Algorithms NetworkingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Algorithms Networking returned the following results.
RSS What is RSS?
Related Categories

 •   Code Algorithms
 •   Text and Code Editing
 •   Source Code Control
 •   Databases
 •   Data Center Management
 •   Data Security
 •   Application Management and Maintenance
 •   Embedded Application Development
 •   Database Administration
 •   Testing and Analysis

Related Searches
 •   Algorithms Networking Alaska
 •   Algorithms Networking Arkansas
 •   Algorithms Networking Attendance
 •   Algorithms Networking Construction
 •   Algorithms Reporting
 •   Algorithms Script
 •   Business Algorithms Networking
 •   Concerns Algorithms Networking
 •   Mapping Algorithms
 •   Portals Algorithms Networking
Advertisement

ALL RESULTS
1 - 25 of 497 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Enhancing Website Security with Algorithm Agility by Symantec Corporation

February 21, 2013 - (Free Research)
Read this whitepaper to learn more about algorithm agility, its role in today's security landscape, and how it is helping businesses enhance online security through a more flexible, scalable approach to SSL certification. 
(WHITE PAPER) READ ABSTRACT |

Implementing Breakthrough Technology for Clinical Development Modeling and Simulation by Univa UD

April 2008 - (Free Research)
When GlaxoSmithKline was challenged with improving efficiency in modeling and simulation, their clinical development research team turned to Univa technology for faster methods of establishing and running models for a drug’s effects on the body. 
(CASE STUDY) READ ABSTRACT |

8 Simple Rules for Designing Threaded Applications by Intel Software Network

November 2007 - (Free Research)
This article gives 8 Simple Rules that you can add to your palette of threading design methods. By following these rules you will have more success in writing the best and most efficient threaded implementation of your applications. 
(WHITE PAPER)

UPS functioning modes: a new algorithm for unprecedented efficiency by Emerson Network Power

December 2011 - (Free Research)
Explore this resource to learn about a UPS system that can differentiate between different types of electrical disturbances and respond using the most efficient and effective mode to compensate for each disturbance. Read on now to learn more about this new technology and how you can ensure business continuity and protect your valuable hardware. 
(WHITE PAPER) READ ABSTRACT |

The TERA1100 Portal Processor by Teradici Corporation

The TERA1100 Portal Processor enables centralized computing to span an enterprise network from the datacenter to the desktop by implementing advanced display compression algorithms and I/O bridging to guarantee a high performance user experience. 
(HARDWARE PRODUCT)

HP Dynamic Deduplication - achieving a 50:1 ratio by Hewlett-Packard Company

March 2009 - (Free Research)
In 2008, HP introduced two products to the HP StorageWorks D2D Backup System Family. Both feature Dynamic deduplication based on an HP-patented algorithm that packs up to 50 times more backup data into the same disk footprint. This paper explains how Dynamic deduplication works and also establishes how a 50:1 deduplication ratio may be achieved. 
(WHITE PAPER) READ ABSTRACT |

Improving Tools and Techniques to Combat Malware Evolution by Webroot

October 2012 - (Free Research)
Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes. 
(WHITE PAPER) READ ABSTRACT |

Improve App Delivery with an HTML Rewrite by F5 Networks

December 2012 - (Free Research)
This E-Guide from SearchNetworking.com describes why many web content optimization startups are rewriting HTML and how your organization can benefit from these results. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

Liebert Monitoring by Liebert Corporation

The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD.... 
(HARDWARE PRODUCT)

Elliptic curve cryptography in transport ticketing by ComputerWeekly.com

May 2014 - (Free Research)
This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Protecting against modern password cracking by ComputerWeekly.com

April 2013 - (Free Research)
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Rapid Architectural Consolidation Engine - The Enterprise Solution for Disparate Data Models by Innovative Routines International, Inc.

March 2008 - (Free Research)
RapidACE is a software platform that enables data architects to integrate disparate data models automatically. It delivers high speed, automated data model consolidation. 
(WHITE PAPER) READ ABSTRACT |

Addressing Common Contact Center and Enterprise Business Issues with Speech Analytics by Verint Systems

April 2008 - (Free Research)
As a solution to contact center issues, this paper suggests Speech analytics, which gives organizations the ability tap into existing recorded customer interactions to gain actionable intelligence for improving business performance. 
(WHITE PAPER) READ ABSTRACT |

Advances in Data Warehouse Performance by IBM

August 2008 - (Free Research)
Learn how DB2 can help you meet the demands of business intelligence by reducing query response time from hours to seconds, supporting real time data warehousing, and optimizing your storage while lowering operating costs. 
(WHITE PAPER) READ ABSTRACT |

Enabling Developer Access to Production Data by Voltage Security, Inc.

December 2008 - (Free Research)
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise. 
(WHITE PAPER) READ ABSTRACT |

Open Source Master Data Management - The Time is Right by Talend

March 2010 - (Free Research)
Proper master data management (MDM) is very valuable when available to enterprise business processes and analytics. However, master data projects are often challenging, architecturally complex, time intensive and expensive. This paper explains why the time is right for open source MDM, and predicts the effects of open source on the MDM marketplace. 
(WHITE PAPER) READ ABSTRACT |

Embedded SSD Flash Management by sTec | HGST

January 2013 - (Free Research)
This white paper will explore NAND flash technology and its inherent problems, and explain how proper flash management algorithms can address these issues and transform NAND flash into a reliable media with a long lifespan. 
(WHITE PAPER) READ ABSTRACT |

Top Considerations for Implementing Secure Backup and Recovery by Zmanda Inc.

July 2008 - (Free Research)
Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data. 
(WHITE PAPER) READ ABSTRACT |

EMC Data Domain Boost for Symantec NetBackup and NetBackup Storage Unit Group Failover by EMC Backup and Recovery Solutions

June 2010 - (Free Research)
This white paper explores how to leverage Storage Unit Group failover to achieve N+1 redundancy when using EMC Data Domain Boost software with Symantec NetBackup OpenStorage. 
(WHITE PAPER) READ ABSTRACT |

IBM ISS Global Data Center content analysis technology for the Web and e-mail by IBM

November 2008 - (Free Research)
The IBM content analysis process, part of the IBM ISS Global Data Center, is built on a platform that classifies millions of web pages and e-mails every day. Access this white paper for a detailed look at how this technology will effectively protect users from unwanted content. 
(WHITE PAPER) READ ABSTRACT |

Reversing the Requirement for Storage Growth -- IBM Consolidates and Simplifies Tier-2 Storage by IBM

April 2009 - (Free Research)
With the acquisition of Diligent Corporation, IBM has put itself in the rather unique position as the only vendor that can offer to the enterprise a complete backup/recovery solution with servers, disk, tape, software, and data deduplication technology, all rolled into one. 
(WHITE PAPER) READ ABSTRACT |

The future of digital forensics by ComputerWeekly.com

April 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Toad for Oracle 10.5 by Dell Software

July 2010 - (Free Research)
Toad for Oracle v10.5 adds new features and enhances many existing ones. These changes are designed to save you time, increase accuracy and give you better visibility of your work environment - whether you’re a developer working in an unfamiliar database or maintaining legacy code, or a DBA trying to manage multiple databases. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 497 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts