December 2007 - (Free Research) An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation.
August 2011 - (Free Research) In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.
December 2008 - (Free Research) Organizations in all industries and of all sizes are turning to business intelligence (BI) and data warehousing (DW) technologies and services to either automate or support decision-making processes.
November 2011 - (Free Research) In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.
February 2014 - (Free Research) Social recruiting success means more than just connecting through social channels. This valuable resource counts down the top five tips for optimizing social recruiting efforts and driving better results.
August 2013 - (Free Research) Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations.
April 2012 - (Free Research) This white paper gives an overview of the challenges release management presents, three tips for improving your software release strategies, and insight on how effective release management is poised to become a driver of competitive advantage.
December 2009 - (Free Research) Read this white paper to learn about the latest partitioning techniques, enhanced scalability, and extended manageability capabilities available in Oracle Database 11g Release 2.
October 2010 - (Free Research) HP Operations Infrastructure Smart Plug-ins 1.6 Evaluation, including Virtualization SPI,provides out-of-thebox functionality, in the form of pre-configured policies with rules and threshold values, for managing all aspects of a virtualized environment. Download your trial now.
May 2007 - (Free Research) Read this white paper to learn a structured way to manage requirements, and how risk-based requirements and quality management are inseparable from the larger process of managing the planning, test and release of a software system.
December 2011 - (Free Research) In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now.
August 2010 - (Free Research) Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
March 2010 - (Free Research) This report delves into the history of Attivio, which was founded in 2007 by a cadre of former FAST executives, and provides an in-depth look at their product, Active Intelligence Engine (AIE), and its new release.
August 2009 - (Free Research) Reporting is recognized as a way for companies to improve service, ensure quality, control costs, and prevent losses by empowering decision-makers throughout the organization. This paper will explain why reporting is one form of business intelligence that has become business-critical.
September 2010 - (Free Research) Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks.
March 2013 - (Free Research) View this expert e-guide to alleviate your fear of a SQL server migration. It outlines three easy ways to migrate to the latest release of SQL server and demonstrates the pros and cons of using SQL stored procedures. Consult this resource to determine if you should migrate from one method to another.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.