Applied Expert SystemsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Applied Expert Systems returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Enterprise Information Integration/ Metadata Management
 •   Data Mining
 •   Data Security
 •   Enterprise Content Management (ECM)
 •   Enterprise Data Protection and Privacy
 •   Statistical Data Analysis
 •   Application Lifecycle Management(ALM)
 •   Business Process Management (BPM)
 •   Security Policies

Related Searches
 •   Applied Analyst
 •   Applied Consultancy
 •   Applied Databases
 •   Applied Expert Colorado
 •   Designing Applied
 •   Implement Applied Expert
 •   Multi Applied
 •   Sample Applied Expert
 •   Small Applied
 •   Starting Applied Expert Systems
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

IBM Smarter Analytics: The Dawn of Big Data by IBM

December 05, 2013 - (Free Research)
Consult this white paper to uncover how to successfully use big data to your advantage. Discover how to apply expert techniques to help quell the complexities associated with big data and get started on the path to better analytics. 
(WHITE PAPER) READ ABSTRACT |

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation by Intel

October 13, 2010 - (Free Research)
This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks. 
(WEBCAST) READ ABSTRACT |

Tip Guide: Straightforward Analytics by SAP America, Inc.

November 02, 2011 - (Free Research)
In this Tip Guide, industry expert David Loshin will provide straightforward steps for a firm foundation to successfully apply analytic results within your organization. 
(EGUIDE) READ ABSTRACT |

How Flash-Based Storage Can Be Used Effectively and Efficiently by Dell, Inc.

March 04, 2014 - (Free Research)
In this e-guide gain advice from experts on how to successfully apply flash-storage to an existing storage infrastructure for optimal efficiency by, for example, combining storage architectures. 
(EGUIDE) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 1 by SearchBusinessAnalytics

January 27, 2012 - (Free Research)
The inaugural issue of BI Trends & Strategies offers sound advice to help you in ensuring your organization is on track to keep up with the rapidly changing landscape of BI and analytics. In this issue, readers will learn about a big data definition and the impact it will have on BI and data warehousing, agile development methodology and more. 
(EZINE)

Expert advice on dynamic case management best practices by IBM

May 25, 2011 - (Free Research)
This mini-eBook describes exactly how dynamic case management (DCM) can benefit financial services firms and offers expert advice on both the best practices to apply and pitfalls to avoid in DCM adoption. 
(EBOOK)

Defense in Depth: Improve Your Threat and Vulnerability Management Programs by Tenable Network Security (E-mail this company)

October 07, 2013 - (Free Research)
SearchSecurity.com experts, Diana Kelley and Matthew Pascucci bring to you in this e-guide, five simple tips to improve your enterprise's threat and vulnerability programs and layered security, explaining how to apply defense-in-depth principles toward ultra-redundant networks. 
(EGUIDE) READ ABSTRACT |

Expert Tips for Choosing PaaS Vendors for your Enterprise by IBM

May 06, 2014 - (Free Research)
This expert e-guide highlights a new breed of private PaaS tools, which are aimed not at providing all the apps needed in operating systems and middleware, but rather at providing a form of "operationsware." Inside, learn tips to make PaaS a part of your organization's cloud strategy. 
(EGUIDE) READ ABSTRACT |

Big Data Applied:Six Use Case Scenarios for 2014 by IBM

December 16, 2013 - (Free Research)
Access this extensive, expert e-book to uncover the 6 best use cases of big data for 2014. Discover what makes these use cases successful and how you can capitalize on the same basic efforts. 
(EBOOK) READ ABSTRACT |

ALM Process: Why Poor Integration Among Tools Hurts Team Productivity by IBM

October 30, 2013 - (Free Research)
Integrating business systems isn't a new idea, but teams have never fully applied seamless integration to development tools. In this expert Tip Guide, learn tips from expert Kevin Parker on how to best utilize integration to help team productivity. 
(EGUIDE) READ ABSTRACT |

BPM Quarterly eZine: BPM in the cloud: Reaping rewards, avoiding pitfalls by IBM

December 08, 2011 - (Free Research)
Experts say that a growing number of organizations use cloud computing to support their business process management (BPM) initiatives—and with good reason, considering the potential benefits. But the cloud comes with challenges that smart companies can address using the expert advice in this issue of ebizQ.com's BPM Quarterly. 
(EZINE)

eGuide: Applying business rules for more effective advanced case management by IBM

November 07, 2011 - (Free Research)
Read this expert e-guide to learn what business needs are driving the adoption of both business rules and case management technologies, how business rules technology is being put to use in case management and other areas, how to prepare for and implement rules in case management, and where business rules and case management trends are heading. 
(EGUIDE) READ ABSTRACT |

eGuide HR Metrics Key to Strategic Planning by Workday

May 22, 2013 - (Free Research)
In this expert e-guide, human resources (HR) leaders will learn how to more effectively apply HR analytics by improving the ways they find, interpret, and use data. Read on now to get started. 
(EGUIDE) READ ABSTRACT |

Best Practices to Increase the Agility of Your Finance Department by Workday

April 25, 2012 - (Free Research)
Read this expert e-book to learn how new technologies and best practices are being used to help finance departments increase their agility and respond to ever-changing business environments. 
(EBOOK) READ ABSTRACT |

How Big Data Benefits Enterprise Information Security Posture by EMC Corporation

June 25, 2013 - (Free Research)
In this expert guide from SearchSecurity.com, industry experts at the RSA Conference 2013 explain how big data benefits enterprise information security posture and how your organization can take security big data to the next level. 
(EGUIDE) READ ABSTRACT |

Integrated Infrastructure: Simplify Operations, Speed Deployments and Reduce Costs by VCE (E-mail this company)

April 11, 2013 - (Free Research)
In this video, leading experts George Weise of Gartner and Praveen Akkiraju of VCE take a look at what integrated infrastructure systems really are, and reveal how you can apply those systems and reap their benefits in your own organization. 
(WEBCAST) READ ABSTRACT |

Solution Spotlight: A Guide to Agile Testing for QA and Test Managers by IBM

December 06, 2012 - (Free Research)
In this expert e-guide, Lisa Crispin, co-author of the book Agile Testing explains why a testing taxonomy such as the Agile testing quadrants can be a highly effective tool to help with these uncertainties. Read on to learn how the quadrants work and how they can be applied in your organization. 
(EGUIDE) READ ABSTRACT |

Next-generation capabilities of enterprise application-aware firewalls by SonicWALL

March 07, 2011 - (Free Research)
The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats. 
(EGUIDE) READ ABSTRACT |

Dedupe: From Niche Tech to Storage Ace by NetApp

June 27, 2012 - (Free Research)
Everybody talks about dedupe today, but 10 years from now, everybody’s just going to expect it to be in storage devices. This expert E-Guide outlines the benefits of different dedupe methods and offers some insight on how these methods apply to specific environments. 
(EGUIDE) READ ABSTRACT |

E-Book: Creating an Enterprise Content Management (ECM) strategy: Tips and techniques for developing or updating your ECM plan by Perceptive Software

August 30, 2010 - (Free Research)
This E-book from an ECM expert offers advice on how organizations can apply ECM technology and techniques as well as insight into issues such as how programs can be funded and organized successfully. Learn some of the leading best practices that can help ensure that your organization’s ECM strategy effectively supports your overall business goals. 
(EBOOK)

Tip Guide: ‘Big data’ analytics projects easier said than done – but doable by Sybase, an SAP company

February 29, 2012 - (Free Research)
Read this exceptional expert tip guide and learn best practices to help you better understand the market and also glean insight on how to gain value and competitive advantages from applying big data analytics. 
(EGUIDE) READ ABSTRACT |

Tip Guide: 'Big data' poses big challenges for traditional analytics approaches by Sybase, an SAP company

February 29, 2012 - (Free Research)
This expert tip guide from SearchBusinessAnalytics.com is an excellent starting point toward learning about big data analytics and its benefits. It touches on topics such as ill-equipped traditional business intelligence (BI) and data warehousing systems, data processing, Hadoop and more. 
(EGUIDE) READ ABSTRACT |

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects by Intermec

March 04, 2009 - (Free Research)
This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers. 
(WHITE PAPER) READ ABSTRACT |

On the Safe Side: Managing Security in Mobile Apps by TechTarget

February 19, 2014 - (Free Research)
Software development projects aren't always on top of the security management list, but when it comes to enterprise mobility applications, there's no question about its precedence. Take this survey to gain access to an e-book that highlights 7 tips to protect enterprise data and how to avoid the perpetual cycle of insecurity. 
(RESOURCE)

Enforcing Endpoint Security: Creating a Network Security Policy by SearchSecurity.com

June 21, 2012 - (Free Research)
As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints. Access this e-guide to explore how to create a network endpoint security policy as well as best practices for enforcing them. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts