Vertical Industries  >   Leisure Industry  >  

Cafes

RSS Feed    Add to Google    Add to My Yahoo!
Cafes White Papers (View All Report Types)
 
Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

How to tackle information classification
sponsored by ComputerWeekly.com
WHITE PAPER: The aim of this paper is to demonstrate how information classification can be used to enhance security within a Collaboration Oriented Architecture.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

How to reach maximum 802.11n speed and throughput: Best practices
sponsored by AdvizeX Technologies
EGUIDE: SearchNetworking.com presents this e-guide which takes a closer look at best practices to reach maximum 802.11n speed and throughput. Uncover what you can realistically expect from 802.11n and tips to expand coverage.
Posted: 06 Jun 2011 | Published: 06 Jun 2011

AdvizeX Technologies

The business benefits of switching to mobile TV
sponsored by ComputerWeekly.com
WHITE PAPER: Over the past two years, the mobile TV landscape has changed dramatically.
Posted: 25 Oct 2011 | Published: 22 Nov 2010

ComputerWeekly.com

Implement VDI Your Users Will Love
sponsored by Citrix
WHITE PAPER: This whitepaper examines the essential features of a successful VDI implementation that meets all of your organizational and end-users requirements.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

Citrix

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Smart Cities: The anywhere working city
sponsored by ComputerWeekly.com
INFORMATION CENTER: This report from Microsoft presents a vision for the development of smart cities which bring together technology, architecture and people.
Posted: 08 May 2012 | Published: 08 May 2012

ComputerWeekly.com

CW Buyer's Guide to Enterprise Collaboration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organization's communications strategy.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

The New VDI Reality E-Book Chapter 2: The Promise and Reality of VDI
sponsored by SearchVirtualDesktop.com
EBOOK: This e-book chapter digs into the reality of VDI, including where it works, where it doesn't, and some of the challenges it faces along with how people are using VDI in the real world (including scenarios where people are not using VDI).
Posted: 30 Jul 2014 | Published: 30 Jul 2014

SearchVirtualDesktop.com

Analyst Insight: Is There a Smart City Market?
sponsored by ComputerWeekly.com
ANALYST REPORT: The value of the IT market for smart cities globally is approximately $35bn, according to this in depth analysis from Ovum.
Posted: 10 May 2012 | Published: 10 May 2012

ComputerWeekly.com

Mobile NFC in Retail
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the GSMA explains the opportunities for NFC Mobile communications in retail.
Posted: 09 Nov 2012 | Published: 01 Nov 2012

ComputerWeekly.com

The work/life report: The Hybrid Organisation: Technology
sponsored by ComputerWeekly.com
WHITE PAPER: The enterprise must be ready to embrace technologies that facilitate the blurring of the boundaries between work and life, in order to maximise the productivity, insight, innovation and collaboration gained from investments in its people, as well as technology itself.
Posted: 24 Oct 2011 | Published: 15 Jun 2010

ComputerWeekly.com

Optimising your OmniPayments: Consumers, payments and the future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

ComputerWeekly.com

CW+ Quocirca report: Reaping the benefits of IP geolocation
sponsored by ComputerWeekly.com
WHITE PAPER: As more and more human activity moves online, it is easy to think that geography no longer matters—surely the internet is without borders? Whilst in some cases this is true, more often than not online activity spills over into the real world.
Posted: 21 Oct 2011 | Published: 29 Sep 2010

ComputerWeekly.com

Cloud computing in the public sector
sponsored by ComputerWeekly.com
WHITE PAPER: This report looks at the promise and issues of cloud computing as described today, along with the direction cloud needs to take in order to fulfil on its promise.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Freedom to Roam
sponsored by ComputerWeekly.com
EZINE: This month, CW Europe looks in-depth at an issue that is set to impact people across all 28 European Union member states, the abolition of mobile roaming charges, set for mid-2017.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

ComputerWeekly.com

IPv6 Leakage and DNS Hijacking in Commercial VPN clients
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

ComputerWeekly.com

Retail's digital future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Women in IT: Inspiring the next generation
sponsored by ComputerWeekly.com
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com

Computer Weekly - 14 February 2012: Does government IT deliver value for money?
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications.
Posted: 13 Feb 2012 | Published: 14 Feb 2012

ComputerWeekly.com

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Presentation Transcript: Five Things You Must Do Before Letting Your Employees Work From Anywhere
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This presentation transcript explores how businesses can leverage the latest technologies to transform their workplaces and create collaborative, mobile and productive environments. Learn about the benefits of implementing a connected workplace strategy.
Posted: 13 Jul 2012 | Published: 13 Jul 2012

Dell, Inc. and Intel®

A special issue celebrating 30 years of MicroScope
sponsored by MicroScope
EZINE: A special issue celebrating the 30th anniversary of MicroScope's launch back in 1982.
Posted: 07 Dec 2012 | Published: 10 Dec 2012

MicroScope

Breakthrough Business Intelligence and Performance Management for Workgroups and Midsize Organizations
sponsored by IBM
WHITE PAPER: This white paper introduces an integrated business intelligence and performance management solution that gives users self-service access to the tools and data they need to make timely, accurate decisions.
Posted: 24 Feb 2015 | Published: 31 Oct 2013

IBM

Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement