Search

Your search keyword '"Coffee, Peter"' showing total 154 results

Search Constraints

Start Over You searched for: Author "Coffee, Peter" Remove constraint Author: "Coffee, Peter" Topic information technology Remove constraint Topic: information technology
154 results on '"Coffee, Peter"'

Search Results

1. Making a Privacy Investment

2. Easing the IT Budget Process

3. ROI: More than a good idea

4. The measure that matters

5. Keep thinking inside the box

6. We will pay for junk forever

7. Is infowar good business?'

8. Does it still hurt so bad?

9. The best of times in the next millennium

10. Personal IT and the 24-by-7 life: Buzz cut or bouffant? Before we lament the scalping of our personal lives let's look at the style of life that we now have

11. Getting users out of the IT loop

12. Math sharpens IT's competitive edge : Applications depend on increasingly complex algorithms for speed, security and cost reduction

13. Measuring IT as a valuable asset

14. Public perception threatens IT policy

15. India Teaches a Lesson About IT Tools as Weapons

16. The amazing expanding programmer shortfall

17. IT productivity debates ask the wrong questions

18. Technology must be advanced, not curbed

19. WHAT ON EARTH?

20. Researchers reinvent tech.

21. MOVING IT FORWARD.

22. Security is a moving target.

23. Defining tomorrow's database.

24. IN PURSUIT OF A CRM PROCESS.

25. Developers' growing challenge.

26. Take care to follow right storage path.

27. Taking the full measure of IT.

28. Investment cycle 'back on track'

29. SECURITY STEP 1: ASSESSMENT.

30. From both ends to the middle.

31. SOA demands new way of thinking.

32. Mastering DODAF will reap dividends.

33. Cultivating future services.

34. Java Studio Enterprise builds on NetBeans.

35. App developers 'loosen up'

36. Utility model is at work today.

37. Making IT more manageable.

38. Assuring software quality.

39. Business intelligence quotient.

40. JBuilder's gains impressive.

41. TECH OUTLOOK 2003 ENTERPRISE ARCHITECTURE.

42. DATA MODEL EVOLUTION.

43. FOCUS ON IDENTITY, VIGILANCE.

44. Concentrate on the core technologies.

45. VIGILANCE.

46. Tuple data model faces real world.

47. Why pen and paper is still the pervasive PDA.

48. Managing security success.

49. Cyber Monday, 2007.

50. Don't push the process.

Catalog

Books, media, physical & digital resources