Case ArticleWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Case Article returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Virtualization
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Network Management
 •   Security Monitoring
 •   Business Process Management (BPM)
 •   Enterprise Systems Management

Related Searches
 •   Case Article Best
 •   Case Article Connecticut
 •   Case Article Conversions
 •   Case Article Internet
 •   Case Article Repair
 •   Case Questions
 •   Find Case Article
 •   Imports Case Article
 •   Sql Case Article
 •   Tutorials Case Article
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Article: Design Patterns for Case Management by EMC Corporation

August 01, 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

Tip Guide: Analytics in dynamic case management: Strategies, tactics and expert insights by IBM

December 05, 2011 - (Free Research)
This tip guide continues ebizQ.com's exploration of the role of analytics in successful case management. In this article, ebizQ contributor Alan Earls offers strategies and tactics for successfully combining dynamic case management (DCM) and analytics. 
(EGUIDE) READ ABSTRACT |

Finance for IT decision makers: Making business cases by ComputerWeekly.com

January 14, 2013 - (Free Research)
This extract from Michael Blackstaff's book, Finance for IT decision makers, teaches you how to make effective business and financial cases for IT projects. 
(BOOK) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 03, 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

eGuide: Collaboration and case management: Trends, challenges and expert advice by IBM

November 11, 2011 - (Free Research)
This e-guide takes a look at the use of collaboration and social networking strategies and tools  for case management, including a big picture introduction, expert advice for avoiding headaches, and findings from ebizQ.com's recent survey of business and IT professionals who are using case management in their own companies. 
(EGUIDE) READ ABSTRACT |

Test Automation: Exploring Automation Case Studies in Agile Development by CA Technologies.

May 02, 2012 - (Free Research)
Read this article to hear from experts Dorothy Graham and Mark Fewster as they discuss the takeaways from 28 test automation case studies in agile application development. Learn how you can implement test automation in your organization quickly and easily. 
(EGUIDE) READ ABSTRACT |

WAN Speak Musings – Volume I by ComputerWeekly.com

May 02, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

Reaping the Benefits of Business Agility with Cloud Computing: Real-World Profiles by VMware, Inc.

August 01, 2013 - (Free Research)
Not every cloud fits every organization, but a well-employed cloud can mean serious cost reductions and significantly increased business agility. Learn how cloud computing platform implementation drives business agility in a number of real-world case studies detailed in the following article. 
(WHITE PAPER) READ ABSTRACT |

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 13, 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 18, 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Protecting Vital Business Data from Natural Calamities by Iron Mountain

October 16, 2012 - (Free Research)
In this article, explore the case for business continuity and check out some stats proving how necessary a disaster recovery/business continuity plan is in today's treacherous physical and digital climates. Read on now to learn what to consider when making a DR/BC assessment and take the best actions to protect what's yours. 
(WHITE PAPER) READ ABSTRACT |

Watch ECi M1 Manufacturing ERP Demo by ECi Software Solutions - M1 ERP System for Manufacturers

December 08, 2010 - (Free Research)
You will also have access to M1’s ERP software brochure, an article on how to streamline your manufacturing operations with ERP software, a tax incentive brochure, as well as case studies of how ECi M1 ERP software helps manufacturing companies to reduce operational costs and become more efficient in managing their production processes. 
(VIDEOCAST) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 09, 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

E-Book: The Secrets of Effective Sharepoint Deployments by Dell, Inc. and Intel®

October 02, 2013 - (Free Research)
Get insights into building a business case for Microsoft SharePoint, six best practices and more. 
(EBOOK) READ ABSTRACT |

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle by iTKO LISA

October 20, 2010 - (Free Research)
This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs. 
(WHITE PAPER) READ ABSTRACT |

Big Data Gets Personal by SAP America, Inc.

January 27, 2014 - (Free Research)
In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise. 
(WHITE PAPER) READ ABSTRACT |

CPO Rising 2011 -- The State of Spend Analysis by SAP America, Inc.

September 30, 2011 - (Free Research)
Companies that can move high percentages of their spend into managed scenarios will reap much larger returns. This article discusses the importance of visibility in bringing more spend under management, and the types of outcomes one can expect from a strong spend analysis program. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing by Government Agencies: Meeting Business and Security Challenges in the Cloud by IBM

August 17, 2010 - (Free Research)
This article briefly describes the procurement challenges and then jumps into advising government cloud service purchasers on the positives and negatives of security in the cloud, and how to manage their potential vendors' security risks. Read on to learn more. 
(TECHNICAL ARTICLE)

WAN Speak Musings – Volume III by ComputerWeekly.com

November 01, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

WAN Speak Musings – Volume II by ComputerWeekly.com

July 01, 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects by Intermec

March 04, 2009 - (Free Research)
This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers. 
(WHITE PAPER) READ ABSTRACT |

Skills Needed in Extracting Value from Big Data Projects by HP & Intel®

January 10, 2013 - (Free Research)
While the technologies available for big data are important, it's critical to make sure you have the right people with the right skills and experience to successfully leverage big data analytics tools. Inside, take a realistic look at what to plan for and examine the key skill sets and roles that should be a part of your big data analytics plan. 
(EGUIDE) READ ABSTRACT |

Storage Europe: March 2012 by SearchStorage.co.UK

March 19, 2012 - (Free Research)
Check out this special European edition of Storage magazine for expert analyses and forecasts about where storage is heading and how you can get ahead of the curve. 
(EZINE)

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments by CollabNet

April 18, 2012 - (Free Research)
Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex. 
(EGUIDE) READ ABSTRACT |

Tip Guide: Agile Problem Areas that Pain Developers and Testers by CollabNet

April 17, 2012 - (Free Research)
Read this expert article to learn about common challenges that developers and testers face when it comes to Agile methodology. Compare your Agile pain points to those of other development teams and discover the best way to overcome them. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts