Integration Articles About HowWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Integration Articles About How returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Product Data Management/ Product Information Management
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Data Warehousing
 •   Data Center Management
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Application Integration

Related Searches
 •   B2B Integration Articles About
 •   Cases Integration
 •   Functions Integration Articles About
 •   Guides Integration Articles
 •   Integration Articles Contact
 •   Integration Articles Equipment
 •   Integration Articles Networking
 •   Integration Function
 •   Integration Reservation
 •   Survey Integration
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Industrial SOA Series by Oracle Corporation

October 30, 2013 - (Free Research)
Access this resource to read a variety of articles on service-oriented architecture (SOA), on topics ranging from SOA blueprints to SOA mobile solutions. 
(WHITE PAPER) READ ABSTRACT |

BI Trends and Strategies E-Zine Issue 8 by SearchBusinessAnalytics

August 01, 2012 - (Free Research)
Organizations are carving out small slices of their DWs and databases where scientists and analysts can manipulate and analyze data sets. The intent of the data sandbox is to separate experimentation from the production database environment. Read this edition of BI Trends and Strategies to learn about the many benefits of using data sandboxes. 
(EGUIDE) READ ABSTRACT |

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle by iTKO LISA

October 20, 2010 - (Free Research)
This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs. 
(WHITE PAPER) READ ABSTRACT |

Key Strategies for your application integration approach by Oracle Corporation

October 06, 2011 - (Free Research)
Application integration practices have their own patterns and languages and over the past few years the number of practices have grown immensely. This eguide will gives you expert advice on strategies for multiple application integration practices. 
(EGUIDE) READ ABSTRACT |

Upgrading to SharePoint Server 2010 by Microsoft Corporation India Pvt Ltd

December 04, 2009 - (Free Research)
The articles in this guide help you plan for and perform an upgrade from Microsoft Office SharePoint Server 2007 to SharePoint Server 2010. 
(EGUIDE) READ ABSTRACT |

How Professional Services Add Value to Radio Frequency Identification (RFID) Projects by Intermec

March 04, 2009 - (Free Research)
This white paper shows how qualified service providers can add value to RFID projects, highlights some of the planning issues and considerations that call for experienced advice, and provides guidance to the types of services available and how to differentiate service providers. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 20, 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Teradata Active Data Warehouse Private Cloud: Mitigate Risk and Meet Dynamic Business Needs by Teradata

July 02, 2012 - (Free Research)
Check out this article now to learn about public v. private clouds and how they stack up when it comes to mitigating risk and meeting business needs. 
(WHITE PAPER) READ ABSTRACT |

Modernizing IT: Strategies for Improving Service Quality and Reducing IT Costs by BMC Software, Inc.

June 15, 2009 - (Free Research)
Working harder simply won't get you there. No matter how many people you allocate, sinking more labor into old IT practices cannot concurrently meet rising demands on IT and cut costs. Read about cost-effective, automated ways to meet this challenge head-on in our latest article, “Strategies for Modernizing IT, Reducing Costs, and..” 
(WHITE PAPER) READ ABSTRACT |

E-Book: Mobile Application Development: Making it Easier for Developers by IBM

February 09, 2011 - (Free Research)
Mobile applications have not only piqued the interest of developers, but also of the average cell phone user. This e-book will explain what all the fuss is about. 
(EBOOK) READ ABSTRACT |

Harvard Business Review Article: Mastering the Management System by SAP America, Inc.

September 01, 2011 - (Free Research)
In this article, Kaplan, of Harvard Business School, and Norton, founder and director of the Palladium Group, explain how to effectively manage both strategy and operations by linking them tightly in a closed-loop management system, which comprises five stages. 
(WHITE PAPER) READ ABSTRACT |

Alternative Thinking about Business and Technology by Hewlett-Packard Company

February 10, 2009 - (Free Research)
Review these articles to learn more about Hewlett Packard's many innovative blade server platform developments, including its NonStop fault-tolerant technology. 
(JOURNAL ARTICLE) READ ABSTRACT |

IBM Information Management: Manage your data and control risk to develop information you can trust by IBM

November 14, 2011 - (Free Research)
The IBM Information Management portfolio offers a complete set of solutions designed to help you not only manage your data, but also master it. Read on to learn more about: Data management, information integration, data warehousing and more. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine

May 29, 2009 - (Free Research)
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more. 
(EGUIDE) READ ABSTRACT |

Data Mart Consolidation by Hexaware Technologies

September 12, 2011 - (Free Research)
This white paper explores how Data Mart consolidation is an effective tool for saving money when dealing with large volumes of data. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 11, 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 09, 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

BI Trends and Strategies E-Zine Issue 4 by SearchBusinessAnalytics

April 11, 2012 - (Free Research)
This edition of BI Trends & Strategies features a lead article by SearchCIO.com's Linda Tucci, who offers a helping hand in the quest to dismantle the dreaded data silo. The second piece outlines mobile BI, including a reference to Apple's iPad, and the final article delves into the world of performance management. 
(EZINE)

How to Give a Killer Presentation: Lessons from TED by Citrix Online Go To Meeting

June 30, 2013 - (Free Research)
In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (Part 1) by Intel Software Network

June 20, 2009 - (Free Research)
This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors. 
(WHITE PAPER)

Article: Design Patterns for Case Management by EMC Corporation

August 01, 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

Enhance Business Insight and Scalability of XML Data with New DB2 9.7 pureXML Features by IBM

March 18, 2011 - (Free Research)
This is a developerWorks article. This article summarizes the new pureXML capabilities, explains how they can be used, and discusses sample application scenarios. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by Information Security Magazine

June 10, 2009 - (Free Research)
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more. 
(EZINE)

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 13, 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

E-Book: Gaining Control of Order Management Processes by SAP America, Inc.

April 25, 2012 - (Free Research)
This e-book, packed with four expert articles, highlights SAP's solution to sales order management, offering insight into its CRM, ERP and supply chain management components. Read these insightful articles now to learn about this option's strengths and weaknesses, how to properly define the sales process and so much more. 
(EBOOK) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts