Documentation Group Articles InWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Documentation Group Articles In returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Product Data Management/ Product Information Management
 •   Enterprise Information Integration/ Metadata Management
 •   Business Process Management (BPM)
 •   Security Policies
 •   Enterprise Systems Management
 •   Mobile Device Management
 •   Enterprise Data Protection and Privacy
 •   Project Management Solutions

Related Searches
 •   Architecture Documentation
 •   Check Documentation Group Articles
 •   Documentation Definitions
 •   Documentation Group Articles Schemas
 •   Documentation Hr
 •   Documentation Questions
 •   Learning Documentation
 •   Planning Documentation Group Articles
 •   Resource Documentation Group
 •   Tutorials Documentation Group
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 27, 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by Information Security Magazine

January 01, 2009 - (Free Research)
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it. 
(EZINE)

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 16, 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments by CollabNet

April 18, 2012 - (Free Research)
Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex. 
(EGUIDE) READ ABSTRACT |

The future of software development: The LateRooms Group by ComputerWeekly.com

July 05, 2012 - (Free Research)
David Heath, head of software engineering at the LateRooms Group, gives his views on the future of software development, in this presentation for Computer Weekly's 500 Club. 
(IT BRIEFING) READ ABSTRACT |

How to configure Mac OS X Server by ComputerWeekly.com

March 22, 2013 - (Free Research)
This step by step guide shows you how to configure Max OS X Server. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Upgrading to SharePoint Server 2010 by Microsoft Corporation India Pvt Ltd

December 04, 2009 - (Free Research)
The articles in this guide help you plan for and perform an upgrade from Microsoft Office SharePoint Server 2007 to SharePoint Server 2010. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine

March 09, 2010 - (Free Research)
This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more. 
(EZINE)

Underexposed risks of public Wi-Fi hotspots by ComputerWeekly.com

March 15, 2013 - (Free Research)
This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Modern Infrastructure August 2013 by SearchDataCenter.com

August 01, 2013 - (Free Research)
Let this expert ezine, Modern Infrastructure, brief you important issues in cloud computing and virtualization infrastructure today.  Articles cover everything from probable issues one may face while implementing a hybrid cloud to how social networking may help IT to network and reach out to a wider customer base. 
(EZINE) READ ABSTRACT |

Speeding the Time to Intelligence: Effective Information Management through Business Intelligence Competency Centers and Performance Management by SAS

May 2008 - (Free Research)
This article explains in detail about how to arrive at and implement an effective business intelligence strategy, using both a BICC and performance management technology. 
(WHITE PAPER) READ ABSTRACT |

Protecting against modern password cracking by ComputerWeekly.com

April 2013 - (Free Research)
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Book: Mobile Application Development: Making it Easier for Developers by IBM

February 2011 - (Free Research)
Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. This e-book will explain what all the fuss is about. 
(EBOOK) READ ABSTRACT |

Key Strategies for your application integration approach by Oracle Corporation

October 2011 - (Free Research)
Application integration practices have their own patterns and languages and over the past few years the number of practices have grown immensely. This eguide will gives you expert advice on strategies for multiple application integration practices. 
(EGUIDE) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 8 by SearchBusinessAnalytics

August 2012 - (Free Research)
Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes. 
(EGUIDE) READ ABSTRACT |

E-Book: Reaping the business benefits of big-data analytics: real-world strategies and examples by ParAccel

November 2011 - (Free Research)
Read this e-book to gain insight on deriving business value from investments in big-data analytics, and learn how other organizations are harnessing big data for analytical purposes. 
(EBOOK)

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine

July 2009 - (Free Research)
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more. 
(EZINE)

Clinical Documentation: Emerging Market Trends and IT Best Practices Webcast by Nuance

January 2014 - (Free Research)
View this webcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center as they reveal the top market trends with clinical documentation and 6 best practices for successful integration. 
(WEBCAST) READ ABSTRACT |

Clinical Documentation: Emerging Market Trends and IT Best Practices Podcast by Nuance

January 2014 - (Free Research)
Download this podcast to hear from David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center who discuss the latest trends in clinical documentation practices and some challenges that come with it. Click now as they unveil 6 key guidelines for successful implementation. 
(PODCAST) READ ABSTRACT |

Clinical Documentation: Emerging Market Trends and IT Best Practices by Nuance

February 2014 - (Free Research)
In this resource, David E. Williams, President of Health Business Group and Rebecca Kaul, President of the UPMC Technology Development Center contribute their insights on the most recent trends in clinical documentation and offer 6 industry-leading tips on how to deploy an efficient and effective system. 
(TRANSCRIPT) READ ABSTRACT |

E-Guide: Storage Choices for Virtual Machine Disaster Recovery by Hewlett-Packard Company

September 2008 - (Free Research)
When evaluating storage solutions for DR in a virtual environment, there are several aspects you should consider. In this E-Guide discover several concerns to be aware of when planning for disaster recovery in a virtual server environment. 
(WHITE PAPER) READ ABSTRACT |

Mondial Assistance Group Shares Best Processes to Improve Quality, Efficiency by Lombardi Software, An IBM Company

December 2009 - (Free Research)
Mondial Assistant Group wanted to share best processes across their 28 global business units but they lacked a platform for sharing process knowledge. So they turned to Lombardi Blueprint, a hosted service that fosters easy collaboration among non-technical business users who want to document and analyze their processes. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Case Study: Over 1300 Carlson Rezidor Hotels World-wide Rely on Alfresco for Document Management by Alfresco Software

May 2012 - (Free Research)
This paper outlines a case study of the Carlson Rezidor Hotel Group and how it used Alfresco for its document management needs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts