December 31, 2013 - (Free Research)
This guide explores the varying types of advanced threats, their motives, and how you can enhance your security strategy to better detect and resist them. 
(WHITE PAPER) READ ABSTRACT |

ZeuS: A Persistent Criminal Enterprise by Trend Micro

March 24, 2010 - (Free Research)
This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more. 
(WHITE PAPER) READ ABSTRACT |

The Rise Of The New Cloud Admin by VMware, Inc.

February 21, 2013 - (Free Research)
In this instructive white paper, Forrester explains the differences between virtualization and a true private cloud environment. Learn more about the rise of a "new cloud administrator" and how this will impact traditional IT roles and responsibilities. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 08, 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

Bridge the Gaps in Your E-Commerce Strategy with Electronic Signatures from DocuSign by DocuSign, Inc.

April 2008 - (Free Research)
This special brief discusses the role of electronic signature technology in closing lingering workflow automation gaps to enhance an organization's overall e-commerce strategy. 
(WHITE PAPER) READ ABSTRACT |

Security Virtual Jam Session: The Secured Enterprise by IBM

February 2008 - (Free Research)
Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders. 
(WEBCAST)

E-Guide: Cloud Backup Solutions by Idera

February 2014 - (Free Research)
This expert e-guide takes a look at the different cloud backup options for your customers. Read on to learn the adoption motivators and triggers behind your customer's need for cloud backup, and find out what solutions align perfectly with their organization. 
(EGUIDE) READ ABSTRACT |

Windows 8 Product Guide for Developers by Microsoft

December 2012 - (Free Research)
In this white paper, discover the essentials behind Windows 8 development. Read on for more information on the broad reach of the Windows Store, versatile input methods, cloud connection, and more. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

API Management is the SOA Renaissance by IBM

December 2013 - (Free Research)
Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2 by ComputerWeekly.com

January 2013 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

Presentation Transcript: Big Data Analytics- Profiling the Use of Analytic Platforms in User Organizations.pdf by BeyeNETWORK

December 2011 - (Free Research)
In this presentation transcript, business intelligence (BI) expert Wayne Eckerson deep dives into the world of big-data analytics. He touches on the movement itself, what is behind it and offers up best practices for performing it. Eckerson also discusses big-data analytics engines and describes the framework for implementing big-data analytics. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Application Note: Structured Testing - The Path to Thorough Code Coverage by McCabe Software, Inc.

March 2011 - (Free Research)
Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing. 
(WHITE PAPER) READ ABSTRACT |

Moving HCM to the Cloud by Workday

January 2014 - (Free Research)
The days of on-premises human capital management (HCM) systems could be numbered. Access this e-guide today to take an expert look at the unstoppable trend of cloud HCM, including its benefits, risks, and costs. 
(EGUIDE) READ ABSTRACT |

Sybase IQ: The Economics of Business Reporting by Sybase, an SAP company

August 2009 - (Free Research)
Reporting is recognized as a way for companies to improve service, ensure quality, control costs, and prevent losses by empowering decision-makers throughout the organization. This paper will explain why reporting is one form of business intelligence that has become business-critical. 
(WHITE PAPER) READ ABSTRACT |

Citrix Receiver for Enterprise Apps by Citrix

March 2010 - (Free Research)
This whitepaper explains how using Oracle applications, Citrix Receiver, and a smart phone, can mobilize any type of enterprise application affordably, overcoming security, usability, and platform incompatibility concerns. 
(WHITE PAPER) READ ABSTRACT |

Boston Medical Center cuts data center power bill by 50% and saves up to $3.2 million with virtualized storage, server and desktop solutions by Dell, Inc.

June 2010 - (Free Research)
Read this case study to gain more detail into Boston Medical center's quest to lower its operational costs, why it settled on data center virtualization and the benefits it reaped, including $3.2 million in savings in equipment avoidance costs, improved security with desktop virtualization and so much more. 
(CASE STUDY) READ ABSTRACT |

IT as a driver of M&A success by ComputerWeekly.com

March 2012 - (Free Research)
IT considerations are not given adequate attention or rigour in the due diligence prior to mergers and acquisitions, this report from Ernst & Young reveals. 
(IT BRIEFING) READ ABSTRACT |

Mass Personalization: How relevance engines are revolutionizing mass communications by xMatters, Inc.

September 2010 - (Free Research)
Mass personalization eliminates the need to send the same message en masse at the same time. By reducing communication “noise,” mass personalization enables recipients to focus on what’s relevant to them at the moment that it matters. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Web Exploits: There’s an App for That by M86 Security

May 2010 - (Free Research)
The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them. 
(WHITE PAPER) READ ABSTRACT |

The Path to Payoff on Big Data Analytics by SearchBusinessAnalytics

April 2014 - (Free Research)
Before you can hope to reap the benefits of big data initiatives, it's important to strategize and plan -- the earlier, the better. 
(EBOOK) READ ABSTRACT |

ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage by AppAssure Software, Inc.

March 2009 - (Free Research)
Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low. 
(CASE STUDY) READ ABSTRACT |

CW Buyers Guide: Software as a Service by ComputerWeekly.com

February 2013 - (Free Research)
Computer Weekly looks at how a CIO can best integrate Saas with existing on-premise software, the restrictions behind Saas and why consulting expert service providers is a good idea. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Being Agile in a non agile world by Ivar Jacobson Consulting

March 2008 - (Free Research)
Learn how to effectively combine agile development techniques with traditional SDLC and other software engineering techniques. Explore the basic concepts behind agile thinking and the three perspectives associated with this process. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts