Search Results for: Business-Continuity Financial-Services-Industry

   All     White Papers   Multimedia   IT Downloads 
31 - 40 of 7339 Matches Previous Page  |  Next Page
CW Special report on Atos
This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.

ComputerWeekly.com

Information security trends
This report from CompTIA, based on original research, assesses the current trends in information security.

ComputerWeekly.com

The Global Information Technology Report 2013
This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.

ComputerWeekly.com

Planning a Career Path in Cybersecurity
The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.

Global Knowledge

IBM System x Reliability Solution for Stratus everRun Enterprise Reference Architecture
This reference architecture document discusses the software components, design philosophy, and bill of material for the new System x Reliability Solution for Stratus everRun Enterprise, which combines industry-leading downtime prevention software from Stratus with resilient IBM System x servers, powered by the latest Intel® Xeon® processors.

Lenovo and Intel

Computer Weekly networking case studies
Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.

ComputerWeekly.com

IT Priorities 2014: UK Europe, France and Germany
Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.

TOPICS: Windows XP | Server Appliances | Network Performance Management Software | Network Infrastructure | Networking | Smart Phones | Business Continuity Planning | Network Provisioning | Security Architectures | Storage Systems | Storage Management Services | Identity Management | Security Tokens | WAN Switches | Tablet PC | ITIL | Security Policies | WAN Switching | Security Infrastructure | Security Hardware | Network Security Appliances | Server Consolidation | Windows Server Software | Storage Virtualization | Storage Consolidation | Software Implementation | Business Process Automation | Ethernet Networks | Mobile Middleware | Mobile Payments | Social Computing | Vulnerability Management | Software as a Service | Storage Security | Server Virtualization | Storage Appliances | Mobile Device Management | Mobile Device Management Software | Storage Virtualization Software | Storage Resource Management Software | Network Configuration Management | Storage Spending | Risk Assessment | Security Threats | Security Spending | Compliance Best Practices | Mobile CRM | Security Industry | Security Best Practices | Data Center Consolidation | Server Provisioning | Security Event Management | Software Virtualization | Workforce Management Software | Storage Switches | Security Managers | Cloud Computing | Desktop Virtualization | Data Center Networking | Data Loss Prevention (DLP) | Green Data Center | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Data Deduplication | Green Storage | Platform as a service | Hybrid clouds | Data Analytics | Windows 7 | Cloud CRM | Cloud Security | Cloud Storage | Infrastructure as a Service (IaaS) | Private Cloud | Public Cloud | Backup for Virtualized Servers | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Cloud Management | Cloud Backup | Cloud Archive | Cloud Storage Services | Cloud Disaster Recovery | Cloud Storage Strategy | Backup Server Hardware | Data Centers | Network Monitoring Software | CRM Software | Budgeting | Business Intelligence | Database Management Software | Backup Software | Backups | ERP Software | Disaster Recovery | WAN | Network Architectures | Tape Backups | Security Systems | NAS Software | Network Processors | Office Suites | Video Services | Server Software | NAS | Network Appliances | Storage Architectures | Business Process Management | ERP | Mobile Workers | CRM | Network Management | Storage Management | Outsourcing | Risk Management | Security | Network Security | Security Management | Security Audits | Application Development | Testing | Hardware | Server Hardware | Networking Hardware | Remote Access Hardware | Network Security Hardware | Videoconferencing Hardware | WAN Hardware | Storage Hardware | Storage Media | Storage Devices | Software | Security Standards | Videoconferencing Software | Security Software | Network Security Software | Supply Chain Software | Storage Management Software | Network Operating Systems | Windows | WLAN | Videoconferencing Services
ComputerWeekly.com

How Telcos Can Outpace Commoditization in the Application Economy
This white paper explores how telecommunications service providers are uniquely positioned to leverage their infrastructure, expertise, and insights to provide identity management services for the application economy.

CA Technologies.

Special Report on Cisco
This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.

ComputerWeekly.com

CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.

ComputerWeekly.com
31 - 40 of 7339 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement