IT Agents  >   Standards Organizations  >   Electronics Industry Standards Organizations  >  

CIE

RSS Feed    Add to Google    Add to My Yahoo!
CIEWhite Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

SearchSecurity.com

Mobility’s Potential for Productivity and Pitfalls
sponsored by CA Technologies.
RESOURCE: In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

CA Technologies.

Software company mathematically proves JRebel helps deliver software 40% faster
sponsored by ZeroTurnaround
CASE STUDY: In this brief case study, learn how NetworkedAssets improved their development productivity and experienced a 40% increase in velocity by leveraging a technology that enables you to instantly view code changes, eliminating turnaround time.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

Storage Magazine: March
sponsored by SearchStorage.com
EZINE: This issue of Storage Magazine breaks down the DR planning process and offers tips to help organizations increase their ability to tolerate disruptive events. It also covers the key findings from a recent report on storage arrays and rounds up the newest players in the PCIe solid state landscape.
Posted: 04 Mar 2013 | Published: 01 Mar 2013

SearchStorage.com

Creating and Enforcing Email Security Policies
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Eliminate the hidden costs of records management
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn about the hidden costs of records management. Access detailed worksheets that will allow you to estimate your own company's savings opportunities in leveraging a solution that manages both electronic and physical records.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

Iron Mountain

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchSecurity.com

FlexPod Express: An Easy to Deploy Virtualisation Solution for SMBs
sponsored by Cisco & NetApp
WHITE PAPER: Access this resource to learn how to simplify your IT infrastructure and team through an easy to deploy and low-cost solution for SMBs turning towards virtualisation. By using best in class building blocks from top tech companies, you equip your business with an easy to scale virtual infrastructure to consolidate IT and improve efficiency.
Posted: 10 Nov 2014 | Published: 04 Dec 2013

Cisco & NetApp

Red Hat Storage and Red Hat Enterprise Virtualization
sponsored by Red Hat
WHITE PAPER: This fascinating brief discusses the need for more efficient, cost-effective storage and delves into one solution that accomplishes just that by converging virtualization and storage.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Red Hat

Help Desk Best Practices for IT Departments
sponsored by LabTech Software
WHITE PAPER: Explore the top 5 help desk best practices every service provider should be aware of to ensure responsive and timely support for your clients when issues do arise.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

LabTech Software

Top HR challenges and strategies to resolve them
sponsored by Iron Mountain
WHITE PAPER: Organizing, indexing and storing info is paramount to HR departments today. This paper offers up five best practices for elevated HR efficiency. Read this and learn why reducing paper, employing a hybrid approach based on both paper and digital records, and joining forces with a trusted partner can enable swifter and more efficient operations.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Iron Mountain

Red Hat JBoss BPM Suite 6 Datasheet
sponsored by Red Hat
WHITE PAPER: Organizations that are looking for intelligence business process management often find themselves contemplating whether or not Red Hat JBoss BPM Suite is right for them—so when it comes down to it, should it be your next choice? Consult the following data sheet to find out the benefits, features, and ultimately, if the technology is right for you.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Red Hat

Consolidated Management: Resolve, Report and Prevent Backup Failures
sponsored by APTARE
WHITE PAPER: This short white paper provides insight into tips for effective prevention, reporting and resolution of backup failures.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Backup Duplication Report Ensures All Backups are Completed
sponsored by APTARE
CASE STUDY: This white paper examines how one organization easily and affordably implemented a backup software that ensures all backups are completed for all copies of their data.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses
sponsored by SearchDataCenter.com
EBOOK: Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

SearchDataCenter.com

Sorting Storage Options on AWS
sponsored by SearchAWS
EBOOK: Sorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchAWS

The Future of Desktop Virtualization, Chapter 4
sponsored by SearchSecurity.com
EBOOK: This expert resource discusses how bring your own device (BYOD) policies, when used in conjunction with virtual desktop infrastructure (VDI), can return control back to IT while reducing the administrative and management headaches commonly associated with user-owned devices in the enterprise.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

SearchSecurity.com

Putting Data Governance and Stewardship Into Play
sponsored by SearchDataManagement
EBOOK: For a data governance plan to be truly effective, organizations must examine key success factors for data stewardship and data governance programs. In this expert three-part handbook, learn how to ensure that data governance and stewardship plans stick in your organization.
Posted: 29 Aug 2013 | Published: 29 Aug 2013

SearchDataManagement

8 tips to ensure your server technology supports your business growth
sponsored by ComputerWeekly.com
WHITE PAPER: Servers are the workhorse of the modern business, and as IT demands increase, so your server technology needs to be able to grow and scale cost-effectively to meet future requirements.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

Data Protection Technical Guide
sponsored by SearchSecurity.com
EBOOK: This whitepaper examines some of the challenges associated with deploying DLP, identifies common pitfalls, and explains how DLP can be used effectively. Learn from CSOs and other experts as they share what you need to know when it comes to DLP technologies.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

SearchSecurity.com

IBM Predictive Maintenance and Quality for metals and mining
sponsored by IBM
WHITE PAPER: The following white paper examines the current market struggles and operational challenges that are being faced by many industrial companies. Read on to learn how by implementing a predictive maintenance and quality solution, businesses can reduce operational costs, improve equipment productivity, and more.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

IBM

7 Proven Practices to Strengthen Release Management
sponsored by IBM
WHITE PAPER: Taking an application from development to production can be a long, arduous process - but it doesn't have to be. With the right approach to release management, you can accelerate application deployment as well as reduce risks typically associated with rapid deployment.
Posted: 07 Oct 2013 | Published: 30 Sep 2013

IBM

Mobile Security: How to Protect the Enterprise in the Mobile Era
sponsored by Dell Software
WHITE PAPER: Find out about the three pillars of mobile security that give users the flexibility and access they need, and provide a strong foundation to protect your data.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Expert Tips for a Successful BYOD Security Policy
sponsored by 1e Inc
EGUIDE: This exclusive e-guide offers an in-depth look at BYOD security policies and best practices. Read on to learn more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

1e Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
CIE White Papers | CIE Multimedia | CIE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement