Skip to main content

Home/ educational resources/ Group items matching "Data" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Alex Parker

Local councils back data sharing to allow broadband speed comparison - 1 views

  •  
    Digital Economy Bill will see its second reading today in the House of Commons. An association of local councils has supported plans for Ofcom to be able to require broadband providers to share data so that people can more easily see the speeds they will get in their actual home, rather than just in the local area.
Alex Parker

Borderless Analytics tackles hybrid cloud analytic latency - 1 views

  •  
    Teradata rolls out a number of analytics enhancements. One of the problems with hybrid cloud is the impact that it has on data analytics as it often results in difficulties in locating data, and slows the whole process. Teradata believes it has solved this problem with Borderless Analytics.
Hurray Software Academy

Android Training|IT Training in Bangalore|HURRAY - 0 views

  •  
    IT training in Bangalore,Android training provides you to build great apps on android,developing android apps,its data storage and user interface,best android training institute in bangalore. For more details visit: http://hurray.ind.in/android.html
Alex Parker

Why your business needs a chief data officer - 1 views

  •  
    Why your business needs a chief data officer
tech vedic

HARD DRIVE WIPE - 0 views

  •  
    Want to get rid of your old computer? But, remember to erase all your personal information from its hard drive before discarding it. In this tutorial, follow the steps to wipe out the hard drive of your computer for cleaning its data.
Alex Parker

10 of the most popular Big Data tools for developers - 1 views

  •  
    The market is full of tools for developers but CBR has compiled a list of the best.
Alex Parker

4 data centres that have survived bomb threats - 1 views

  •  
    CBR lists the major sites that have been targeted by bomb threats.
Alex Parker

Top 10 4G data plans: Which UK network offers the most? - 1 views

  •  
    Any cinema-goer will know that Kevin Bacon "don't like waiting for anything" - but what of us, the British public? We are now constantly wired into the internet, streaming videos and updating social media profiles, and 4G is a big part of this. CBR rounds up the biggest 4G data bundles out there.
tech vedic

How to get back Recycle-bin after deleting it in Windows XP? - 0 views

  •  
    Suppose, you intentionally deleted some data from your system with an objective to avoid clutter, but the very next moment you found that you had done a blunder actually -indeed a bizarre situation. But don't worry. Techvedic, a leading tech support vendor, goes the extra mile to help you recover Windows XP Recycle Bin.
Alex Parker

Data breaches - hackers have nothing on your own employees - 1 views

  •  
    Norman Shaw, Founder and CEO of ExactTrak, on human error as the main cause of data breaches and to protect against it.
Alex Parker

What came first: the data or the tech? - 1 views

  •  
    The evolution of data, in-memory technology, and the future it holds.
Alex Parker

Top Five things learned at today's London data centre summit - 1 views

  •  
    Public cloud acceptance by the Enterprise means more not fewer challenges... Today in London Gartner held day one of its two day Data Centre, Infrastrucuture and Operations Management Summit. Here is what we learned this morning: 1) Public cloud acceptance by enterprise means more not fewer challenges 2) Asked if security breaches will slow public cloud adoption the consensus was that the answer was no.
Alex Parker

Mobile apps leaking data through ad networks - 1 views

  •  
    'Cross application' data sharing makes user vulnerable, says MWR InfoSecurity. Free mobile apps that use third-party advertising code are putting users in danger of being hacked, according to MWR InfoSecurity. The firm found that ad networks were inheriting the permissions of free apps, granting them access to the address books, text messages and emails of potential victims if the network was compromised by hackers.
Alex Parker

Hackers jump on Apple Watch to phish for data - 1 views

  •  
    Hype surrounding smartwatch exploited by cynical scammers. Hackers have jumped on the unveiling of the Apple Watch as a chance to phish for data through social networks, according to the security vendor Malwarebytes.
Alex Parker

Colo giant to host Vmware cloud and transfer data via lasers across space - 1 views

  •  
    Add to favorites Colo data centre giant Equinix will offer direct access to VMware vCloud Air on Platform in Europe and north America. It will available either via Equinix Cloud Exchange or via Direct Connect depending on location. The solution is available via Equinix Cloud Exchange in London, Silicon Valley and Washington, D.C.
tech vedic

Data Theft Alert - 0 views

  •  
    Think 100 times before taking help from local PC repair shop, if you once had sensitive files
tech vedic

How to check USB drives from spreading viruses? - 0 views

  •  
    Sometimes being unaware of the USB virus-or malware-infection, you may put your computer security at stake. The AutoPlay feature of the Windows, executes the file or program stored on your device, without asking for permission, and that may bring havoc on the operating system as well as the confidential data stored on the machine. Thus, you need to disable the AutoPlay feature to deter such security breaching.
tech vedic

10 secrets for creating professional Excel Tables - 0 views

  •  
    Working with Excel - creating, viewing, editing and moving records - and understanding details thereof and deriving conclusion from it become easier with the advanced tools integrated with the Excel tables. For instance, if you want a row or column to come with total value, it would do so. Formatting and sorting data can be done in a quick and easy way without having much competence. And, eventually you can create a professional Excel tables that would help you manage information in a better manner.
tech vedic

How to secure files from other users on external disks? - 0 views

  •  
    External hard-disk or USB drive attached to a system running on OSX is vulnerable, as it could be accessed through other user-profiles easily. Apart from that, if the network file sharing feature is enabled, the external storage device could be accessed by anyone having the authority to get logged into the network. Thus, no matter you encrypted the drive or particular files or not, any unauthorized user can access your data, steal records and make changes into that. What to do? Techvedic, being a leader in tech support, offers you practical and effective solution.
bluecube IT

Online Training and Placement on SAP and All IT Courses - 0 views

BluecubeIT Provides Advanced Online IT Course Training and Placement on SAP, JAVA, BA, PeopleSoft, Oracle APPS, Data Warehouse, Testing Tools QA QTP, TIBCO, SQL Server, SAS, Dot Net etc., to all Wo...

SAP Online Training HANA Course SQL JAVA Institute QA BA PeopleSoft SharePoint Jobs in USA and Placement Oracle DBA SAS QTP Classes E-Learning No 1 ALL MODULES APPS Testing Tools Data Warehouse Network System Admin Middleware Technologies Web Sphere PL_SQ

started by bluecube IT on 19 Oct 12 no follow-up yet
‹ Previous 21 - 40 of 92 Next › Last »
Showing 20 items per page