Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Title III of the E-Government Act of 2002

RSS Feed    Add to Google    Add to My Yahoo!
Title III of the E-Government Act of 2002 Multimedia (View All Report Types)
 
Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Recognize your Apps Personalities
sponsored by Hewlett Packard Enterprise
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett Packard Enterprise

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

APM Overview
sponsored by SolarWinds, Inc.
VIDEO: Join SolarWinds’ Head Geek for a video overview of Orion Application Performance Monitor (APM) module. See how easy it is to monitor, alert, and report on your critical applications and servers with Orion APM’s agentless application monitoring. You will also learn how you can leverage the default component monitors as well as build your own.
Posted: 17 Sep 2009 | Premiered: 17 Sep 2009

SolarWinds, Inc.

What’s New with IBM Cognos Business Intelligence V10.1
sponsored by IBM
PRODUCT DEMO: See what's new in IBM Cognos Business Intelligence V10.1 that makes it possible to connect everyone in your organization with the insight, analytics and information they need to make better, faster, smarter decisions.
Posted: 07 Feb 2011 | Premiered: 07 Feb 2011

IBM

How York Risk Services Responds to Security Threats in Minutes vs. Hours or Days
sponsored by ServiceNow
WEBCAST: When responding to security vulnerabilities, lack of speed and consistency are significant issues many enterprises face. Watch this webcast case study to gain insight into how York Risk Services overcame their incident response issues by implementing an effective vulnerability response strategy.
Posted: 10 Nov 2017 | Premiered: Nov 10, 2017

ServiceNow

High Availability by Maintaining DNS Redundancy Across Multiple DNS Service Platforms
sponsored by Men and Mice
WEBCAST: View this webcast to learn the different strategies for achieving network resiliency with DNS redundancy. Then, uncover how to overcome the challenges of hosting a DNS infrastructure using multiple DNS networks or service providers.
Posted: 07 Nov 2017 | Premiered: Jul 21, 2017

Men and Mice

IT Managers Survival Guide for Moving Your Fax Infrastructure to the Cloud Webinar
sponsored by J2 Cloud Services
WEBCAST: In this webinar, listen to Michael Flavin, Senior Product Marketing Manager, j2 Cloud Services about common misconceptions about cloud computing and the 10 key questions your organization should be asking when evaluating cloud providers.
Posted: 14 Sep 2017 | Premiered: Jun 4, 2015

J2 Cloud Services

Step Up Your Security and Privacy with Data Masking
sponsored by Delphix
WEBCAST: For many organizations, the most confidential information exists in some of the least-secure environments. Learn why data masking is an effective approach to protecting sensitive environments from a variety of threats. Discover challenges and best practices for implementing data-masking tools, and more.
Posted: 07 Sep 2017 | Premiered: Aug 28, 2017

Delphix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement