Software  >   Systems Software  >   Utility Software  >  

File Conversion Tools

RSS Feed    Add to Google    Add to My Yahoo!
File Conversion Tools Reports
 
Check Amount Recognition Based on the Cross Validation of Courtesy and Legal Amount Fields
sponsored by Parascript LLC
WHITE PAPER: This paper is devoted to the description of the check reading system developed to recognize amounts on American personal checks.
Posted: 25 Aug 2002 | Published: 01 Jan 1999

Parascript LLC

The Business Value of one Open Source Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: One research firm interviewed four organizations leveraging a Java-based enterprise application platform to standardize and improve their app development efforts. Discover what these companies experienced as they tested this tool.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Red Hat

Business Management Solutions: Getting it right the first time
sponsored by Sage (UK) Limited
WHITE PAPER: When companies need an ERP solution, they sometimes rush into the selection process without first figuring out exactly what they want to achieve from their implementation, leaving them ultimately disappointed with their purchase decision. Learn how to find a comprehensive business management solution that won't leave you unsatisfied by reading on.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Sage (UK) Limited

Computer Weekly – 12 January 2016: How open source is beating proprietary software
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the impact of open source software and how it is underpinning the digital revolution. We examine the prospects for cloud in financial services as regulators give their approval. And we ask if Uber is really part of a new business model for the sharing economy. Read the issue now.
Posted: 08 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Eliminate 8 Elements of Waste and Prevent Technical Debt
sponsored by CA Technologies
WHITE PAPER: In this white paper, you'll learn how to eliminate eight types of waste in IT that add no value to the software services delivered to customers. Uncover ways to prevent value erosion in new software services, while paying down legacy technical debt that impedes enterprise responsiveness.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

CA Technologies

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Key Reasons to Use Software-defined Storage—and How to Get Started
sponsored by IBM
WHITE PAPER: This white paper discusses the benefits of SDS and the reasons for adopting it. It then gives a brief guide on how to get started with implementing SDS.
Posted: 18 Mar 2015 | Published: 28 Feb 2015

IBM

CW Buyer's Guide: SaaS Management
sponsored by ComputerWeekly.com
EZINE: Computer Weekly looks at how organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance; the number of compliance issues that come with SaaS; and how CIOs believe SaaS providers must better meet their needs in terms of simplicity and flexibility.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

ComputerWeekly.com

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement