Found: 30

Select item for more details and to access through your institution.

  • Maintain Dialogue.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 4, doi. 10.1093/itnow/bwt033
    Publication type:
    Article
  • Where are we with Big Data?

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 6, doi. 10.1093/itnow/bwt034
    By:
    • Runciman, Brian
    Publication type:
    Article
  • Big Data, P, IP.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 8, doi. 10.1093/itnow/bwt035
    By:
    • Umeh, Jude
    Publication type:
    Article
  • Securing Big Data.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 10, doi. 10.1093/itnow/bwt036
    By:
    • Small, Mike
    Publication type:
    Article
  • What is Big Data?

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 12, doi. 10.1093/itnow/bwt037
    By:
    • Gordon, Keith
    Publication type:
    Article
  • Big Data Vision.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 14, doi. 10.1093/itnow/bwt038
    By:
    • Davison, Adam
    Publication type:
    Article
  • Big Data and Patient Care.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 16, doi. 10.1093/itnow/bwt039
    By:
    • Whatling, Justin
    Publication type:
    Article
  • Data Mountain.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 18, doi. 10.1093/itnow/bwt040
    By:
    • Tucker, Henry
    Publication type:
    Article
  • Who Are You?

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 20, doi. 10.1093/itnow/bwt041
    By:
    • Bennett, Louise
    Publication type:
    Article
  • Your Resources: Big Data.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 22, doi. 10.1093/itnow/bwt042
    By:
    • Wilcox, Helen
    Publication type:
    Article
  • Holistic Security.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 24, doi. 10.1093/itnow/bwt043
    By:
    • Niblett, Gareth
    Publication type:
    Article
  • Cloud Surfing.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 26, doi. 10.1093/itnow/bwt044
    By:
    • Sutton, David
    Publication type:
    Article
  • Avoiding Cyberwash.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 28, doi. 10.1093/itnow/bwt045
    By:
    • Wilson, Piers
    Publication type:
    Article
  • Role with IT.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 30, doi. 10.1093/itnow/bwt046
    By:
    • Barwise, Mike
    Publication type:
    Article
  • Data, Data Everywhere.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 32, doi. 10.1093/itnow/bwt047
    By:
    • Banks, Ben
    Publication type:
    Article
  • Take Control.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 34, doi. 10.1093/itnow/bwt048
    By:
    • Mitchell, John
    Publication type:
    Article
  • Security Update.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 36, doi. 10.1093/itnow/bwt049
    By:
    • Smith, Andy
    Publication type:
    Article
  • Data Protection.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 38, doi. 10.1093/itnow/bwt050
    By:
    • Walker-Osborn, Charlotte;
    • Fitzsimons, Liz;
    • Ruane, James
    Publication type:
    Article
  • Taking Care.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 40, doi. 10.1093/itnow/bwt051
    By:
    • Whatling, Justin
    Publication type:
    Article
  • 3D Technology.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 42, doi. 10.1093/itnow/bwt052
    By:
    • Blundell, Barry G
    Publication type:
    Article
  • Education Versus Skills.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 44, doi. 10.1093/itnow/bwt053
    By:
    • Jagger, Paul D
    Publication type:
    Article
  • Change Master.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 48, doi. 10.1093/itnow/bwt054
    By:
    • Waugh, Kevin
    Publication type:
    Article
  • Video Game Violence Effects.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 50, doi. 10.1093/itnow/bwt055
    Publication type:
    Article
  • Communication and Engagement.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 52, doi. 10.1093/itnow/bwt056
    By:
    • Sharman, Geoff
    Publication type:
    Article
  • Are Scrum and Kanban Enough ?

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 54, doi. 10.1093/itnow/bwt057
    By:
    • Raizada, Ravi
    Publication type:
    Article
  • CIO vs. CDO.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 56, doi. 10.1093/itnow/bwt058
    By:
    • Harris, Richard
    Publication type:
    Article
  • A Layered Practice.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 58, doi. 10.1093/itnow/bwt059
    By:
    • Mason, Catherine
    Publication type:
    Article
  • The Computer Journal.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 60, doi. 10.1093/itnow/bwt060
    Publication type:
    Article
  • Your Resources.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 64, doi. 10.1093/itnow/bwt061
    By:
    • Wilcox, Helen
    Publication type:
    Article
  • Days Past.

    Published in:
    ITNOW, 2013, v. 55, n. 3, p. 66, doi. 10.1093/itnow/bwt062
    Publication type:
    Article