Who Is ExamplesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Who Is Examples returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Virtualization
 •   Enterprise Systems Management
 •   Data Center Management
 •   Databases
 •   Enterprise Information Integration/ Metadata Management
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Data Security
 •   Business Process Management (BPM)

Related Searches
 •   Directory Who
 •   Files Who
 •   Learning About Who Is
 •   Procedure Who Is Examples
 •   Size Who
 •   Who Is Examples Costing
 •   Who Is Examples Global
 •   Who Is Examples Source
 •   Who Is Markets
 •   Who Supply
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Deploying F5 Networks BIG-IP Local Traffic Manager with WebAccelerator for Microsoft Office SharePoint Server 2007 by F5 Networks

November 2007 - (Free Research)
One approach to improving overall system performance is the use of a class of Traffic Management Device commonly referred to as a WAN Accelerator. This paper details the results of using one such solution. 
(WHITE PAPER) READ ABSTRACT |

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS) by TITUS

November 2010 - (Free Research)
This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Virtualized Storage from HP by Hewlett-Packard Company

February 2008 - (Free Research)
This paper is designed to help users who would like to understand virtualization better in order to evaluate the operational benefits it could provide. 
(WHITE PAPER) READ ABSTRACT |

Understanding Mobility Trends and Mobile Usage Among Business Users by iPass Inc. (E-mail this company)

March 2012 - (Free Research)
Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users. 
(WHITE PAPER) READ ABSTRACT |

Stories That Move Mountains: Improve your presentation skills by ComputerWeekly.com

November 2012 - (Free Research)
Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals. 
(BOOK) READ ABSTRACT |

Global Deduplication: How it Works and Who Can Benefit by Essextec

June 2013 - (Free Research)
This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: IT/Business Integration- Who’s Doing it Best by CA Technologies.

January 2010 - (Free Research)
Read this presentation transcript to gain insight from survey results and explanations as to why Quebec organizations, compared to others in Canada, display much higher satisfaction with their IT effectiveness. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Switching Essentials: An Introduction to Network Switching by Global Knowledge

October 2008 - (Free Research)
In this white paper, we will address the basics of this Layer 2 technology and help you get your network switch up and running. For our examples, we will use Cisco's 2950 switch. 
(WHITE PAPER) READ ABSTRACT |

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

Managing data and application security risks cost effectively by IBM

October 2009 - (Free Research)
This whitepaper shows how organizations can manage data and application security risks cost-effectively by using IBM Tivoli Data and Application Security to reduce costs and improve ROI. It provides examples of IBM customers who have realized the benefit. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Has Your QSA Thrown You Under a Bus? by Dell SecureWorks UK

August 2011 - (Free Research)
After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM business analytics: One solution that covers the entire analysis spectrum by IBM

November 2013 - (Free Research)
The following webcast outlines the importance of having a single seamless solution for an enterprise's business intelligence needs. Discover as way to successfully implement this kind of technology and learn how it can benefit you and your organization. 
(WEBCAST) READ ABSTRACT |

Optimizing the application testing of your Siebel CRM environment by HP and Infosys

August 2008 - (Free Research)
Infosys and HP invite you to join us for a webcast on September 10th at 3:00 EDT on the topic, Optimizing the application testing of your Siebel CRM environment with the "Siebel Business Process Testing (BPT) Accelerator," developed by Infosys and HP. 
(WEBCAST) READ ABSTRACT |

Managing Your Data Assets by Pitney Bowes Business Insight

March 2009 - (Free Research)
Are you aware your people, your customer relationships and your corporate data provide far greater value and competitive advantage than traditional assets such as stock portfolio or desktop printers? This white paper explains how executives are turning their eyes toward what could be their most valuable asset of all: information! 
(WHITE PAPER) READ ABSTRACT |

Is a Data Warehouse the Only Option for Business Intelligence? by Information Builders Inc. (E-mail this company)

October 2007 - (Free Research)
While data warehouses are important for many types of analytical systems, they aren’t always necessary. Building a data warehouse can dramatically increase the cost of a BI project. This paper describes data warehouses, along with many other options for placing relevant, timely information in the hands of business users. 
(WHITE PAPER) READ ABSTRACT |

Lync Server 2010 Solution Architectures by Dell, Inc.

June 2011 - (Free Research)
This Microsoft Lync Server 2010 solution architecture manual contains possible configurations that can be used to architect your Lync 2010 infrastructure. Samples can serve as a blueprint for organizations with similar requirements. Each organization’s requirements can differ greatly and include items not accounted for in these configurations. 
(WHITE PAPER) READ ABSTRACT |

Making Windows 7 Migration Pay Rapid and Real Business Dividends by VMware, Inc.

January 2011 - (Free Research)
Incorporating VMware View and ThinApp into the migration process for Windows 7 delivers significant benefits such as: up to 50% reduction in cost of migration, time to upgrade cut by half, ongoing operational costs as much as a 40% lower. Read on to find out more. 
(WHITE PAPER) READ ABSTRACT |

Networking Basics: What You Need to Know by Cisco Systems, Inc.

October 2008 - (Free Research)
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more. 
(WHITE PAPER) READ ABSTRACT |

Solution Spotlight: Measuring, Monitoring and Improving Customer Experience by IBM

January 2014 - (Free Research)
In this e-guide, our experts sit down with Forrester analyst Zach Hofer-Shall and other industry authorities as they explore how you can address the challenges of CEM. Also inside, find 10 tips for improving customer experiences. 
(EGUIDE) READ ABSTRACT |

Understanding Big Data: Analytics to Enterprise Class Hadoop and Streaming Data by IBM

February 2012 - (Free Research)
This comprehensive white paper delves into the world of big data technologies, such as Hadoop, and how to extend it into an enterprise-ready big data platform. It discusses everything related to big data, including common challenges and patterns that exist, and concludes with a chapter on big data analytics with real-world success stories. 
(EBOOK) READ ABSTRACT |

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change by Lumension

September 2008 - (Free Research)
Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance. 
(WHITE PAPER) READ ABSTRACT |

Smartself-service – a guide for buyers by ComputerWeekly.com

March 2013 - (Free Research)
Analysts Rob Bamforth and Clive Longbottom offer a checklist for assessing suppliers for smart-self service projects. 
(ANALYST REPORT) READ ABSTRACT |

Digital Trust in the Cloud: Liquid Security in Cloudy Places by CSC

November 2011 - (Free Research)
While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts