Computerized ProgrammingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computerized Programming returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Data Security
 •   Virtualization
 •   Business Intelligence Solutions
 •   Desktop Management
 •   Customer Relationship Management (CRM)
 •   Data Center Management
 •   Application Lifecycle Management(ALM)
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Accessing Computerized Programming
 •   B2B Computerized Programming
 •   Computerized Conferences
 •   Computerized South Carolina
 •   Computerized Tennessee
 •   Examples Of Computerized
 •   Integration Computerized Programming
 •   Outsourcing Computerized
 •   Wireless Computerized Programming
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Global lessons in eHealth implementation by ComputerWeekly.com

April 02, 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

3 Steps to Faster EMR Adoption with Desktop Virtualization and SSO by VMware, Inc.

January 11, 2012 - (Free Research)
This white paper outlines three key steps that your organization can take to accelerate EHR and CPOE adoption. Read on to discover out how to make it faster and easier to deploy new clinical applications while optimizing the clinician experience, protecting patient data, and reducing cost and complexity. 
(WHITE PAPER) READ ABSTRACT |

Life-Critical Networks For 21st Century Health Care by Brocade

March 24, 2010 - (Free Research)
Network convergence has turned hospitals into dense networks of sophisticated, computerized medical gear. Take the network away and you’d be left with a lot of dumb devices that cannot perform the lifesaving functions for which they were designed. 
(EBOOK) READ ABSTRACT |

Best Practices: Single Sign-On Drives Productivity, Security and Adoption When Used with EHR at The Johns Hopkins Hospital by Imprivata

December 31, 2012 - (Free Research)
In this case study, learn how Johns Hopkins Hospital was able to smoothly implement electronic health records (EHR) and computerized physician order entry (CPOE) without negatively impacting other processes or security. Click now for 5 essential guides for implementation success. 
(WHITE PAPER) READ ABSTRACT |

Life-Critical Networks for 21st Century Health Care by SearchCIO.com and SearchNetworking.com

December 18, 2009 - (Free Research)
This e-book presents healthcare specific networking issues such as the importance of networks within a hospital, wireless networking for life-critical networks, the future of health care networks, and more. 
(EBOOK) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc.

March 2010 - (Free Research)
Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution. 
(WHITE PAPER) READ ABSTRACT |

Using Desktop Virtualization to Drive Quality and Cost Savings in Clinical Computing by Dell, Inc.

August 2011 - (Free Research)
Incentives created by the American Recovery and Reinvestment Act are expected to increase EHR adoption and point-of-care computing -- meaning demands on availability and performance are high, while the budgets to manage devices are small. Find out how desktop virtualization can assist with these healthcare challenges. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Pros and Cons of the iPad in Health Care Settings by Kensington

October 2011 - (Free Research)
Can the iPad be incorporated into health care networks without breaking security requirements? In this exclusive resource, get answers to some of the most common questions about using iPads in health care facilities. 
(EGUIDE) READ ABSTRACT |

Leverage Technology at the Point of Care with Services from CDW Healthcare : Your Point-of-Care Services Solution Overview by CDW Healthcare

October 2011 - (Free Research)
Choosing the right PoC technology can improve your hospital’s ability to deliver quality patient care. This means you need to adopt PoC solutions that are readily compatible with existing systems, accommodate your budget and can comply with government criteria. Learn about services available to ensure a smooth transition to PoC. 
(WHITE PAPER) READ ABSTRACT |

Five DLP Tips From Security Executives by Symantec Corporation

March 2013 - (Free Research)
This whitepaper explores how data loss prevention (DLP) programs impact the effectiveness of security executives and corporate data protection. Topics covered include the dangers of exposed data, the direct benefits of DLP programs, and tips for deploying DLP programs. 
(WHITE PAPER) READ ABSTRACT |

Updating Your Corporate BYOD Program for Success by SearchSecurity.com

December 2012 - (Free Research)
This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program. 
(EGUIDE) READ ABSTRACT |

What makes a successful BYOD program? by IBM

May 2014 - (Free Research)
This expert guide offers critical information about developing a successful BYOD program, discussing the fundamental features that every program should have and the importance of a device-agnostic strategy. 
(EGUIDE) READ ABSTRACT |

Podcast: Creating Agile Programs by Rally Software

August 2013 - (Free Research)
Tune in to this informative podcast with Johanna Rothman of Rothman Consulting Group, and you'll discover the nuts and bolts of creating agile programs. Listen now to learn what it takes to create a successful team for agile programs, and get a more in-depth look at seven best practices for program creation. 
(PODCAST) READ ABSTRACT |

Webcast: Creating Agile Programs by Rally Software

August 2013 - (Free Research)
Access this informative webcast to discover the nuts and bolts of creating agile programs, and learn what it takes to create the most effective teams for agile program success. Watch now to get a more in-depth look at seven best practices for agile programs. 
(WEBCAST) READ ABSTRACT |

AMD Honored on CRN’s 5-Star Partner Programs Guide for Second Consecutive Year by AMD

March 2011 - (Free Research)
AMD was named  to CRN's 2011 Partner Programs Guide for its AMD Fusion Partner Program (FPP). CRN's  Partner Programs Guide recognizes  vendors  with robust partner programs or products  that provide the best possible partnering elements for channel success. 
(PRESS RELEASE) READ ABSTRACT |

Parallel Programming Talk - Dr. David Patterson on the future of Parallel Programming by Intel Software Network

June 2009 - (Free Research)
Join master of the parallel universe Clay Breshears and Aaron Tersteeg as they discuss parallel programming with a special guest. This episode features Dr. David Paterson, Director of the Universal Parallel Computing Research Center at UC Berkeley sponsored by Intel and Microsoft. 
(PODCAST)

A Practical "How-To" Guide for Creating Mobile Enterprise Programs by IBM

November 2012 - (Free Research)
This informative paper discusses practical best practices for implementing effective mobile enterprise programs that can create significant value for employees, partners, and customers. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Programming Model by Microsoft

December 2011 - (Free Research)
Read this white paper to learn how the new Windows Azure programming model helps developers create applications that are easier to administer, more available, and more scalable than those built in the traditional Windows Server environment. 
(WHITE PAPER) READ ABSTRACT |

The global state of the project management office by ComputerWeekly.com

May 2011 - (Free Research)
This global benchmarking study from ESI international identifies the key challenges and successes experienced by project and programme management offices (PMO) and draws recommendations for the future. 
(IT BRIEFING) READ ABSTRACT |

CW+: Open Group technical report: IT Specialist Certification (ITSC) accreditation requirements by ComputerWeekly.com

October 2010 - (Free Research)
The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions. 
(WHITE PAPER) READ ABSTRACT |

Is Parallel Programming Hard? by Intel

October 2009 - (Free Research)
This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming. 
(TECHNICAL ARTICLE)

Symantec Report on Rogue Security Software by Symantec Corporation

October 2009 - (Free Research)
The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams. 
(WHITE PAPER) READ ABSTRACT |

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint by IBM

December 2008 - (Free Research)
This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns? 
(WHITE PAPER) READ ABSTRACT |

SCA: Bringing Modern SOA Programming to Tuxedo by Oracle Corporation

March 2010 - (Free Research)
This white paper provides an introduction into this new SCA-based programming model for Tuxedo that allows customers to quickly develop and compose SOA-based applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts