Procurement AlgorithmsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Procurement Algorithms returned the following results.
RSS What is RSS?
Related Categories

 •   Requisitioning and Procurement
 •   Supply Chain Management
 •   Supply Chain Optimization
 •   Supply Chain Execution
 •   Services Procurement
 •   Data Center Management
 •   Data Security
 •   Spend Management
 •   Business Intelligence Solutions
 •   Strategic Sourcing Solutions

Related Searches
 •   Concerns Procurement Algorithms
 •   Configurations Procurement
 •   Java Procurement
 •   Measured Procurement
 •   Performance Procurement Algorithms
 •   Procurement Algorithms Expert
 •   Procurement Algorithms Firm
 •   Procurement Algorithms List
 •   Procurement Corporation
 •   Template Procurement Algorithms
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Advances in Data Warehouse Performance by IBM

August 2008 - (Free Research)
Learn how DB2 can help you meet the demands of business intelligence by reducing query response time from hours to seconds, supporting real time data warehousing, and optimizing your storage while lowering operating costs. 
(WHITE PAPER) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

8 Simple Rules for Designing Threaded Applications by Intel Software Network

November 2007 - (Free Research)
This article gives 8 Simple Rules that you can add to your palette of threading design methods. By following these rules you will have more success in writing the best and most efficient threaded implementation of your applications. 
(WHITE PAPER)

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

UPS functioning modes: a new algorithm for unprecedented efficiency by Emerson Network Power

December 2011 - (Free Research)
Explore this resource to learn about a UPS system that can differentiate between different types of electrical disturbances and respond using the most efficient and effective mode to compensate for each disturbance. Read on now to learn more about this new technology and how you can ensure business continuity and protect your valuable hardware. 
(WHITE PAPER) READ ABSTRACT |

Elliptic curve cryptography in transport ticketing by ComputerWeekly.com

May 2014 - (Free Research)
This article in our Royal Holloway Security Series looks at how elliptic curve cryptography on transport payment cards improves transaction times. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Implementing Breakthrough Technology for Clinical Development Modeling and Simulation by Univa UD

April 2008 - (Free Research)
When GlaxoSmithKline was challenged with improving efficiency in modeling and simulation, their clinical development research team turned to Univa technology for faster methods of establishing and running models for a drug’s effects on the body. 
(CASE STUDY) READ ABSTRACT |

Protecting against modern password cracking by ComputerWeekly.com

April 2013 - (Free Research)
This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Open Source Master Data Management - The Time is Right by Talend

March 2010 - (Free Research)
Proper master data management (MDM) is very valuable when available to enterprise business processes and analytics. However, master data projects are often challenging, architecturally complex, time intensive and expensive. This paper explains why the time is right for open source MDM, and predicts the effects of open source on the MDM marketplace. 
(WHITE PAPER) READ ABSTRACT |

The TERA1100 Portal Processor by Teradici Corporation

The TERA1100 Portal Processor enables centralized computing to span an enterprise network from the datacenter to the desktop by implementing advanced display compression algorithms and I/O bridging to guarantee a high performance user experience. 
(HARDWARE PRODUCT)

HP Dynamic Deduplication - achieving a 50:1 ratio by Hewlett-Packard Company

March 2009 - (Free Research)
In 2008, HP introduced two products to the HP StorageWorks D2D Backup System Family. Both feature Dynamic deduplication based on an HP-patented algorithm that packs up to 50 times more backup data into the same disk footprint. This paper explains how Dynamic deduplication works and also establishes how a 50:1 deduplication ratio may be achieved. 
(WHITE PAPER) READ ABSTRACT |

Embedded SSD Flash Management by sTec | HGST

January 2013 - (Free Research)
This white paper will explore NAND flash technology and its inherent problems, and explain how proper flash management algorithms can address these issues and transform NAND flash into a reliable media with a long lifespan. 
(WHITE PAPER) READ ABSTRACT |

Improve App Delivery with an HTML Rewrite by F5 Networks

December 2012 - (Free Research)
This E-Guide from SearchNetworking.com describes why many web content optimization startups are rewriting HTML and how your organization can benefit from these results. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Addressing Common Contact Center and Enterprise Business Issues with Speech Analytics by Verint Systems

April 2008 - (Free Research)
As a solution to contact center issues, this paper suggests Speech analytics, which gives organizations the ability tap into existing recorded customer interactions to gain actionable intelligence for improving business performance. 
(WHITE PAPER) READ ABSTRACT |

Rapid Architectural Consolidation Engine - The Enterprise Solution for Disparate Data Models by Innovative Routines International, Inc.

March 2008 - (Free Research)
RapidACE is a software platform that enables data architects to integrate disparate data models automatically. It delivers high speed, automated data model consolidation. 
(WHITE PAPER) READ ABSTRACT |

Liebert Monitoring by Liebert Corporation

The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD.... 
(HARDWARE PRODUCT)

Improving Tools and Techniques to Combat Malware Evolution by Webroot

October 2012 - (Free Research)
Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes. 
(WHITE PAPER) READ ABSTRACT |

EMC Data Domain Boost for Symantec NetBackup and NetBackup Storage Unit Group Failover by EMC Backup and Recovery Solutions

June 2010 - (Free Research)
This white paper explores how to leverage Storage Unit Group failover to achieve N+1 redundancy when using EMC Data Domain Boost software with Symantec NetBackup OpenStorage. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

IBM ISS Global Data Center content analysis technology for the Web and e-mail by IBM

November 2008 - (Free Research)
The IBM content analysis process, part of the IBM ISS Global Data Center, is built on a platform that classifies millions of web pages and e-mails every day. Access this white paper for a detailed look at how this technology will effectively protect users from unwanted content. 
(WHITE PAPER) READ ABSTRACT |

Reversing the Requirement for Storage Growth -- IBM Consolidates and Simplifies Tier-2 Storage by IBM

April 2009 - (Free Research)
With the acquisition of Diligent Corporation, IBM has put itself in the rather unique position as the only vendor that can offer to the enterprise a complete backup/recovery solution with servers, disk, tape, software, and data deduplication technology, all rolled into one. 
(WHITE PAPER) READ ABSTRACT |

The future of digital forensics by ComputerWeekly.com

April 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Enabling Developer Access to Production Data by Voltage Security, Inc.

December 2008 - (Free Research)
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise. 
(WHITE PAPER) READ ABSTRACT |

Investigating Cloud and Mobile Options for Procurement by SearchManufacturingERP

December 2012 - (Free Research)
This handbook provides an expert roadmap for approaching cloud and mobile procurement, outlining common threats and challenges, tips for achieving e-procurement software ROI, and more. 
(EBOOK) READ ABSTRACT |

Overcoming the Challenges of Green Procurement through eProcurement by Dimension Data Global

October 2008 - (Free Research)
This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts