TIFF Reports

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Presentation Transcript: Personal vs Shared VDI Images
sponsored by Pano Logic, Inc
PRESENTATION TRANSCRIPT: For about as long as VDI had been around, the discussion over the merits of shared and personal images has persisted. In this transcript of the "Personal vs Shared VDI Images" webcast, Brian Madden and Gabe Knuth will take a look at the merits and drawbacks of each approach in an effort to give the viewer a clear path for implementation.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Pano Logic, Inc

Business Continuity Management Systems
sponsored by TechTarget ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com

Solving the Scalability Problem with Big Data
sponsored by WANdisco
EGUIDE: A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

WANdisco

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

FAQ Guide: How Can Virtualized Storage Be Used For Medical Images
sponsored by DellEMC and Intel®
EGUIDE: This E-Guide from SearchHealthIT.com to highlights the answers to frequently asked questions surrounding the use of virtualized storage for medical images.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

DellEMC and Intel®

E-Guide: How to Create an On-Site Medical Image Archive
sponsored by DellEMC and Intel®
EGUIDE: This E-Guide from SearchHealthIT.com to highlights some of the most important considerations for implementing an on-site medical image archive.
Posted: 31 May 2012 | Published: 31 May 2012

DellEMC and Intel®