Software  >   Systems Software  >   Programming Languages  >  

Assemblers (Software)

RSS Feed    Add to Google    Add to My Yahoo!
Assemblers (Software)Reports
 
Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
TRIAL SOFTWARE: This is a free trial download for a software backup solution from Acronis that offers an array of unique features
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Acronis

Software and Licensing Costs Report: Demanding Pricing That Matches Business Value
sponsored by Asigra
WHITE PAPER: This whitepaper describes the software pricing and licensing landscape and explains why implementing an updated software sourcing approach is critical in today's market.
Posted: 18 Apr 2014 | Published: 04 Jan 2013

Asigra

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

HR in the Cloud
sponsored by Workday
WHITE PAPER: This whitepaper examines the five big trends that are pushing adoption, examining each trend in-depth and explaining exactly why it is driving a need for SaaS.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Workday

Evaluation of Enterprise Backup and Recovery Software and Vendors
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Access this exclusive resource for a complete list of findings of an enterprise backup and recovery software and vendor evaluation conducted by Forrester Research, Inc.
Posted: 20 Mar 2014 | Premiered: 28 Jun 2013

CommVault Systems, Inc.

Solving Financial Management Pain Points: An Expert How-To
sponsored by Intacct Corporation
EGUIDE: Find out how organizations are tackling financial management pain points with a cloud-based system.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Intacct Corporation

How user experience is a business differentiator
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

The Basics of Data Deduplication Solutions
sponsored by Dell Software
EGUIDE: This guide gives the basics of deduplication and focuses on how deduplication fits in with disaster recovery strategies. It also shows the advantages of hardware and software deduplication.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell Software

Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE: This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement