Searching all of TechTarget| 51,299 results for "implementation"

implementation: Implementation is the execution of any idea, model, or method; in IT, it refers to the process of ...

See all definition search results provided by Whatis.com

SearchCompliance

Manage Jun 30, 2015

SearchAWS

By Valerie Silverthorne Evaluate May 22, 2015

Implementing AWS security best practices

AWS has improved its security features and offers a slew of resources for hardening its cloud. But admins still play a part in preventing breaches. Continue Reading

SearchSOA

By George Lawton Manage Mar 13, 2015

Best practices for implementing BRM

BRM is being leveraged by enterprises in order to enhance agility and communication. Continue Reading

SearchCloudProvider

Get Started Jun 30, 2015

How to implement a successful SaaS business model

Software as a service can yield huge profit margins, but it also requires careful planning. Get expert tips on how to develop your SaaS business model with this guide. Continue Reading

SearchManufacturingERP

By Mary E. Shacklett Evaluate Jun 17, 2015

Before implementing ERP, understand its many components

ERP systems have numerous components, functions and ways to be deployed. Expert Mary Shacklett explains the ins and outs of implementing ERP. Continue Reading

ComputerWeekly

Feb 03, 2015

How to implement risk-based security

Implement a simple process to identify, analyse and prioritise risk without significant investment in time or money Continue Reading

SearchDataCenter

By Stephen J. Bigelow ,Meredith Courtemanche Get Started Jun 01, 2015

Use cases for implementing a converged infrastructure product

An organization can dramatically upgrade its data center by taking the converged infrastructure (CI) path. Working with a CI vendor eliminates significant hassles by bundling compute, storage and networking ... Continue Reading

SearchUnifiedCommunications

By Jon Arnold Evaluate May 14, 2015

How challenging is implementing BYOD in a UC environment?

What are some challenges of implementing BYOD in a UC environment? UC expert Jon Arnold explains the three high-level challenges organizations face with BYOD. Continue Reading

SearchAWS

By George Lawton Manage Feb 27, 2015

Implementing security operations management in AWS

Developers put security second in the software development process. SecOps rolls the continuous threat testing and monitoring makes it a priority. Continue Reading

SearchSDN

By Lee Doyle Evaluate May 05, 2015

Service providers take cautious approach to NFV implementation

Service providers' strategies for NFV implementation are designed to minimize disruption while transitioning legacy architectures to a virtualized world. Continue Reading