Example Of ArticlesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Example Of Articles returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Business Process Management (BPM)
 •   Databases
 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Virtualization
 •   Security Policies
 •   Business Intelligence Solutions
 •   Application Servers
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Based Example Of
 •   Example Of Articles Packages
 •   Example Practice
 •   Formats Example
 •   Open Example
 •   Research About Example Of
 •   Supplier Example Of
 •   Use Example Of
 •   Work Example Of Articles
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Developing HTML5 Applications for AppUp: Part 1 A Simple Example by Intel

December 15, 2011 - (Free Research)
This is the first in a series of articles covering how to develop HTML5 applications for Intel AppUp. This first article will cover the basics of getting a minimal application packaged using the Encapsulator tool. Later articles will describe some larger example applications that illustrate different features of HTML5. 
(TRAINING GUIDE)

Security visualisation by ComputerWeekly.com

January 18, 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Article: Design Patterns for Case Management by EMC Corporation

August 01, 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 18, 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Reaping the business benefits of big-data analytics: real-world strategies and examples by ParAccel

November 29, 2011 - (Free Research)
Read this e-book to gain insight on deriving business value from investments in big-data analytics, and learn how other organizations are harnessing big data for analytical purposes. 
(EBOOK)

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Business Rules: Taking Advantage of Business Rules Management Systems by IBM

February 2008 - (Free Research)
Business users sometimes try to control and manage business rules without directly having to deal with IT, which isn’t always successful. Using an example from the insurance industry, this article provides an introduction to business rules and the importance of Business Rules Management Systems (BRMS) in bridging the gap between business and IT. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Your Business May Be Part of a Network - But Is It Truly Connected? by Crossgate

April 2010 - (Free Research)
Business networks are key to competitive advantage. How businesses connect and communicate with partners in their business networks is important in this global economy. This article offers suggestions and examples of how to avoid getting bogged down in maintaining a business partner network and instead focuses on a business’s key differentiators. 
(WHITE PAPER) READ ABSTRACT |

HTML5: Painting with Canvas by Intel

December 2011 - (Free Research)
With the newly introduced canvas element in HMTL5, all you need to do is put an element on your page and paint anything you want by creating scriptable graphics with JavaScript. Read this article to learn how to paint on a page with HTML5's canvas element through a simple painting application example. 
(TECHNICAL ARTICLE)

The CIO Perspective on Cloud Strategies by SearchCIO.com

January 2014 - (Free Research)
This expert e-zine covers the future of the cloud and presents a series of articles that deal with preparing for the cloud and much more. 
(EZINE) READ ABSTRACT |

Configuring Systems for High Bandwidth I/O by Sun Microsystems, Inc.

May 2009 - (Free Research)
This Sun BluePrints™ article describes a recipe for configuring systems to support the very high bandwidth I/O capabilities needed by data-intensive applications. 
(WHITE PAPER) READ ABSTRACT |

Alternative Thinking about Business and Technology by Hewlett-Packard Company

February 2009 - (Free Research)
Review these articles to learn more about Hewlett Packard's many innovative blade server platform developments, including its NonStop fault-tolerant technology. 
(JOURNAL ARTICLE) READ ABSTRACT |

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

Software Testing Vol.3: This Issue of Software Testing Delves Into Mobile Application and Regression Testing by SearchSoftwareQuality.com

July 2009 - (Free Research)
This ezine covers the topic of testing and retesting defects and cites the Blackberry blackouts of 2007 and 2008 as examples of issues that could have been detected by regressing testing. 
(EZINE) READ ABSTRACT |

E-Zine: Software Testing Vol.3: This Issue of Software Testing Delves Into Mobile Application and Regression Testing by IBM

December 2010 - (Free Research)
This e-zine covers the topic of testing and retesting defects and cites the Blackberry blackouts of 2007 and 2008 as examples of issues that could have been detected by regressing testing. 
(EZINE)

Enterprise Mobility Guide 2011 by Sybase, an SAP company

May 2011 - (Free Research)
Mobile apps and tablets are transforming enterprises across the globe right now. How can you be sure you're staying ahead of the curve while increasing productivity and enhancing customer satisfaction? Get the The Enterprise Mobility Guide 2011. 
(WHITE PAPER) READ ABSTRACT |

CW+: Compass: How benchmarking can identify IT savings by ComputerWeekly.com

October 2010 - (Free Research)
Benchmarking, or the analysis of operational costs, productivity, and service levels in a comparative context of market standards, is a firmly established management tool. 
(WHITE PAPER) READ ABSTRACT |

Customer Experience Exchange E-Zine: Taking a swing at social CRM by SearchCRM

May 2012 - (Free Research)
This edition of the CEM e-zine examines the role social media can play in your company. Learn how Major League Baseball is capitalizing on this revolution to fill its stands even during the darkest of times of the season, why Pinterest is such a success and how Dell measures it's social media success by tracking 22,000 daily online comments. 
(EZINE)

The reality behind the hype: Government cloud computing by ComputerWeekly.com

November 2011 - (Free Research)
This article from Gartner offers advice to public sector organisations thinking of deploying cloud computing and assess the progress made by governments in their use of the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 28: Achieving the Right Level of Consolidation in a Virtual Data Center by SearchDataCenter.com

November 2010 - (Free Research)
Virtualization allows organizations to consolidate servers, reduce costs and increase efficiency. But too much of anything is rarely good. In this issue, the downsides of excessive consolidation and strategies for striking the right balance to improve computing efficiency are explained. Plus, how to improve server performance and consolidation. 
(EZINE)

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts