Event-Driven MethodWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Event-Driven Method returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Service Oriented Architecture (SOA)
 •   Job Scheduling
 •   Enterprise Systems Management
 •   Business Process Automation
 •   Data Center Management
 •   Business Activity Monitoring (BAM)
 •   Application Integration
 •   Event Automation
 •   System Monitors

Related Searches
 •   Call Event-Driven Method
 •   Event-Driven Method Control
 •   Event-Driven Method List
 •   Event-Driven Method Seminars
 •   Event-Driven Method Timeline
 •   Learn About Event-Driven Method
 •   Management Event-Driven Method
 •   Operating Event-Driven Method
 •   Scheduling Event-Driven Method
 •   Whitepaper Event-Driven
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Drive Your Enterprise with Event-Driven Scheduling by Help/Systems

September 17, 2009 - (Free Research)
Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE. 
(WHITE PAPER) READ ABSTRACT |

Expert tips for BPM and event-driven processing by IBM

November 01, 2011 - (Free Research)
In this e-guide, readers interested in implementing event-driven processing and business process management (BPM) will learn tips for proving ROI with BPM, best practices for implementing event processing, and  process-oriented strategies to gain greater value from a BPM suite. 
(EGUIDE) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 17, 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

Fifteen Clues that Your ERP System is Ready to Take Your Business to the Next Level by TIBCO Software Inc.

July 10, 2013 - (Free Research)
Every business wants to get the most value from their enterprise resource planning (ERP) system, and keep it working for all business events in the future. To do this requires the right technology, and an event-driven ERP platform may be just the thing. 
(WHITE PAPER) READ ABSTRACT |

Symantec Backup Exec™ System Recovery 7.0 by Symantec Corporation

August 01, 2007 - (Free Research)
Recover from system loss or disaster in minutes, not hours or days. Download this free trial today; a disk-based system recovery tool for bare metal restoration to dissimilar hardware, virtual environments or in remote locations. 
(PRODUCT DEMO)

IDC MarketScape: Worldwide Business Process Platforms 2011 Vendor Analysis by Oracle Corporation

September 29, 2011 - (Free Research)
This IDC study assesses the capabilities of business process platform vendors to support midrange to complex process improvement scenarios. 
(WHITE PAPER) READ ABSTRACT |

Workflow, Rules, and CEP Combine to Drive New Business Value by Red Hat

October 31, 2012 - (Free Research)
Read this whitepaper to see why today's BPM projects involve a shift from manual to automated tasks, back-end orchestration, extensive use of rules, event-driven problem detection, and more dynamic capabilities that support knowledge workers. 
(WHITE PAPER) READ ABSTRACT |

Eight Showstopper Problems with BPEL Servers for Event-Driven SOA by Fiorano Software, Inc.

August 2008 - (Free Research)
This paper analyzes some critical implementation-level problems faced by current BPEL products in real-world implementations. 
(WHITE PAPER) READ ABSTRACT |

SL Corporation - Enterprise RTView™ Case Study by SL Corporation

February 2008 - (Free Research)
With a deep penetration in the algorithmic trading and capital markets, Progress® Software needed to be able to provide traders with a way to create custom views of market data and their trading position. 
(CASE STUDY) READ ABSTRACT |

How to Choose an Enterprise-Class Job Scheduling Solution Evaluation Guide by Cisco Systems, Inc.

November 2010 - (Free Research)
This document discusses the requirements for job scheduling software in complex IT environments with multiple interconnected enterprise-class applications that touch every aspect of the organization. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

IDC MarketScape: Worldwide Business Process Platforms 2011 Vendor Analysis by Oracle Corporation

June 2011 - (Free Research)
This IDC study uses the IDC MarketScape model to assess the capabilities of vendors to support midrange to complex process improvement scenarios using business process management (BPM) software. 
(WHITE PAPER)

5 Levels of Agile Planning: From Enterprise Product Vision to Team Stand-up by Rally Software

August 2008 - (Free Research)
Existing agile methods often focus on small, single-team projects, overlooking the broader impact of large programs. This paper outlines a distinct planning framework that has been successful in large-scale agile software development projects and relies.. 
(WHITE PAPER) READ ABSTRACT |

Locating Rogue 802.11n and Legacy Wireless Access Points by Fluke Networks

July 1967 - (Free Research)
Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security. 
(WHITE PAPER)

WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises by Global Knowledge

October 2008 - (Free Research)
This paper will explore the authentication methods available with WPA2 (Wi-Fi Protected Access 2) and identify several important best practices to consider when deploying a wireless network at home or in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Are 'strong authentication' methods strong enough for compliance? by Entrust, Inc.

September 2011 - (Free Research)
Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance. 
(EGUIDE) READ ABSTRACT |

New Deployment Methods for Desktops by Dell, Inc.

July 2008 - (Free Research)
Virtualization and diskless desktops are two deployment methods that enhance remote desktops, offering consolidation with fewer limitations. 
(WHITE PAPER) READ ABSTRACT |

Simple Tricks to Ace the Subnetting Portion of Any Certification Exam by Global Knowledge

December 2007 - (Free Research)
This whitepaper teaches useful methods for passing certification test questions. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Choosing a Data Archiving Strategy: Disk, Tape or Both? by Symantec Corporation

September 2011 - (Free Research)
Today’s organizations typically have three data archiving strategies they can choose from: disk archiving, tape archiving or a combination of both. This SearchDataBackup.com E-Guide offers insight into the advantages and disadvantages of each method, how to choose the best approach, and  the best and worst practices of data archives. 
(EGUIDE) READ ABSTRACT |

9 Backup Types & Methods: Which is Right for Your Business by SonicWALL

October 2011 - (Free Research)
This SearchStorage.com expert EGuide will help you understand the various backup options currently available by outlining what each backup type and technology entails, and showing how to choose the right strategy for your business. 
(EGUIDE) READ ABSTRACT |

Assuring Enterprise-Quality Agile Development by HP Software

August 2011 - (Free Research)
This white paper provides an overview of the advantages of hybridizing agile development methods with the QA lessons learned from previous methods. Learn how this strategy provides the best of both worlds for developing flexible, secure software products. 
(WHITE PAPER) READ ABSTRACT |

Building Your Business Case for Managed File Transfer by OpenText

November 2011 - (Free Research)
The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing. 
(WHITE PAPER) READ ABSTRACT |

Agile Maturity Report Benchmarks and guidelines to improve your effectiveness by IBM

June 2013 - (Free Research)
Agile methods are no longer just for small software development teams -- organizations of all sizes are quickly adopting these strategies to achieve success with project portfolios. In this comprehensive report, explore the results of an Agile maturity survey of various types of organizations and projects 
(WHITE PAPER) READ ABSTRACT |

802.1x - Implementing and Deploying Methods by Global Knowledge

July 2013 - (Free Research)
You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have. 
(WHITE PAPER) READ ABSTRACT |

The Changing Face of Exchange E-Mail Management by Azaleos Corporation

September 2008 - (Free Research)
This paper outlines the 15 key areas to evaluate as part of any Exchange monitoring and management solution and provides an overall rating for efficiency, aptitude and achievement that each of the various Exchange Server management models offers. 
(WHITE PAPER) READ ABSTRACT |

Image-Based Data Protection: Simply Better Data Protection by Dell Software

January 2011 - (Free Research)
In this Quest Software white paper, see why image-based data protection is the next step in protecting your company’s critical data. Learn about the true value of moving to a image-based data protection virtual solution, including a solid return on investment, and how this new technology works in your current backup environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts