T Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
T Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17

Tape makes a comeback (but was it ever gone?) by  Iron Mountain

December 14, 2011 - Despite the rumors, tape remains a viable economic part of the data storage hierarchy due to its lower cost per GB, decreased operating expenses and reduced energy costs. Check out this SearchStorage.com E-Guide to hear storage guru Rich Castagna’s take on tape and what role it can play in your data center today.


Tape Robotics Today by  Iron Mountain

August 30, 2012 - In this recording, Ben Woo, managing director of storage consultancy at Neuralytix, discusses recent developments in the area of tape library robotics.


Tape storage systems continue to evolve with long-term data archiving functionality by  Quantum Corporation

March 03, 2011 - In this tutorial, learn about the latest developments on tape storage systems, LTO-5 and LTFS, the differences between backup software vs. archiving software, and and how tape is evolving into a long-term data archiving medium.


Tape Storage Systems Continue to Evolve with Long-Term Data Archiving Functionality by  Spectra Logic Corporation

May 17, 2012 - This tutorial will cover the latest developments in tape storage systems and review the major differences between backup software vs. archiving software. The benefits of tape storage systems, including long-term data archiving will also be discussed.


Tape Storage Upgrade Guide: Modernize Your Storage Infrastructure with the Latest Tape Solutions by  Oracle Corporation

June 05, 2014 - This informative guide explains the new usage cases for tape storage in the data center. It explains the circumstances that have led to a need for new tape storage technologies and then goes on to explain the benefits of one  suite of solutions.


Tape Systems Technologies Handbook by  SearchDataBackup.com

February 05, 2014 - Tape media, drive and library technology advances with increasing capacity and innovations aimed at making data more accessible. This handbook offers information on tape systems, including tape media and libraries, LTFS, tape vaulting and using tape for long-term archiving.


Tape Vaulting: What You Need to Know About Tape Backup and Archiving by  Iron Mountain

March 05, 2012 - Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.


Tape Vaulting: What You Need to Know About Tape Backup and Archiving by  Spectra Logic Corporation

May 03, 2012 - Check out this FAQ guide to stay up on the current state of tape backup technology.


Tape vs. Archive for Long-term Data Retention by  Iron Mountain

October 06, 2011 - While there is still some talk predicting the death of tape, the reality is quite the opposite. More significant than tape’s survival in the backup environment is its emergence as the preferred medium in archiving and large-file processing. Check out this presentation to learn more about tape and why it isn't going anywhere anytime soon.


Tape's New Niche: Long-Term Data Retention by  Iron Mountain

March 13, 2013 - This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.


Tape's New Niche: Long-Term Data Retention by  Iron Mountain

March 13, 2013 - This E-Guide includes expert insight from Rich Castagna and Jon Toigo regarding tape's still-relevant role in the data center and how tape can be key for disaster recovery.


Tapping Cloud-Based ERP Solutions to Capture Global Business Opportunities by  NetSuite

July 31, 2013 - This resource examines the challenges of launching international operations, and describes what you should look for when selecting a global financial reporting and consolidation tool. Also inside, discover whether cloud-based ERP is the right move for you.


Targetbase Enhances its Client Services with Oracle Exadata by  Oracle Corporation

August 08, 2011 - Learn how Targetbase choose Oracle Exadata to deliver their real-time data warehousing.


Targeted attacks and how to defend against them by  ComputerWeekly.com

August 16, 2013 - Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.


Targeted attacks: Preparation and Mitigation by  SearchSecurity.com

May 17, 2013 - This expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.


Targeted Cyber Attacks by  GFI Software

March 18, 2008 - Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.


TCO Comparison: Dell PowerEdge R815 vs. Two HP ProLiant DL380 G7s by  Dell, Inc. and AMD

August 01, 2010 - The Dell PowerEdge R815 server with AMD Opteron processors Model 6174 can provide an estimated lower total cost of ownership (TCO) over 3 years than two HP ProLiant DL380 G7 servers each with Intel Xeon Processor X5670s. Read this test report to learn more.


TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox by  Global Knowledge

July 01, 2006 - Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.


TDWI Best Practices Report - Customer Analytics in the Age of Social Media by  IBM

December 31, 2012 - This TDWI Best Practices Report examines organizations' current practices and future plans for customer analytics technology strategies, with a special focus on how organizations are adapting to challenges- and potential- of social media.


TDWI Checklist Report: Cost Justification for Metadata Management by  ASG Software Solutions

September 07, 2010 - This TDWI Checklist Report explains how to provide justification for time and money invested in metadata management solutions. The report points out a few ways to quantify metadata’s contribution to IT projects and business initiatives.


TDWI Checklist Report: Data Requirements for Advanced Analytics by  SAS

April 07, 2010 - This checklist lists and explains data requirements that are unique to advanced analytics. This report focuses on the data requirements of advanced analytics so organizations may become better equipped to populate a data warehouse or analytic database with data and data models that ensure the success of advanced analytic applications.


Team Forge by  CollabNet

July 07, 2011 - CollabNet TeamForge can enable you to accelerate software delivery, from idea to code, build and test, to application release. Download now to start experiencing these benfits today.


Team strategies for choosing finance software by  TechTarget

February 19, 2014 - Finance software touches every department and function; it's the pulse of the entire organization. Selecting the right software to automate its application processes can mean huge savings in time and money, and it can boost revenue. Take this short survey and gain insight into this valuable e-guide on ensuring you choose the right software.


Teamstudio Build Manager by  Teamstudio, Inc.

August 01, 2006 - Teamstudio has developed Build Manager, a flexible and sophisticated build tool that helps automate your application build process, providing you with error-free builds, internal control and audit compliance.


Teamstudio Usage Monitor by  Teamstudio, Inc.

August 01, 2006 - A Domino Application Usage Audit pinpoints issues with your application inventories, empowering you with the information you need to confidently select and remove all unused applications.


Tearing Down the Fortress to Better Protect the Enterprise by  BlueCoat

October 01, 2008 - Check out this webcast and learn about the 5 key layers of malware defense that can provide multi-layered protection for your company.


TEB Ensures Real-Time Visibility of Banking Processes by  Hewlett-Packard Company

April 30, 2013 - "We wanted to monitor the IT infrastructure through the eyes of the business, not the IT department," said Oguz Bayrakdar, IT project manager for TEB, a large Turkish bank. In this case study, discover how TSB implemented business service management (BSM) and application performance management (APM) software to achieve that goal.


TEC Product Spotlight: IBM Cognos by  IBM

December 31, 2013 - View this resource for a product analysis of IBM Cognos and SPSS predictive analytics technology, and explore the BI and analytics capabilities of these tools. Explore the benefits and use cases for these technologies, and decide if your organization could benefit from Cognos or SPSS solutions.


Tech Brief (FAQ): Windows Server 2012 Recycle Bin by  Dell Software

November 04, 2013 - Among the functionality upgrades in Windows Server 2012 are improvements to Active Directory's Recycle Bin. While this addresses many previous problems, it's not the solution to all AD recovery concerns. Read the White Paper


Tech Brief SmartStack for Business Critical Apps with VMware and Nimble Storage by  Nimble Storage

August 31, 2013 - This short solution brief showcases pre-validated reference architectures for VDI, private cloud, and data protection designed to deliver the ideal platform for supporting your business critical applications on VMware.


Tech Guide: Building and Optimizing Private Clouds by  Dell, Inc. and Intel®

July 27, 2012 - This Tech Guide from SearchNetworking.com explores the ins and outs of building and optimizing the private clouds.  In three articles, learn about application performance, top challenges you may encounter, and an overview of cloud computing architecture.


Tech Guide: Desktop Virtualization and the Network by  Dell, Inc.

February 23, 2012 - Discover the impact desktop virtualization and virtual desktop infrastructure have on your network.


Tech Talk: Dennis Martin on SSD technology by  Dell, Inc.

December 17, 2013 - In this storage decisions TechTalk, Dennis Martin, founder and president of Demartek Labs, discusses the best ways to use solid-state storage in an environment.


Tech Talk: Dennis Martin on SSD technology by  Dell, Inc.

November 18, 2013 - In this video, Demartek's Dennis Martin discusses the most recent developments in solid-state storage with Rich Castagna, editorial director of TechTarget's storage media group.


Tech Tips: VMware Horizon Mirage by  VMware, Inc.

July 29, 2013 - Access this resource to learn all about VMware Horizon Mirage, a comprehensive image management solution that enables you to deliver updates to individual IT-managed layers seamlessly and simplify backup and desktop disaster recovery. Also, discover nine essential tips that can ensure deployment success.


Tech Tips: VMware Horizon View by  VMware, Inc.

December 31, 2013 - This guide explores some essential tips for VMware Horizon View, a tool that tackles these challenges through virtualization of end-user desktops.


Tech Tips: VMware Horizon View by  VMware, Inc.

July 29, 2013 - This resource discusses how VMware Horizon View (formerly VMware View) can help IT pros address top mobility pain points. Discover how this tool enables you to easily virtualize end-user desktops so you can cut operational costs, boost security and meet mobile computing demands.


Tech Tips: VMware vCenter Site Recovery Manager by  Dell and VMware

April 04, 2013 - This critical resource introduces ten valuable tips for creating a disaster recovery plan with a VMware tool that provides disaster protection for all of your applications.


Techfocus SQL Server 2008 Migration: Evaluate the Value of a SQL Server Upgrade by  SHI International Corporation

November 23, 2009 - SQL Server 2008 has many compelling features, but not all of them are necessary. See what's a good fit for your enterprise and what can wait.


TechFocus: Windows 7 Migration - Why a Windows 7 Upgrade Is Worth It by  Dell and Microsoft

December 02, 2010 - Microsoft Windows 7 addresses user frustrations, but satisfied users are just one benefit of migrating to the new operating system. This expert guide will discuss key features that can make a Windows 7 migration worth the investment.


TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks by  SearchSecurity.com

August 06, 2013 - Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.


TechGuide: Applying Virtualization Networking in the Cloud by  Dell, Inc.

March 28, 2012 - This Tech Guide from SearchNetworking.com explores emerging network virtualization protocols and strategies, and uncovers the need for software-defined networking in cloud environments.


TechGuide: Endpoint Security Management by  SearchSecurity.com

September 11, 2013 - This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months.


TechInsights Report: What Smart Businesses Know About DevOps by  CA Technologies.

September 30, 2013 - In this white paper, explore the wide range of technologies and processes that are used to implement DevOps, from a study of 1,300 senior IT decision-makers worldwide. You'll learn how successful organizations are investing in tools, measuring results, and overcoming common obstacles to DevOps processes.


TechNet Webcast: Lync for Mobile Devices (Level 200) by  Microsoft

May 07, 2012 - This webcast explores the many productivity-boosting features found in the Microsoft Lync 2010 mobile clients. optimized for mobile connectivity, this will help your mobile workers communicate more easily than ever before, even while on the go.


Technical Brief: Next-Generation Wireless Backhaul Solutions by  Brocade

January 28, 2010 - Many services, such as mobile Internet and mobile TV, require high bandwidth, and current backhaul infrastructures are not optimized to handle this traffic. Advanced routers and switches from Brocade enable highly scalable designs for the eventual convergence of voice and data infrastructure that can deliver new multimedia services.


Technical Brief: Top Ten Reasons to Choose Nimble Storage for Business-Critical Applications on VMware by  Nimble Storage

December 10, 2013 - Would you like to maximize storage utilization and efficiency to control costs?If so, take a look at this 1 page white paper to learn about the various benefits of implementing this storage system for business-critical applications with VMware.


Technical case study Steria and Veeam - three years later by  Veeam Software

April 15, 2014 - This case study highlights the partnership of Steria and Veeam. Together, they built a data center that could keep up with demands and manage big data in a complex, multitenant VMware vSphere environment.


Technical Comparison of On-line Vs. Line-interactive UPS Designs by  APC by Schneider Electric

January 01, 2004 - This paper describes the advantages and disadvantages of each topology and addresses some common misconceptions about real-world application requirements.


Technical Computing Benefits with IBM FlashSystem by  IBM

April 30, 2013 - This white paper explains why high performance computing (HPC) systems generate and consume massive amounts of data that are hungry for high storage performance, and explores the technical computing benefits offered from a major vendor's comprehensive flash portfolio.


Technical Considerations for Selecting the Best Antimalware Technology by  Hexis Cyber Solutions Inc

June 02, 2014 - This informative e-guide discusses the evolution of malware and how today's antimalware products should handle detection and remediation.


Technical diagrams of SharePoint 2010 Architecture by  Microsoft Corporation India Pvt Ltd

November 12, 2009 - This article contains a number of technical diagrams describing Microsoft SharePoint Server 2010 features, upgrade considerations, and benefits. Many of these resources are visual representations of recommended solutions. They include poster-sized documents available in formats including Microsoft Office Visio 2007 files, PDF files, and XPS files.


Technical Evolution to Deliver Business Value by  IBM

October 31, 2013 - This in-depth resource explores flash adoption rates, how IT organizations are implementing flash, and where flash can be valuable to your organization.


Technical Guide on Application Security by  SearchSecurity.com

December 31, 2012 - This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.


Technical Guide on Collaboration Threat Vectors by  Websense, Inc.

October 31, 2011 - Techtarget's Security Media Group presents a comprehensive guide to securing collaboration technologies. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype.


Technical Guide on Emerging Threats by  SearchSecurity.com

February 16, 2011 - It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.


Technical Guide on Government Security by  SearchSecurity.com

May 23, 2011 - Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.


Technical Guide on Malware Trends by  SearchSecurity.com

October 24, 2011 - TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.


Technical Guide on Mobile Security by  SearchSecurity.com

November 01, 2011 - Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.


Technical Guide on SIM by  SearchSecurity.com

August 16, 2011 - Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.


Technical Guide on SIM: Moving beyond network security toward protecting applications by  SearchSecurity.com

December 20, 2011 - SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.


Technical guide on Web Security Gateways by  SearchSecurity.com

April 28, 2011 - Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.


Technical Guide on Windows Security by  SearchSecurity.com

November 04, 2011 - SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.


Technical Guide: Using a Comprehensive Virtualization Solution to Maintain Business Continuity by  Citrix

January 07, 2010 - This white paper explores the challenges of maintaining "business as usual" during major disasters and disruptions to distill the requirements of an ideal solution for disaster recovery and business and workforce continuity through virtualization.


Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention by  McAfee, Inc.

November 04, 2011 - While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.  


Technical Overview: Flash-Optimized Hybrid Storage from the Ground Up by  Nimble Storage

February 28, 2014 - In this product brief, you'll learn how Nimble Storage customers run more workloads with less storage infrastructure, protect more data, and streamline data management so they can focus on higher-value projects.


Technical Report: Microsoft® SQL Server® Database Protection Using EqualLogic Auto-Snapshot Manager / Microsoft Edition by  Dell, Inc.

May 02, 2011 - This Technical Report describes using EqualLogic Auto-Snapshot Manager / Microsoft Edition to perform online Smart Copy protection and recovery for SQL Server


Technical Report: VDI Reference Architecture with Cisco, Citrix, and Nimble Storage by  Nimble Storage

May 31, 2013 - This informative whitepaper describes the reference architecture for a VDI storage solution that can support up to 1500 pooled virtual desktops, helping you more easily manage a compact storage infrastructure that is easy to manage and powerful enough to support VDI workloads.


Technical Report: VDI Reference Architecture with Cisco, VMware, and Nimble Storage by  Nimble Storage

May 31, 2013 - Learn how to deploy 1,000 virtual desktops using VMware View 5.1 with VMware vSphere 5, Cisco UCS, and a single 3U Nimble Storage array.


Technical Requirements for Mobile Health Care Deployments by  Juniper Networks, Inc.

May 09, 2011 - With the rapid adoption of mobile devices, it’s only natural that these devices have made their way into health care facilities. However, it’s crucial that mobile devices are protected from security vulnerabilities to ensure compliance with federal regulations. This e-guide discusses best practices for mobile health care deployments.


Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007 by  FalconStor Software

October 28, 2009 - This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time.


Technology & Business from Sun and AMD by  Sun Microsystems, Inc.

July 20, 2009 - Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...


Technology advances, trends prompt ECM systems maturation by  TechTarget

February 19, 2014 - Technology trends like mobile devices, cloud computing and remote workforces have brought new demands to the arena of enterprise content management. Therefore, achieving a completely unified ECM is a difficult task. However, take this short survey and learn expert tips and tricks and to be on your way!


Technology Assessment Vendor Viewpoint: Teradici Corporation by  Teradici Corporation

January 01, 2007 - This white paper gives a IT administrators a new approach to computer deployment management and PC functionality.


Technology Audit: Imperva SecureSphere Data Security Suite by  Imperva

June 02, 2010 - Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.


Technology Availability & Disaster Recovery Spoken in the Language of Business by  SunGard Availability Services

October 24, 2013 - This upcoming webcast presentation will help you learn key details about the state of DR in today's business landscape, as well as five processes that will help you make sure your DR plan has you prepared for whatever comes.


Technology Brief: An Introduction to Video in the Enterprise by  Fluke Networks

October 20, 2010 - To help you get ready for video, Fluke Networks developed a four-page technology primer “An Introduction to Video in the Enterprise” that covers key market drivers, the four major types of video, and illustrates how streaming applications works. 


Technology Considerations for Managing Storage Area Network (SAN) Configurations by  IBM

June 30, 2011 - IBM Tivoli Storage Productivity Center's capabilities focus on storage configuration management and provide analysis of current storage utilization and best practice recommendations to provide the storage administrator with analytical input that will provide significant assistance.


Technology Evaluation Centers - Product Analysis Report: IBM Cognos and SPSS Solutions by  IBM

April 15, 2014 - The following white paper explores the importance of business intelligence and predictive analytics within the decision management infrastructure. Also uncover a solution to consider, user success stories, and more.


Technology Focus Drives and Supports Rapid Growth at Applied Engineering by  Bowen & Groves

May 19, 2008 - A contact led Applied Engineering to M1 by B & G™ software, an application that provides total integration and automation from quoting through invoicing, specifically for manufacturing environments.


Technology Implications of IFRS adoption for U.S. Companies: More than a technical accounting change by  Deloitte

July 28, 2009 - In this publication, we explore the technology implications associated with IFRS conversion and discuss: Evaluating the potential technology impact; how companies can prepare technology and systems changes related to IFRS adoption; Major differences between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS and much more.


Technology industry at the cross-roads: Transforming quote-to-cash operations by  ComputerWeekly.com

March 06, 2013 - This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.


Technology industry at the cross-roads: Transforming quote-to-cash operations by  ComputerWeekly.com

March 05, 2013 - This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.


Technology Industry Survey 2012 by  ComputerWeekly.com

October 21, 2011 - This exclusive research reveals what IT professionals really think about technology, their employers, and their careers.


Technology Industry Survey 2013 by  ComputerWeekly.com

October 19, 2012 - From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.


Technology Industry Survey 2014 by  ComputerWeekly.com

November 11, 2013 - From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.


Technology Industry Survey2012 by  ComputerWeekly.com

October 21, 2011 - Whether it is an inappropriate ‘tweet’, an internetsecurity scandal or a story of the fastest growingcompany in the world, technology, be it for theright or wrong reasons, has become regular frontpagenews.This survey aims to give a snapshot of thetechnology industry from the inside.


Technology Primer: Transparent Application Delivery Networks by  BlueCoat

January 10, 2008 - Some things you want to see, some you don't. Critical application traffic is something you want to see. WAN optimization solutions shouldn't blind your network management, visibility or security.


Technology Profile: Cloud Building - Requirements for Private Clouds (Instrumentation and the Private Cloud) by  Virtual Instruments

February 13, 2012 - Check out this white paper for best practices and requirements when establishing a private cloud. Learn about the importance of efficiency, scalability and real-time awareness of your cloud environment, and discover what tools and technologies are currently available to ensure your private cloud is running smoothly and effectively.


Technology to Help Your Physicians with the Transition to ICD-10 by  Nuance

February 28, 2013 - This brief resource highlights a solution that, unlike retrospective coding based programs, offers a concurrent review process that allows physicians to accurately capture compliant documentation, complexity levels and severity levels in documentation from the moment the patient enters the system.


Technology Trends and the Business of HR by  Oracle Corporation

February 29, 2012 - In the following white paper, Gretchen Alarcon talks about the evolution of Oracle Fusion HCM, and the underlying technology trends that contributed to the development of Oracle Fusion Applications.


Technology value matrix : ERP by  ComputerWeekly.com

November 30, 2012 - Analyst group Nucleus Research looks at the latest trends in enterprise resource planning (ERP) and discusses the best performing suppliers.


Technology value matrix: Human Resources solutions by  ComputerWeekly.com

October 19, 2012 - Recent developments in programming languages and platforms made HR solutions more user friendly and easier to deploy and manage, says analyst Nucleus Research.


Technology, Innovation and Change by  ComputerWeekly.com

August 02, 2013 - IT leaders identify the technologies most likely to impact on their organisations approach to change and innovation in this study by Theron LLP and Computer Weekly.


Technology, innovation and change: the IT department's view by  ComputerWeekly.com

November 25, 2013 - This exclusive report, based on a survey of UK IT professionals, assesses how CIOs and IT departments are adapting to the challenges of innovation.


TechTalk Podcast: Analyst Jon Toigo discusses tape media today by  Iron Mountain

January 24, 2013 - In this exclusive podcast, expert Jon Toigo provides a glimpse into the tape landscape, analyzing its changing role in the data center and what's in store for the future. Hear about options and best practices for tape encryption as well as steps you can take to optimize the performance of this media.


TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today by  Iron Mountain

February 11, 2013 - In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.


TechTalk Video: Analyst Jon Toigo discusses tape media today by  Iron Mountain

January 23, 2013 - In this exclusive video, expert Jon Toigo analyzes tape's changing role in the data center and discusses the likely future of this technology. Watch this video now to learn various options and best practices for tape encryption, and discover steps you can take to optimize the performance of this media.


TechTalk: Stop Malware at the Web Gateway by  BlueCoat

March 24, 2009 - Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.


TechTarget ANZ Data Reduction E-Book by  IBM

July 30, 2010 - Few organisations are willing to pay more for storage every year. Data reduction can get you off the treadmill by reducing the amount of data you need to store, backup and manage, and this e-book explains compression, data de-duplication, archiving and several other techniques to achieve this outcome.


TechTarget ANZ PC lifecycle management E-Book by  Numara Software

August 04, 2010 - This e-book explores the five key elements of PC Lifecycle management, a practise that can help you to greatly reduce the ongoing costs of operating your PC fleet.


TechTarget ANZ Securing Virtualised Data Centres E-Book by  Trend Micro

August 04, 2010 - Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them.


TechTarget ANZ's guide to a cost-effective and reliable data centre by  APC by Schneider Electric

September 22, 2010 - Virtualisation is known for reducing rack footprint and improving disaster recovery in the data centre. But it can also reduce power and cooling costs, so long as you consider the physical design of your data centre, as this e-book explains.


TechTarget ANZ’s guide to upgrading your PBX by  VExpress

October 25, 2010 - Read this guide and discover how a new PBX could trim your telephony costs and boost productivity.


TechWiseTV: Switching Secrets for MultiMedia by  Cisco Systems, Inc.

October 28, 2009 - We're adding new dimensions to the globe today as we discover switching secrets for multimedia. This episode of Cisco TechWiseTV looks at Cisco's StackWise technology, the Cisco Catalyst 6500 Series Virtual Switch System (VSS), overlooked security technologies, and how to build out your network to support high-end, full services video.


Telco 2015: Five telling years, four future scenarios by  IBM

December 03, 2010 - The telecommunications industry was already in a redefining shift in consumer preferences, business models and infrastructure development prior to the  economic crisis. Faced with challenges in declining revenues, a maturing mobile industry and increased competition from new entrants, the industry finds itself in dire need of new models for growth.


Telecom Carrier Offers First-of-its-Kind Cloud Security Solution by  Cisco Systems, Inc.

July 11, 2012 - This case study demonstrates how one telecom provider developed an intelligent visual data analysis engine that allowed them to identify voice and data threats in real time. This provided them with a holistic view of their network environment while bolstering overall data security by securing the voice network.


Telecom network vision: New service needs drive change to telecom data center architecture by  Alcatel-Lucent

September 21, 2011 - This expert E-Guide takes a look at the big changes in telecom network management and what you can do to prepare for and adjust to changes in the traditional telecom data center architecture.


Telecom Switches Emphasis: Preliminary Analysis of the 2007 Telecom Executive Survey by  IBM Line of Business

June 01, 2008 - To remain competitive as industry boundaries blur, telecom providers recognize the need for new business models and other capabilities beyond their traditional strengths, learn more by downloading this IBM white paper.


Telecom Switches Emphasis: Preliminary Analysis of the 2007 Telecom Industry Survey by  IBM

May 01, 2008 - As revenues from traditional telecom services decline, the continual erosion of technology barriers to adjacent industries offers the prospect of new markets for telecom providers.


Telecommunications: Future Services and Business Models by  Comarch Telecommunications

June 01, 2008 - With the onset of converged communications that integrate voice, video, text and data, Telecommunication Service providers needs have exploded. This paper examines the many challenges providers and operators face, as well as potential solutions.


Telephone Reliability for Alarm Notification: Where Have All the Landlines Gone? by  Sensaphone

June 01, 2008 - This paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.


Telstra Reaps Transformation Rewards by  Alcatel-Lucent

August 16, 2010 - The business benefits of the IP transformation are numerous. First of all, as you reduce the number of actual networks, you save on software licensing costs, air conditioning and power. Less people are also required because rather than operating many silo networks in standalone mode you now have a common network.


TELUS leverages HP ArcSight and TippingPoint by  Hewlett-Packard Company

September 30, 2013 - This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.


TELUS leverages HP ArcSight and TippingPoint - Managed security service provider builds intelligentanalysis on tightly integrated HP solution by  Hewlett-Packard Limited

September 01, 2013 - This resource explains the reasoning behind MSSPs and how they help prevent cybercrime.


TEM for IP Readiness by  AnchorPoint

August 01, 2008 - AnchorPoint TEM solutions provide a business process foundation for companies to systematically prioritize, address and assess their telecom spend - and apply the technologies and services that will yield the highest ROI.


Ten Answers Regarding Mobile App Testing by  IBM

March 10, 2014 - In this collaborative white paper, experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.


Ten Common Reasons For VM Restore Failure by  Dell Software

May 14, 2014 - In this expert e-guide, learn ten common causes of VM restore failures such as corrupt backup and why these problems occur as well as potential ways to amend them.


Ten Cooling Solutions to Support High-Density Server Deployment by  APC by Schneider Electric

May 01, 2012 - Access this white paper to discover ten cooling solutions to support high-density server deployment. Read on to learn how your organization can increase cooling efficiency and more.


Ten Cooling Solutions to Support High-Density Server Deployment by  APC by Schneider Electric

October 01, 2010 - High-density servers offer a significant performance per watt benefit. But, depending on the deployment, they can present a cooling challenge. This paper provides ten approaches for increasing cooling efficiency, cooling capacity and power density.


Ten Cooling Solutions to Support High-density Server Deployment by  Schneider Electric

July 13, 2012 - Access this white paper to discover ten cooling solutions to support high-density server deployment. These strategic approaches can help you increase cooling efficiency, cooling capacity and power density.


Ten Errors to Avoid When Commissioning a Data Center by  APC by Schneider Electric

February 03, 2009 - This paper outlines the ten most common errors that prevent successful execution of the commissioning process.


Ten Factors To Consider For Business Grade WLANS by  Avaya

December 05, 2011 - Access this whitepaper for a list of 10 key factors to consider when creating a business grade WLAN.


Ten IT Skills on the Brink of Extinction by  Global Knowledge

March 21, 2014 - This brief resource talks about the top 10 IT skills that are going to become irrelevant soon. It also highlights what's going to come next in terms of advancing technologies.


Ten Key Steps to Effective Succession Planning by  Halogen Software

August 20, 2008 - Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.


Ten Mistakes to Avoid by  SAS

April 16, 2014 - Access the following white paper to uncover the top 10 mistakes most organizations make when launching a data governance program. Learn about the common pain points, how to avoid them, and much more.


Ten Signs That You Need a New Server by  Dell, Inc. and Microsoft

December 30, 2009 - If you're a small or medium business owner with more than one computer, it's time to consider investing in a server. A server will keep your data secure and organized and will help you run your business more efficiently and professionally. If you've reached one of the 10 thresholds in this paper, a server could do your business a world of good.


Ten Signs That You Need a Server by  Dell, Inc. and Intel®

December 30, 2009 - If you'e a small or medium business owner with more than one computer, it's time to consider investing in a server. A server will keep your data secure and organized and will help you run your business more efficiently and professionally. If you've reached one of the 10 thresholds in this article, a server could do your business a world of good.


Ten Smart Things to Know about Storage by  NetApp

December 31, 2012 - This brief white paper outlines the top ten smart things to know about storage and how it could affect your business.


Ten Smart Things to Know About Storage by  NetApp

December 31, 2012 - This white paper details the top ten smart things to know about storage and how you can leverage this information to improve your business operations.


Ten Smart Things to Know About Storage by  Sirius Computer Solutions

August 30, 2013 - Check out this informative paper to explore ten crucial things to know about today's storage and how it can affect your business. Read on to explore topics such as storage scaling, thin provisioning, backup and deduplication and much more.


Ten Steps to an Enterprise Mobility Strategy by  iPass Inc.

January 27, 2012 - Ensure traveling employees are productive while you control costs and security, with an enterprise mobility strategy.


Ten Steps to Better Requirements Management by  IBM

October 01, 2008 - Requirements definition and management is an activity that has the potential to deliver a high, fast ROI. This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. Read on to learn how better requirements translate into easier, higher quality projects.


Ten Steps to Better Requirements Management White Paper by  IBM

October 01, 2008 - This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management.


Ten Steps to Increasing Data Center Efficiency and Availability through Infrastructure Monitoring by  Emerson Network Power

November 16, 2011 - This white paper details 10 solutions to take your data center from reactive to proactive.


Ten Steps to Protecting Your Sensitive Data by  McAfee.

December 17, 2010 - Data loss prevention has become a major focus for companies of all sizes. One reasonis for this is mobile employees carry an increasingly large collection of sensitive data. How can you protect your organization's sensitive data from loss or theft? Read these ten steps.


Ten Things to Avoid in a Data Model by  CA ERwin from CA Technologies

August 01, 2010 - The construction of a data model is one of the more difficult tasks of software engineering and is often pivotal to the success or failure of a project. Many factors determine the effectiveness of a data model. In this white paper, industry expert Michael Blaha covers the Top 10 pitfalls to avoid — from both the strategy and detail perspective.


Ten Things to Avoid in a Data Model by  CA ERwin from CA Technologies

April 20, 2011 - The construction of a data model is one of the more difficult tasks of software engineering and is often pivotal to the success or failure of a project. Many factors determine the effectiveness of a data model. In this white paper, industry expert Michael Blaha covers the Top 10 pitfalls to avoid - from both the strategy and detail perspective.


Ten Things You Need to Know about Virtualization by  DataCore Software Corporation

November 19, 2009 - Thinking of making the move to “total enterprise virtualization?" Here are some interesting points of view about virtualization you should know coming from the vantage point of a storage virtualization pioneer, DataCore Software.


Ten Tips for Change Data Capture (CDC): How to Maximize Data Integration Value in Analytic and Operational Systems by  HiT Software, Inc.

October 04, 2010 - This paper will describe how Change Data Capture (CDC), a specialized function of data integration, can optimize value in both analytical and operational systems within a data-driven environment. Continue reading this paper to learn more about these ten tips for CDC and learn how to maximize data integration value in analytic operational systems.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts