IT Agents  >   Standards Organizations  >   Electronics Industry Standards Organizations  >  

CIE

RSS Feed    Add to Google    Add to My Yahoo!
CIEWhite Papers (View All Report Types)
 
Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Il business ha tante domande. Ecco le risposte
sponsored by IBM
WHITE PAPER: Esplora le soluzioni IBM System zEnterprise. Scopri come IBM può aiutarti a trovare le informazioni che ti permetteranno di battere la concorrenza.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

IBM

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

SearchSecurity.com

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

Storage Magazine: March
sponsored by SearchStorage.com
EZINE: This issue of Storage Magazine breaks down the DR planning process and offers tips to help organizations increase their ability to tolerate disruptive events. It also covers the key findings from a recent report on storage arrays and rounds up the newest players in the PCIe solid state landscape.
Posted: 04 Mar 2013 | Published: 01 Mar 2013

SearchStorage.com

Software company mathematically proves JRebel helps deliver software 40% faster
sponsored by ZeroTurnaround
CASE STUDY: In this brief case study, learn how NetworkedAssets improved their development productivity and experienced a 40% increase in velocity by leveraging a technology that enables you to instantly view code changes, eliminating turnaround time.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

Creating and Enforcing Email Security Policies
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Eliminate the hidden costs of records management
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn about the hidden costs of records management. Access detailed worksheets that will allow you to estimate your own company's savings opportunities in leveraging a solution that manages both electronic and physical records.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

Iron Mountain

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchSecurity.com

Backup Duplication Report Ensures All Backups are Completed
sponsored by APTARE
CASE STUDY: This white paper examines how one organization easily and affordably implemented a backup software that ensures all backups are completed for all copies of their data.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Consolidated Management: Resolve, Report and Prevent Backup Failures
sponsored by APTARE
WHITE PAPER: This short white paper provides insight into tips for effective prevention, reporting and resolution of backup failures.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Red Hat Storage and Red Hat Enterprise Virtualization
sponsored by Red Hat
WHITE PAPER: This fascinating brief discusses the need for more efficient, cost-effective storage and delves into one solution that accomplishes just that by converging virtualization and storage.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Red Hat

Help Desk Best Practices for IT Departments
sponsored by LabTech Software
WHITE PAPER: Explore the top 5 help desk best practices every service provider should be aware of to ensure responsive and timely support for your clients when issues do arise.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

LabTech Software

Top HR challenges and strategies to resolve them
sponsored by Iron Mountain
WHITE PAPER: Organizing, indexing and storing info is paramount to HR departments today. This paper offers up five best practices for elevated HR efficiency. Read this and learn why reducing paper, employing a hybrid approach based on both paper and digital records, and joining forces with a trusted partner can enable swifter and more efficient operations.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Iron Mountain

The Future of Desktop Virtualization, Chapter 4
sponsored by SearchSecurity.com
EBOOK: This expert resource discusses how bring your own device (BYOD) policies, when used in conjunction with virtual desktop infrastructure (VDI), can return control back to IT while reducing the administrative and management headaches commonly associated with user-owned devices in the enterprise.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

SearchSecurity.com

Sorting Storage Options on AWS
sponsored by SearchAWS
EBOOK: Sorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchAWS

E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses
sponsored by SearchDataCenter.com
EBOOK: Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

SearchDataCenter.com

Engineered for Success: 3 Top Ways Next-Gen Servers Support Business
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper outlines the three business driven strategies that next-gen servers support businesses. Learn how to achieve high levels of performance to support advanced analytics and CRM.
Posted: 14 Oct 2014 | Published: 01 Oct 2014

Dell, Inc. and Intel®

IBM Predictive Maintenance and Quality for metals and mining
sponsored by IBM
WHITE PAPER: The following white paper examines the current market struggles and operational challenges that are being faced by many industrial companies. Read on to learn how by implementing a predictive maintenance and quality solution, businesses can reduce operational costs, improve equipment productivity, and more.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

IBM

8 tips to ensure your server technology supports your business growth
sponsored by ComputerWeekly.com
WHITE PAPER: Servers are the workhorse of the modern business, and as IT demands increase, so your server technology needs to be able to grow and scale cost-effectively to meet future requirements.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

Data Protection Technical Guide
sponsored by SearchSecurity.com
EBOOK: This whitepaper examines some of the challenges associated with deploying DLP, identifies common pitfalls, and explains how DLP can be used effectively. Learn from CSOs and other experts as they share what you need to know when it comes to DLP technologies.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

SearchSecurity.com

7 Proven Practices to Strengthen Release Management
sponsored by IBM
WHITE PAPER: Taking an application from development to production can be a long, arduous process - but it doesn't have to be. With the right approach to release management, you can accelerate application deployment as well as reduce risks typically associated with rapid deployment.
Posted: 07 Oct 2013 | Published: 30 Sep 2013

IBM

Trends in business intelligence
sponsored by ComputerWeekly.com
IT BRIEFING: Several important technology changes, social trends and customer needs are driving the future development steps and functionality of Business Intelligence solutions, this report from Birchman reveals.
Posted: 21 Oct 2011 | Published: 18 Jan 2011

ComputerWeekly.com

CIO Executive ViewPoint: Transforming IT Sinkholes into Gold Mines
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore this in-depth resource to learn how you can restructure and optimize your IT operation and management to make more room in the budget for innovation. Read on now to find out more.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Cisco Systems, Inc.

Is an Open Source BPM Solution Right for You?
sponsored by Red Hat
WHITE PAPER: Consult this white paper to find out if open source BPM is right for your organization. You'll get an in-depth look at the benefits of open source software and BPM tools, and learn how using a single platform for BPM and business rules management (BRM) can benefit you.
Posted: 13 May 2014 | Published: 31 Jul 2013

Red Hat

Mobile Security: How to Protect the Enterprise in the Mobile Era
sponsored by Dell Software
WHITE PAPER: Find out about the three pillars of mobile security that give users the flexibility and access they need, and provide a strong foundation to protect your data.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
CIE White Papers | CIE Multimedia | CIE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement