Example Of DocumentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Example Of Document returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Virtualization
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Enterprise Systems Management
 •   Databases
 •   Enterprise Information Integration/ Metadata Management
 •   Application Management and Maintenance
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Example Diagrams
 •   Example Of Document Evaluation
 •   Example Of Document Oklahoma
 •   Example Of Document Vendors
 •   Experts Example Of
 •   Graphics Example Of
 •   Making Example Of
 •   Manual Example Of
 •   Office Example Of Document
 •   Scheduling Example Of Document
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: The Power of Universal Patterns and Models for Master Data Management by Embarcadero Technologies, Inc.

October 19, 2009 - (Free Research)
In this presentation transcript featuring best-selling author, Len Silverston, learn how to implement universal patterns for data modeling to improve management flexibility. Gain insight into various modeling choices to meet your organization's needs. Discover how to improve quality and reduce management costs by re-using patterns. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Pund-IT (Charles King): Workload-Optimized Systems – IBM Shows the Way, Again by IBM

April 15, 2010 - (Free Research)
Charles King at Pund-IT defines the phrase “workload-optimized systems” citing IBM Smart Analytics System as a true example. Oracle’s misleading Exadata TPC-C benchmark claims against old DB2 results are cited by Charles as an example of confusion elsewhere in the market today. Read this report to learn more. 
(ANALYST REPORT) READ ABSTRACT |

How the VMware Software Defined Data Center Works: An IaaS Example by VMware, Inc.

August 15, 2013 - (Free Research)
This e-guide presents expert insights into an IaaS example and show how the dynamic nature of IaaS virtual data center gives business operations many different benefits. 
(EGUIDE) READ ABSTRACT |

Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS by SAS

May 05, 2014 - (Free Research)
The following digital book, Text Mining and Analysis Practical Methods, Examples, and Case Studies Using SAS, provides the reader with a solid foundation to successfully leverage text analytics. Understand core components, strategies, and much more. 
(BOOK) READ ABSTRACT |

VMware vCloud Implementation Example by VMware, Inc.

July 16, 2013 - (Free Research)
This reference guide provides an implementation example for deploying a private cloud in your VMware environment. Download now for a definition of vCloud and details about the architectural components and requirements for initial implementation. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Hands-on Oracle Application Express security by ComputerWeekly.com

November 01, 2013 - (Free Research)
This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code. 
(BOOK) READ ABSTRACT |

GIS in the Cloud - The Esri Example by Esri

February 09, 2011 - (Free Research)
As the use of cloud computing continues to grow, nearly every organization is developing ways to use this new technology. This white paper discusses and provide examples on how users of geographic information system (GIS) technology could and should benefit from cloud computing. Read more to find out how. 
(WHITE PAPER) READ ABSTRACT |

Developing HTML5 Applications for AppUp: Part 1 A Simple Example by Intel

December 15, 2011 - (Free Research)
This is the first in a series of articles covering how to develop HTML5 applications for Intel AppUp. This first article will cover the basics of getting a minimal application packaged using the Encapsulator tool. Later articles will describe some larger example applications that illustrate different features of HTML5. 
(TRAINING GUIDE)

Quantifying the value of investments in Application Performance Management by Hewlett-Packard Company

May 17, 2010 - (Free Research)
This paper provides real-world examples of return on investment (ROI) for HP Application Performance Management solutions. The examples show substantial cost savings and incremental revenue opportunities, often resulting in a payback period of less than one year for HP customers. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Reaping the business benefits of big-data analytics: real-world strategies and examples by ParAccel

November 29, 2011 - (Free Research)
Read this e-book to gain insight on deriving business value from investments in big-data analytics, and learn how other organizations are harnessing big data for analytical purposes. 
(EBOOK)

Business Ready Solutions for Virtual Infrastructure Availability Using Dell™ PowerEdge™ Servers, Dell Powervault™ Storage, and VMware vSphere™ by Dell, Inc. and Intel®

July 24, 2009 - (Free Research)
This white paper presents an example configuration and best practices for deploying and configuring a highly available architecture using an example solution configuration and then discussing how the configuration helps in maximizing uptime. 
(WHITE PAPER) READ ABSTRACT |

Practical Open Source Data Integration Case Studies & Implementation Examples Volume 3 by Talend

March 16, 2010 - (Free Research)
This white paper presents a few selected case studies, illustrating real-life implementations of open source data integration and its associated benefits. 
(CASE STUDY) READ ABSTRACT |

Practical Open Source Data Integration Case Studies & Implementation Examples Volume 2 by Talend

February 11, 2009 - (Free Research)
This document presents a few selected case studies, illustrating real-life implementations of open source data integration and its associated benefits. 
(WHITE PAPER) READ ABSTRACT |

Understanding the Value of Cloud Solutions: Maximize Your ROI by HP & Intel®

December 31, 2012 - (Free Research)
This paper provides examples of the return on investment (ROI) of an HP Cloud Service Automation solution. 
(WHITE PAPER) READ ABSTRACT |

Essential Guide to API Management and Application Integration by SearchBusinessAnalytics

November 19, 2013 - (Free Research)
Explore your API options in this essential guide with tips from experts including Alex Gaber, API evangelist. Check out a range of stories that highlight examples of successful API management, trends with the technology, and key terms developers need to know. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Course: Insecure Temporary Files (CWE-377) by Klocwork

November 13, 2013 - (Free Research)
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377. 
(WEBCAST) READ ABSTRACT |

Course: Improper Validation of Array Index (CWE-129) by Klocwork

November 13, 2013 - (Free Research)
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129. 
(WEBCAST) READ ABSTRACT |

iSCSI for TL-Series Tape Libraries by Dell, Inc.

September 30, 2008 - (Free Research)
To supplement the growth in iSCSI SANs, Dell has introduced an iSCSI-to-SAS bridge card for the TL-series of tape libraries. This allows a customer to directly attach a tape backup target to their iSCSI 1Gb Ethernet SAN with little to no degradation in transfer speed. This white paper explores this setup and configuration. 
(WHITE PAPER) READ ABSTRACT |

Long-Term Data Protection and Retention: Finding the Correct Balance by Quantum Corporation

March 18, 2009 - (Free Research)
Tape remains the most cost effective, energy efficient and reliable program technology for storing large amounts of inactive, off-line or near-line data while complimenting disk-based data protection and retention solutions. Read this paper and find out why. 
(WHITE PAPER) READ ABSTRACT |

Cloud Cover for the Call Center: Meeting Demands Intelligently and Efficiently by Oracle Corporation

March 01, 2012 - (Free Research)
This paper covers many of the complications and complexities of managing a call center. It explores the various solutions available and offers pros and cons to each of the options. It shows the positive financial impact picking the right choice can have. 
(WHITE PAPER) READ ABSTRACT |

Tiered Storage Takes Center Stage (Horison) by Oracle Corporation

December 21, 2010 - (Free Research)
This paper describes how tiered storage, as a storage initiative, has been proven to significantly reduce acquisition and operating costs for medium and large scale storage enterprises. Read this paper to learn more about how tiered storage is taking center stage. 
(WHITE PAPER) READ ABSTRACT |

Targeted Cyber Attacks by GFI Software

March 18, 2008 - (Free Research)
Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war. 
(WHITE PAPER) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 18, 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts