Article About CasesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Article About Cases returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Business Intelligence Solutions
 •   Enterprise Systems Management
 •   Enterprise Data Protection and Privacy
 •   Network Management
 •   Networks
 •   Data Center Management
 •   Virtualization
 •   Application Management and Maintenance

Related Searches
 •   Applications Of Article About Cases
 •   Article About Ecommerce
 •   Article About Intrastructures
 •   Article Computers
 •   Article Notes
 •   Definitions Article About Cases
 •   Importing Article About
 •   Imports Article About Cases
 •   Issues On Article About
 •   Wireless Article About
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Article: Design Patterns for Case Management by EMC Corporation

August 01, 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle by iTKO LISA

October 20, 2010 - (Free Research)
This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs. 
(WHITE PAPER) READ ABSTRACT |

Big Data Gets Personal by SAP America, Inc.

January 27, 2014 - (Free Research)
In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise. 
(WHITE PAPER) READ ABSTRACT |

WAN Speak Musings – Volume III by ComputerWeekly.com

November 01, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects by Intermec

March 04, 2009 - (Free Research)
This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers. 
(WHITE PAPER) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 09, 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Analytics in dynamic case management: Strategies, tactics and expert insights by IBM

December 05, 2011 - (Free Research)
This tip guide continues ebizQ.com's exploration of the role of analytics in successful case management. In this article, ebizQ contributor Alan Earls offers strategies and tactics for successfully combining dynamic case management (DCM) and analytics. 
(EGUIDE) READ ABSTRACT |

Storage Europe: March 2012 by SearchStorage.co.UK

March 19, 2012 - (Free Research)
Check out this special European edition of Storage magazine for expert analyses and forecasts about where storage is heading and how you can get ahead of the curve. 
(EZINE)

Tip Guide: Agile Problem Areas that Pain Developers and Testers by CollabNet

April 17, 2012 - (Free Research)
Read this expert article to learn about common challenges that developers and testers face when it comes to Agile methodology. Compare your Agile pain points to those of other development teams and discover the best way to overcome them. 
(EGUIDE) READ ABSTRACT |

Skills Needed in Extracting Value from Big Data Projects by HP & Intel®

January 10, 2013 - (Free Research)
While the technologies available for big data are important, it's critical to make sure you have the right people with the right skills and experience to successfully leverage big data analytics tools. Inside, take a realistic look at what to plan for and examine the key skill sets and roles that should be a part of your big data analytics plan. 
(EGUIDE) READ ABSTRACT |

Finance for IT decision makers: Making business cases by ComputerWeekly.com

January 14, 2013 - (Free Research)
This extract from Michael Blackstaff's book, Finance for IT decision makers, teaches you how to make effective business and financial cases for IT projects. 
(BOOK) READ ABSTRACT |

eGuide: Collaboration and case management: Trends, challenges and expert advice by IBM

November 11, 2011 - (Free Research)
This e-guide takes a look at the use of collaboration and social networking strategies and tools  for case management, including a big picture introduction, expert advice for avoiding headaches, and findings from ebizQ.com's recent survey of business and IT professionals who are using case management in their own companies. 
(EGUIDE) READ ABSTRACT |

Test Automation: Exploring Automation Case Studies in Agile Development by CA Technologies.

May 02, 2012 - (Free Research)
Read this article to hear from experts Dorothy Graham and Mark Fewster as they discuss the takeaways from 28 test automation case studies in agile application development. Learn how you can implement test automation in your organization quickly and easily. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 03, 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

WAN Speak Musings – Volume I by ComputerWeekly.com

May 02, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

Reaping the Benefits of Business Agility with Cloud Computing: Real-World Profiles by VMware, Inc.

August 01, 2013 - (Free Research)
Not every cloud fits every organization, but a well-employed cloud can mean serious cost reductions and significantly increased business agility. Learn how cloud computing platform implementation drives business agility in a number of real-world case studies detailed in the following article. 
(WHITE PAPER) READ ABSTRACT |

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 13, 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 18, 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? by Information Security Magazine

April 20, 2009 - (Free Research)
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology. 
(EZINE)

E-Book: The Secrets of Effective Sharepoint Deployments by Dell, Inc. and Intel®

October 02, 2013 - (Free Research)
Get insights into building a business case for Microsoft SharePoint, six best practices and more. 
(EBOOK) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 09, 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 31, 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Proving value in an age of austerity: A new normal for US government programmes by Oracle Corporation

March 31, 2013 - (Free Research)
This article will explore what agencies must do to make a compelling case for relevancy and how best‐practice organizations are managing programs under budgetary pressure. 
(ANALYST REPORT) READ ABSTRACT |

Protecting Vital Business Data from Natural Calamities by Iron Mountain

October 16, 2012 - (Free Research)
In this article, explore the case for business continuity and check out some stats proving how necessary a disaster recovery/business continuity plan is in today's treacherous physical and digital climates. Read on now to learn what to consider when making a DR/BC assessment and take the best actions to protect what's yours. 
(WHITE PAPER) READ ABSTRACT |

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 25, 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts