Found: 30
Select item for more details and to access through your institution.
Maintain Dialogue.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 4, doi. 10.1093/itnow/bwt033
- Publication type:
- Article
Where are we with Big Data?
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 6, doi. 10.1093/itnow/bwt034
- By:
- Publication type:
- Article
Big Data, P, IP.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 8, doi. 10.1093/itnow/bwt035
- By:
- Publication type:
- Article
Securing Big Data.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 10, doi. 10.1093/itnow/bwt036
- By:
- Publication type:
- Article
What is Big Data?
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 12, doi. 10.1093/itnow/bwt037
- By:
- Publication type:
- Article
Big Data Vision.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 14, doi. 10.1093/itnow/bwt038
- By:
- Publication type:
- Article
Big Data and Patient Care.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 16, doi. 10.1093/itnow/bwt039
- By:
- Publication type:
- Article
Data Mountain.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 18, doi. 10.1093/itnow/bwt040
- By:
- Publication type:
- Article
Who Are You?
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 20, doi. 10.1093/itnow/bwt041
- By:
- Publication type:
- Article
Your Resources: Big Data.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 22, doi. 10.1093/itnow/bwt042
- By:
- Publication type:
- Article
Holistic Security.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 24, doi. 10.1093/itnow/bwt043
- By:
- Publication type:
- Article
Cloud Surfing.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 26, doi. 10.1093/itnow/bwt044
- By:
- Publication type:
- Article
Avoiding Cyberwash.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 28, doi. 10.1093/itnow/bwt045
- By:
- Publication type:
- Article
Role with IT.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 30, doi. 10.1093/itnow/bwt046
- By:
- Publication type:
- Article
Data, Data Everywhere.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 32, doi. 10.1093/itnow/bwt047
- By:
- Publication type:
- Article
Take Control.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 34, doi. 10.1093/itnow/bwt048
- By:
- Publication type:
- Article
Security Update.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 36, doi. 10.1093/itnow/bwt049
- By:
- Publication type:
- Article
Data Protection.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 38, doi. 10.1093/itnow/bwt050
- By:
- Publication type:
- Article
Taking Care.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 40, doi. 10.1093/itnow/bwt051
- By:
- Publication type:
- Article
3D Technology.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 42, doi. 10.1093/itnow/bwt052
- By:
- Publication type:
- Article
Education Versus Skills.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 44, doi. 10.1093/itnow/bwt053
- By:
- Publication type:
- Article
Change Master.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 48, doi. 10.1093/itnow/bwt054
- By:
- Publication type:
- Article
Video Game Violence Effects.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 50, doi. 10.1093/itnow/bwt055
- Publication type:
- Article
Communication and Engagement.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 52, doi. 10.1093/itnow/bwt056
- By:
- Publication type:
- Article
Are Scrum and Kanban Enough ?
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 54, doi. 10.1093/itnow/bwt057
- By:
- Publication type:
- Article
CIO vs. CDO.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 56, doi. 10.1093/itnow/bwt058
- By:
- Publication type:
- Article
A Layered Practice.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 58, doi. 10.1093/itnow/bwt059
- By:
- Publication type:
- Article
The Computer Journal.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 60, doi. 10.1093/itnow/bwt060
- Publication type:
- Article
Your Resources.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 64, doi. 10.1093/itnow/bwt061
- By:
- Publication type:
- Article
Days Past.
- Published in:
- ITNOW, 2013, v. 55, n. 3, p. 66, doi. 10.1093/itnow/bwt062
- Publication type:
- Article