IT Agents  >   Standards Organizations  >   Internet Industry Standards Organizations  >  

American Registry of Internet Numbers

RSS Feed    Add to Google    Add to My Yahoo!
American Registry of Internet NumbersWhite Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Gain Faster Value from Your CMS
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights the true value of deploying a configuration management system (CMS).
Posted: 05 Mar 2014 | Published: 31 Jul 2012

Hewlett-Packard Company

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

CW+ Quocirca report: Reaping the benefits of IP geolocation
sponsored by ComputerWeekly.com
WHITE PAPER: As more and more human activity moves online, it is easy to think that geography no longer matters—surely the internet is without borders? Whilst in some cases this is true, more often than not online activity spills over into the real world.
Posted: 21 Oct 2011 | Published: 29 Sep 2010

ComputerWeekly.com

Security for Cloud Computing: 10 Steps to Ensure Success
sponsored by IBM
WHITE PAPER: This guide provides an essential reference for cloud security, offering information on the current cloud security landscape and assessing potential concerns.
Posted: 26 Feb 2014 | Published: 31 Dec 2012

IBM

UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010
sponsored by ComputerWeekly.com
WHITE PAPER: In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.
Posted: 25 Oct 2011 | Published: 02 Jun 2010

ComputerWeekly.com

Adapting to the Challenges of a Rapidly Changing Cardiology Landscape
sponsored by GE
WHITE PAPER: Read this resource that highlights current healthcare industry trends, and what this means for cardiology departments. Click now to learn more about an IT solution that accommodates challenges with better patient care, efficient workflows, and improved profitability.
Posted: 12 Feb 2014 | Published: 31 Dec 2013

GE

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Service-Oriented Cloud Computing Infrastructure (SOCCI) Framework
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Service-Oriented Cloud Computing Infrastructure (SOCCI) Framework from the Open Group.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

Magic Quadrant for On-Premises Application Integration Suites
sponsored by IBM
ANALYST REPORT: Integration is key to today's complex IT landscape, however with so many integration tools to choose from, selecting the right one(s) can be difficult. Make it easier with this Magic Quadrant report from Gartner, Inc., which compares top vendors in the application integration space, including IBM, Oracle, Microsoft, SAP, Red Hat, and more.
Posted: 08 Apr 2014 | Published: 27 Jun 2013

IBM

CW+: Manage your work more effectively with The Power of Slow
sponsored by ComputerWeekly.com
WHITE PAPER: Borrowed from the Japanese term for “chatter,” pecha kuchahas been praised as the new way to communicate in business.
Posted: 20 Oct 2011 | Published: 27 Oct 2010

ComputerWeekly.com

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett-Packard Company
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett-Packard Company

IPv6 Timeline: The Road to a New Protocol
sponsored by Hewlett-Packard Company
EGUIDE: This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett-Packard Company

Prepare Your Network for the Future: Embrace IPv6
sponsored by Hewlett-Packard Company
EGUIDE: This E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett-Packard Company

May Issue of Information Security Magazine: Data Protection: Going the Distance
sponsored by Information Security Magazine
EZINE: This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.
Posted: 05 May 2011 | Published: 05 May 2011

Information Security Magazine

Maturing Your DLP Strategy for Today’s Threats
sponsored by Sophos, Inc.
EGUIDE: Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Sophos, Inc.

ISM Essentials Guide – Threat Management
sponsored by Dell SecureWorks
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

Dell SecureWorks

DataPower SOA Appliance Service Planning, Implementation, and Best Practices
sponsored by IBM
EBOOK: This e-book will help you to better understand the effective use of the WebSphere DataPower family of appliances. It provides guidance on the best methods identified to date for building the various components that implement solutions as well as a checklist of items to consider when planning a solution.
Posted: 04 Oct 2011 | Published: 30 Jun 2011

TOPICS:  SOA | SOA Governance
IBM

Stopping Fake Antivirus: How to Keep Scareware off Your Network
sponsored by Sophos, Inc.
WHITE PAPER: This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Posted: 04 Oct 2011 | Published: 01 Sep 2011

Sophos, Inc.

Presentation Transcript: WWW - World Wide Weaponization
sponsored by ESET
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009

ESET

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare
sponsored by McAfee, Inc.
WHITE PAPER: Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often.
Posted: 08 Dec 2009 | Published: 07 Dec 2009

McAfee, Inc.

Download the Fall 2009 edition of Perform Magazine
sponsored by Actuate
EZINE: Download Perform today for informative and insightful articles including how open source is changing the face of enterprise software, tips from the field on how to ignite enterprises to reach new levels of performance excellence, and deliver unmatched insight to users.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

Actuate

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Feature and Technical Overview: BlackBerry Enterprise Server for Microsoft Exchange
sponsored by BlackBerry
PRODUCT OVERVIEW: The BlackBerry® Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. Continue reading for an overview of the features and technical aspects for the BlackBerry® Enterprise Server for Microsoft Exchange.
Posted: 18 Oct 2010 | Published: 15 Oct 2010

BlackBerry

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Information Security Magazine - December 2009 / January 2010: Basic Database Security
sponsored by Information Security Magazine
EZINE: This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Information Security Magazine

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Sunbelt Software

February Technical Guide on Cloud Compliance
sponsored by SearchCloudSecurity.com
EGUIDE: In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

SearchCloudSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement