Shared Tutorials, Articles and White Papers

Tutorials, Articles and White Papers Shared by the Internet Community

Advertisements

  Top Tutorials     New Tutorials     Submit     Login     Register  

Listing

gap line

Most Recent White Papers


  • Value Proposition of Business Intelligence

    to market success. Small to medium sized enterprises (SME) should not discount the importance of Business Intelligence (BI). Most SME business owners make decisions based on a best guess or on their perception of business stability, and even if the owner
    • 6450 Hits
    • Submitted By: ElegantJ Business Intelligence
    • Company: Elegant Microweb Pvt Ltd

  • Building a Better Channel Program

    Traditional channel models have always followed tried-and-true structures that have historically worked to help organize, categorize and manage channel partners. In today’s rapidly changing landscape where depth of specialization is more the norm than
    • 5255 Hits
    • Submitted By: Chris Adams
    • Company: Innovative Channel Services

  • Emergency Evacuation for Correctional Facilities

    Combining RFID tracking technology with time-proven evacuation procedures is a way to ensure visitor safety and added security. This is particularly applicable in correctional facilities.
    • 6299 Hits
    • Submitted By: Patrick Metzger
    • Company: TransitionWorks Software

  • How to Market to Today’s CFOs

    The purpose of this white paper is to examine the most successful marketing methods that best engage the modern-day CFO and other corporate finance executives. When we use the term “CFO” in this paper, we typically mean the CFO and the senior execu
    • 8737 Hits
    • Submitted By: aneeza
    • Company: Not given

  • unix questions

    USUALLY ASKED IN INTERVIEW........................................................................................
    • 33972 Hits
    • Submitted By: prem
    • Company: Not given

  • Perfect Online Data Visualization with HTML5 (JavaScript) Ga

    Online data visualization is very popular nowadays since it offers such advantages as getting data in real time and access from any location and device. More and more companies move their information monitoring and dashboard apps to web. And here they fac
    • 5617 Hits
    • Submitted By: Ekaterina Nebogina
    • Company: Not given

  • Guide for Assessing Personal Identity Verification Card Syst

    This paper serves as a primer for anyone preparing to perform a security/reliability assessment of a Personal Identity Verification (PIV) Card Issuer (PCI) Facility. First, a summary of Homeland Security Presidential Directive 12 (HSPD 12) provides the ob
    • 6408 Hits
    • Submitted By: Edward Busch
    • Company: Craven Community College

  • Selenium - A Brief Overview

    Our client SaaS E-commerce Product Company has been a lead-ing provider of SaaS e-commerce solutions to small and medium businesses. Its product is an integrated on-demand suite de-signed to facilitate expansion of business and enhanced sales. The suite h
    • 6843 Hits
    • Submitted By: harry
    • Company: 360Logica

  • Relevance

    Relevance is at the core of what we do. Our new survey on relevance sheds new light on the way consumers connect with companies, brands, organizations and non-profits. The white paper explores these questions about today’s most important communica
    • 6086 Hits
    • Submitted By: Evan Parker
    • Company: Brodeur Partners

  • Software Estimation - Bricked Estimation Method

    There are many estimation models available in IT industry even some for software development or some specific to software testing. This paper is focusing on Bricked Estimation Method that’s scale the project/service or work package. As with any other es
    • 6372 Hits
    • Submitted By: Ananda Pramanik
    • Company: Not given

  • Entity Extraction and Data Visualization - Real World Exampl

    Estimates of 80% or higher of the “Collective Knowledge Pool” within an organization is contained within Unstructured Information (text-based documents). Emails, Analysis Reports, Field Observation Notes, Interviews; for the most part unstructured tex
    • 6427 Hits
    • Submitted By: Arnold Villeneuve
    • Company: RIS

  • Security in cloud computing

    This Whitepaper is on topic "Security in Cloud Computing ". It covers the points regarding to security issues in cloud computing and solution approaches for security.
    • 9189 Hits
    • Submitted By: Amar Gondaliya
    • Company: Whitepearl

  • Life without ORM

    For many companies, including retailers, distributors and other individuals who are involved in transporting hazardous materials (hazmat) in consumer commodity quantities, utilization of the ORM-D exception is a common way of moving these items through
    • 6983 Hits
    • Submitted By: Anjela
    • Company: 3Ecompany



Advertisements