Vertical Industries  >   Information Industry  >  

Archives

RSS Feed    Add to Google    Add to My Yahoo!
Archives White Papers (View All Report Types)
 
How Finance Teams Can Help Their Organizations Get Future-Ready
sponsored by IBM
WHITE PAPER: This white paper explores how finance teams can improve performance management, embrace lean practices, implement a scrum methodology, and more. Access now to find out what the best practices are for making your business future-ready.
Posted: 16 Jun 2016 | Published: 30 Jan 2015

IBM

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation
sponsored by SearchDataCenter.com
EBOOK: This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.
Posted: 23 May 2011 | Published: 23 May 2011

SearchDataCenter.com

Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance.
Posted: 01 Aug 2011 | Published: 26 Jul 2011

SearchSecurity.com

Why Microsoft Office 365 Native Archiving Isn’t Enough
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover 5 questions that you should be asking about how 0ffice 365 is able to archive your enterprise's emails. Learn how eDiscovery fits into the email system, how much in-house control IT and legal teams have, if your teams need immutable copies of records, and more.
Posted: 08 Sep 2016 | Published: 10 Dec 2015

Proofpoint, Inc.

The myth of email as proof of communication
sponsored by ComputerWeekly.com
ANALYST REPORT: Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

ComputerWeekly.com

Expert E-zine: Who has access to your email?
sponsored by SearchSecurity.com
EZINE: In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers.
Posted: 15 Dec 2011 | Published: 14 Dec 2011

SearchSecurity.com

Virtualizing your Exchange Server: Fact vs. fiction
sponsored by SearchDataCenter.com
EBOOK: Find out what's fact and what's fiction about virtualizing your Exchange Server. What steps should you take, and how can you ensure success? Explore all these questions and more in this e-book.
Posted: 14 Dec 2011 | Published: 14 Dec 2011

SearchDataCenter.com

eGuide: Email Security and Compliance Best Practices
sponsored by SearchSecurity.com
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

SearchSecurity.com

Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010
sponsored by SearchDataCenter.com
EBOOK: Migrating to Exchange Server 2010 from the 2007 edition is becoming a must, as the 2010 edition offers improved email archiving, high-availability, and optimal storage features. But as you begin to explore the possibilities of upgrading to Exchange 2010, do you have a proper plan in place?
Posted: 20 May 2011 | Published: 20 May 2011

SearchDataCenter.com

Exchange Server: E-mail Archiving and Security
sponsored by SearchSecurity.com
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Top strategies to master an Exchange 2010 migration
sponsored by SearchDataCenter.com
EGUIDE: Find out how you can avoid the most common mistakes that Exchange admins make when migrating to Exchange 2010 in this e-guide. Plus, gain tips for how to properly document and plan your migration.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by SearchSecurity.com
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

SearchSecurity.com

Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010
sponsored by SearchDataCenter.com
EBOOK: While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

SearchDataCenter.com

About to Buy Guide: Spam/virus protection for Exchange
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

SearchSecurity.com

The Hidden Costs of Microsoft Office 365 Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Office 365 has been marketed as a cure-all for enterprises, but are its native security measures really all they seem? Learn the shortcomings of native Office 365 security features and how to shore up your enterprise's comprehensive security.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Proofpoint, Inc.

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Why Email Security Matters: The Advantages of Hosted Protection
sponsored by Solarwinds MSP
EBOOK: Discover the key advantages of hosted email protection. Learn this method's detailed protection mechanisms, which include blacklisting, antispam engines that look for telltale signatures, and real-time message source evaluation.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Solarwinds MSP

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Global lessons in eHealth implementation
sponsored by ComputerWeekly.com
JOURNAL ARTICLE: This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

ComputerWeekly.com

CW Buyer's Guide: Healthcare in IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This 7 page buyer's guide looks at the future of electronic healthcare records, healthcare technology and the use of mobile technology.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

ComputerWeekly.com

Kicking off an e-health revolution
sponsored by ComputerWeekly.com
EGUIDE: It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

Healthcare Cybersecurity Best Practices
sponsored by ServiceNow
EGUIDE: In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

ServiceNow

Pulse E-Zine: Managing BYOD and Security
sponsored by SearchHealthIT.com
EZINE: The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage.
Posted: 15 May 2013 | Published: 15 May 2013

SearchHealthIT.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement