Capture Articles On WorldWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Capture Articles On World returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   Virtualization
 •   Enterprise Information Integration/ Metadata Management
 •   Social Networks and Community Management
 •   Data Security
 •   Data Mining
 •   Statistical Data Analysis
 •   Customer Information Management/ Customer Databases
 •   Enterprise Data Protection and Privacy
 •   Product Data Management/ Product Information Management

Related Searches
 •   Capture Articles Architecture
 •   Capture Articles On Businesses
 •   Capture Articles On Demos
 •   Capture Articles On Layer
 •   Capture Articles On Manufacturing
 •   Capture Articles Specialists
 •   Capture Articles Suite
 •   Capture Whitepaper
 •   Schemas Capture Articles
 •   Statement Capture Articles
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Cloud Computing for the Enterprise-- Part 1: Capturing the Cloud by IBM

September 21, 2010 - (Free Research)
Read this article from IBM to discover the details behind the definition: cloud computing is an all-inclusive solution in which all computing resources (hardware, software, networking, storage, and so on) are provided rapidly to users as demand dictates. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Best practices for I&O for cloud-readiness by ComputerWeekly.com

January 14, 2013 - (Free Research)
Gartner analysts explain how Infrastructure and Operations (I&O) teams can best prepare for the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 11, 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Cloud computing for the enterprise: Part 1: Capturing the cloud by IBM

May 18, 2011 - (Free Research)
This article discusses cloud computing in general, then dissects the layers of the cloud, presents the different cloud types, along with their benefits and drawbacks, and explains why this movement is important for enterprise developers. 
(WHITE PAPER) READ ABSTRACT |

Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies by Sun Microsystems, Inc.

April 16, 2009 - (Free Research)
Social technologies, commonly called Web 2.0, were originally used to describe consumer technologies that enable groups to organize and share information and media. But enterprises quickly caught on to the value of these easy-to-use tools for capturing and sharing ad hoc information that may otherwise not be documented. 
(WHITE PAPER) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 2 by Dell, Inc.

February 10, 2012 - (Free Research)
The second edition of BI Trends & Strategies, an e-zine offering advice on business intelligence (BI), analytics and data warehousing, explores whether or not it's the end of enterprise data warehouses as we know them, how to manage multiple business intelligence (BI) tools at once and the potential uses of data virtualization tools. 
(EZINE) READ ABSTRACT |

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 31, 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 01, 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

Capturing the ICT Dividend by ComputerWeekly.com

December 01, 2011 - (Free Research)
This report from Oxford Economics and AT&T shows ICT investment and productivity growth are closely linked - and European countries are lagging behind other parts of the world in both areas. 
(ANALYST REPORT) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 4 by SearchBusinessAnalytics

April 11, 2012 - (Free Research)
This edition of BI Trends & Strategies features a lead article by SearchCIO.com's Linda Tucci, who offers a helping hand in the quest to dismantle the dreaded data silo. The second piece outlines mobile BI, including a reference to Apple's iPad, and the final article delves into the world of performance management. 
(EZINE)

Harvard Business Review Article: Mastering the Management System by SAP America, Inc.

September 01, 2011 - (Free Research)
In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system, which comprises five stages. 
(WHITE PAPER) READ ABSTRACT |

Learning Computing: Why object orientated programming works. by ComputerWeekly.com

January 05, 2012 - (Free Research)
Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey. 
(JOURNAL ARTICLE) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 18, 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Sleeping Android: the danger of dormant permissions by ComputerWeekly.com

March 04, 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse. 
(ESSENTIAL GUIDE) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Assure High Performance: Optimizing Web Applications in a Web 2.0 World by Gomez

September 2009 - (Free Research)
Faced with rising customer expectations and increasing competitive pressures, Website managers are applying new technologies. In this paper, Gomez will address why traditional “Web page” monitoring is insufficient, how new demands on client-side computing change the performance game, and what the return of the browser wars means for your business. 
(WHITE PAPER) READ ABSTRACT |

Automation in ALM: The Changing World of Test, Thanks to Automation by Hewlett-Packard Company

February 2012 - (Free Research)
Read this e-book to discover a series of expert articles covering: six tips for selecting automated test tools for Agile development; when it's appropriate to automate testing and best practices for implementation; the important role of automated UI testing in exploratory testing; and how automation is changing the role of the software tester. 
(EBOOK)

Leaders and Laggards in the Digital Economy by ComputerWeekly.com

March 2012 - (Free Research)
The digitisation index from Booz & Co reveals the business leaders and laggards in the digital technology and explains why it is vital to embrace it. 
(IT BRIEFING) READ ABSTRACT |

Network Forensics in a 10G World by WildPackets, Inc.

August 2013 - (Free Research)
This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world. 
(WHITE PAPER) READ ABSTRACT |

Outperforming in a data-rich, hyper-connected world by IBM

August 2012 - (Free Research)
This paper outlines the results of a survey conducted amongst more than 1,100 executives across nine industries in 64 countries on their ability to capture data, share insights and take actions based on what they learn. Read this now to discover how other companies are harnessing and handling their data and learn how you can follow a similar path. 
(WHITE PAPER) READ ABSTRACT |

The Evolving Role of the Business Analyst by IBM

June 2008 - (Free Research)
With the advent of Service-Oriented Architecture (SOA), the business analyst now has to think about issues such as IT services and how to define business logic as rules for easier and faster change cycles. Thus, a new position called the business rules analyst has emerged. This article will examine the role of this new star in the business world. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Capturing opportunity: Cleantech business booms by ComputerWeekly.com

May 2012 - (Free Research)
Cleantech is emerging as a suitable alternative source of energy or a means of reducing  consumption of expensive resources, this report from Grant Thornton reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Book: Reaping the business benefits of big-data analytics: real-world strategies and examples by ParAccel

November 2011 - (Free Research)
Read this e-book to gain insight on deriving business value from investments in big-data analytics, and learn how other organizations are harnessing big data for analytical purposes. 
(EBOOK)

JDSU with Infobright: Ensuring the Highest Quality of Service to World’s Largest Communication Service ProvidersRelease 12.1 by Infobright, Inc.

October 2011 - (Free Research)
Chuck Gruber, Principal Architect, JDSU and Graham Toppin, Vice President of Engineering, Infobright led an information-packed webinar to on how JDSU is leveraging Infobright's analytic database to troubleshoot the largest networks in the world. If you missed it, read this presentation transcript to get caught up. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly Special Report on VDI by ComputerWeekly.com

April 2014 - (Free Research)
Brian Madden, the fiercely independent thought leader in the world of virtualisation and mobility management. Brian is responsible for both "The VDI Delusion" and "Desktops as a Service" books – considered to be the most reliable sources of information on battling today's technology pain points bring you this special report. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts