Software  >   Systems Software  >   Databases  >  

Full-Text Databases

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Text Databases
DEFINITION: A full-text database is a compilation of documents or other information in the form of a database in which the complete text of each referenced document is available for online viewing, printing, or downloading. In addition to text documents, images are often included, such as graphs, maps, photos, and diagrams. A full-text database is searchable by keyword, phrase, or both. When an item in a full-text  … 
Definition continues below.
Full-Text Databases Reports
101 - 125 of 1404 Matches Previous Page  |  Next Page
Analytics, Decision Making & Teams That Do It Right
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Experts advise how to make the most of analytics in this report from SAS and the Harvard Business Review.
Posted: 12 Oct 2012 | Published: 05 Oct 2012

ComputerWeekly.com

APIs: Building an On-Ramp to the Digital Enterprise
sponsored by TIBCO Software Inc.
WHITE PAPER: Discover how to capitalize on the API economy and view apps as ecosystems. Learn about the importance of API management, as well as how to incorporate APIs into your strategies for IoT data management, microservices-based development, building mobile apps, and more.
Posted: 15 Aug 2017 | Published: 02 Mar 2016

TIBCO Software Inc.

APIs: Enhancing Retail, Mobile, and Integration Strategies
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper explores how an API-based strategy is essential to multichannel, cross-device access to essential data for developers – whether they be in-house, partners, or affiliates. Discover how companies like Netflix, Expedia, and Citibank are leveraging APIs to accelerate their mobile strategies, transform partner integrations, and more.
Posted: 17 Nov 2016 | Published: 22 Sep 2015

TIBCO Software Inc.

Application Modernisation: The Essential Guide
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

Architecting A Platform For Big Data Analytics
sponsored by IBM
WHITE PAPER: This Intelligent Business Strategies paper explains the new technical and data requirements for identifying, processing, and analyzing data. Discover how to become a disruptor by gaining an understanding of shifting customer behavior.
Posted: 15 Jul 2016 | Published: 31 Mar 2016

IBM

Ardent Partner Research: The CPO and CIO's New Approach to Evaluating Enterprise Technology
sponsored by Coupa
RESEARCH CONTENT: This Ardent Partners research report is a reminder of the TCO model to estimate the cost and value of these enterprise technology investments in the era of digital transformation and innovation.
Posted: 12 Jan 2017 | Published: 30 Dec 2016

Coupa

Availability and Risk Avoidance for the Software-Defined Data Center
sponsored by Veeam Software
WHITE PAPER: Users demand access to information and applications at any given time from anywhere and any device, without tolerance for downtime or data loss. Access this white paper to learn how to keep your software-defined data center up and running at all times with backup and replication that won't leave you in the dark like legacy tools.
Posted: 01 Jun 2017 | Published: 16 Aug 2016

Veeam Software

Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Analyze Your Data with IBM Cognos Enterprise
sponsored by IBM
WEBCAST: This webcast offers a creative, yet comprehensive approach to help understand business analytics and how to use them to their potential.
Posted: 15 Oct 2013 | Premiered: Oct 15, 2013

IBM

Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It
sponsored by Bloxx, Inc.
WHITE PAPER: The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Bloxx, Inc.

Apache Hadoop Patterns of Use
sponsored by Hortonworks
WHITE PAPER: When it comes to Hadoop, the technology most often associated with big data, why is it so popular? Does it actually live up to the vendor hype? Check out this informative resource to get the real guidance you need to figure out where Hadoop fits into your organization, and how you can leverage it to extract the most from your big data.
Posted: 17 Jul 2013 | Published: 30 Apr 2013

Hortonworks

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Application Retirement: Enterprise Data Management Strategies for Decommissioning Projects
sponsored by IBM
WHITE PAPER: This paper describes how incorporating an enterprise data management solution into your decommissioning project can help your company increase the business value of your enterprise applications.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

IBM

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Apria Healthcare is able to improve care services and expand its reach with IBM Analytics
sponsored by IBM
VIDEO: This video shows how Apria Healthcare improved data integrity with analytics tools. Learn how this centralized source-of-truth allowed Apria to cut out the inefficiencies caused by spreadsheets and build an accurate view of its costs and services.
Posted: 02 Aug 2016 | Premiered: 23 Jun 2016

IBM

Are Software-Defined Data Centers the Next Frontier of Virtualization?
sponsored by Hewlett Packard Enterprise
EGUIDE: The word is out about software-defined data centers, but awareness isn't the same as understanding or acceptance. In this e-guide, Dan Kusnetzky, founder and principal analyst of market research firm Kusnetzky Group LLC, explores the new frontier that is SDDC and prepares you for your potential future.
Posted: 27 Dec 2016 | Published: 23 Dec 2016

Hewlett Packard Enterprise

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Asset Management Firm's Switch to Caché From a Relational Database Improves Performance, Reduces Risk
sponsored by InterSystems
WHITE PAPER: In this case study, explore how a global asset management firm based in Boston, MA transitioned from a relational database to Caché to help mitigate investment, operational, and technological risk. Tap into how they increased flexibility and reliability, boosted database performance, and more.
Posted: 11 Jul 2016 | Published: 30 Apr 2014

InterSystems

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Audit Tracking & SOX Compliance
sponsored by RevSoft
WHITE PAPER: Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines
sponsored by DellEMC and Intel®
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

DellEMC and Intel®

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.
101 - 125 of 1404 Matches Previous Page    3 4 5 6 7 8    Next Page
 
FULL-TEXT DATABASES DEFINITION (continued): …  database is viewed, it may appear in ASCII format (as a text file with the .txt extension), as a word-processed file (requiring a program such as Microsoft Word), as an PDF) file. When a document appears as a PDF file, it is usually a scanned hardcopy of the original article, chapter, or book. Full-text databases are used by college and university libraries as a convenience to their students and staff. Full-text databases are ideally suited to online courses of study, where the student remains at home and obtains course materials by downloading them from the Internet. Access to these databases … 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement