Web applications

Results: 4002



#Item
711Internet search engines / Yahoo! / Social information processing / Web applications / Mobile search / Flickr / Jerry Yang / Google / Alibaba Group / World Wide Web / Computing / Internet

Microsoft WordK AC.doc

Add to Reading List

Source URL: s.yimg.com

Language: English - Date: 2015-05-27 18:17:00
712Google Chrome / Keyhole Markup Language / Cloud applications / Internet privacy / Google / Sergey Brin / Gmail / Christopher Soghoian / Surveillance / Software / Computing / Web 2.0

Tells the Facts and Names the Names April 1-15, 2010 Alexander Cockburn and Jeffrey St. Clair

Add to Reading List

Source URL: www.traviskelly.com

Language: English - Date: 2011-03-28 10:57:05
713Electronic commerce / Information technology management / Web development / Thing / Aussie / Comics / Sports / Marvel Comics / Web applications / Marketing

Become an Australian Made Homepage Hero now, and make sure your Aussie product is the first thing shoppers see when they visit australianmade.com.au. Lock in prominent homepage positions to get noticed first and drive mo

Add to Reading List

Source URL: australianmade.com.au

Language: English - Date: 2014-06-10 20:58:27
714Camino / Portland /  Oregon / Microsoft SQL Server / Software / Web development / Symantec

Faddah Steve Yuetsu Wolf CV Objective Seeking a career, growth-oriented position in Software Development and/or Quality Assurance for Web Development, Web Applications, Client/Server or Mobile Smartphone Applications.

Add to Reading List

Source URL: ialsowent.com

Language: English - Date: 2012-02-01 23:40:31
715Computing / Web 2.0 / Knowledge / Cognitive science / Hypertext / Knowledge management / Social media / Enterprise 2.0 / Personal knowledge management / Social information processing / World Wide Web / Information systems

Social Media Strategies, Tools & Applications The Hong Kong Polytechnic University The proliferation of social media, a kind of user-generated content, has been phenomenal in the past few years, partly attributed to the

Add to Reading List

Source URL: kmirc.ise.polyu.edu.hk

Language: English - Date: 2012-04-23 05:15:29
716Financial economics / Credit note / Cheque / Web applications / Business / Finance / Invoice

Managing Invoices Ad-ID codes are created at www.ad-id.org. In order to create a code, you must first have a group, prefix and account set up and associated to each other. This document will provide instructions on how t

Add to Reading List

Source URL: www.ad-id.org

Language: English - Date: 2014-11-21 17:52:58
717

Neotys annonce la disponibilité d’une nouvelle version de sa solution NeoLoad La solution de test de tenue en charge des applications web intègre de nouvelles fonctionnalités d’analyse des résultats, et propose d

Add to Reading List

Source URL: www.neotys.fr

Language: French - Date: 2012-08-01 05:49:16
    718World Wide Web / Semantic publishing / Ontology / Markup language / Web Ontology Language / Resource Description Framework / Semantic Web Stack / Social Semantic Web / Semantic Web / Information / Data

    Preface This book introduces theories, formalisms and applications that permit effective interaction between legal scholarly documents and their related semantic and formal descriptions, using the semantic technologies

    Add to Reading List

    Source URL: speroni.web.cs.unibo.it

    Language: English - Date: 2014-07-28 07:33:01
    719CPanel / MySQL / Lightweight Directory Access Protocol / Password / XAMPP / Software / Computing / Web applications

    NADA Security Checklist to be completed and signed by Consultants Version 1.0 Consultants tasked with installing the NADA software are required to complete and sign the following checklist and return it along with their

    Add to Reading List

    Source URL: www.ihsn.org

    Language: English - Date: 2013-05-29 12:50:02
    720Accounting software / Collaboration / Project management software / Microsoft Dynamics GP / Business / Invoice / Web applications

    Help Documents Enterprise Security Roles (Sec Roles) What are Sec Roles? Security Roles or Sec Roles in Enterprise are used to determine what functionality a user has access to in the system. What are the most common Sec

    Add to Reading List

    Source URL: www.tempworks.com

    Language: English - Date: 2015-03-16 16:27:38
    UPDATE