IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  

Computer Emergency Response Teams

RSS Feed    Add to Google    Add to My Yahoo!
Computer Emergency Response Teams White Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

SysML-Based Systems Engineering Using a Model-Driven Development Approach
sponsored by IBM
WHITE PAPER: This paper describes a SysML-based (Systems Modeling Language) process that systems engineers can use to capture requirements and specify architecture. The approach uses model execution as a means for requirements verification and validation.
Posted: 23 Feb 2009 | Published: 01 Oct 2008

IBM

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Outsourcing the problem of software security
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle.
Posted: 10 Jul 2012 | Published: 10 Jul 2012

ComputerWeekly.com

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

Microsoft Exchange 2013: Why, when and how to migrate for maximum ROI
sponsored by Dell, Inc.
WHITE PAPER: Access this expert resource to learn how migrating to Microsoft Exchange Server 2013 can allow you to solve the growing challenges of email while modernize the heart of your communications operations, delivering more efficient IT and preparing for a transition to unified communications.
Posted: 20 Oct 2014 | Published: 16 Oct 2014

Dell, Inc.

Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment
sponsored by IBM
WHITE PAPER: This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.
Posted: 30 Sep 2014 | Published: 29 Nov 2013

IBM

Access emails, calendars, and contacts on any device any time
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to learn how Microsoft Exchange Server 2013 running on HP ProLiant Gen8 servers improves productivity by enabling accessibility while simplifying IT management. Choose from several predefined configurations sized appropriately for your business.
Posted: 18 Nov 2014 | Published: 15 Apr 2014

Hewlett-Packard Company

Email Solutions for SMBs Improve Productivity
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to learn how Microsoft Exchange Server 2013 running on HP ProLiant Gen8 servers improves productivity by enabling accessibility while simplifying IT management. Choose from several predefined configurations sized appropriately for your business.
Posted: 18 Dec 2014 | Published: 15 Apr 2014

Hewlett-Packard Company

RSA Improves Agility with JBoss Enterprise BRMS
sponsored by Red Hat
WHITE PAPER: RSA, a worldwide insurance group, uses business rules to show customers products tailored to their specific needs. Read how RSA used Red Hat JBoss BRMS to improve their application, thus leading to more sales, better agility, and the ability to respond quickly to changing business needs.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Red Hat

Improving Enterprise Email Security: Systems and Tips
sponsored by SearchSecurity.com
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchSecurity.com

Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance.
Posted: 01 Aug 2011 | Published: 26 Jul 2011

SearchSecurity.com

Application Optimization for the Network
sponsored by SearchNetworking.com
EZINE: In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

SearchNetworking.com

Virtualizing Business-Critical Applications on vSphere
sponsored by VMware, Inc.
WHITE PAPER: This in-depth whitepaper explains the benefits of virtualization for business-critical applications in your VMware environment and addresses the potential hurdles in the process. Uncover details about virtualizing Exchange, Oracle, SQL, SAP and more.
Posted: 03 Oct 2013 | Published: 02 Oct 2012

VMware, Inc.

5 Reasons Why Software Outages Occur
sponsored by Automic
WHITE PAPER: Downtime is a business nightmare – not only do companies lose business, their brand and public perception are compromised as well. This resource considers five possible reasons for software outages, and discusses how companies end up with these problems as well as how to fix them.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Automic

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Product vs. Product: Everything you need to know before you buy
sponsored by IT Central Station
ESSENTIAL GUIDE: When making a buying decision for Application Performance Management, it can be challenging to know which product is the best fit for you and your organization. To make your decision easier, IT Central Station is offering you a comprehensive, unbiased guide of the most popular APM products on the market today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Guide to Selecting an Application Performance Management Solution
sponsored by IBM
ANALYST REPORT: Application performance management (APM) is a broad field of technology, so when it comes to selecting an APM tool for your development efforts, it's no surprise the task can be daunting. Fortunately, this decision guide from Ovum is here to help. Read now to compare the top 10 APM technologies on the market.
Posted: 03 Jun 2014 | Published: 18 Feb 2014

IBM

Proactively Manage Business Applications and the User Experience
sponsored by IBM
WHITE PAPER: View this resource to learn about a portfolio of application performance management tools that can provide the visibility, control, and automation you need to reduce outages, improve business performance, and increase user satisfaction.
Posted: 09 Sep 2013 | Published: 30 Apr 2013

IBM

The year of Application Performance Management (APM)
sponsored by ComputerWeekly.com
ANALYST REPORT: Bob Tarzey and Clive Longbottom  explain why IT executives are prioritising Application Performance Management  to address demands for better performance and to meet business goals.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

ComputerWeekly.com

Turning Application Performance in Business Information
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, find out how APM vendors are focusing on network visibility. We also explore 802.11ac's bandwidth demands and video conferencing drivers.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

SearchNetworking.com

CW Special Report on CA Technologies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special independent report from Computer Weekly, updated for 2014, gives you the facts on CA, its strategy, products and services and financial performance.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security
sponsored by SearchSecurity.com
EBOOK: This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

SearchSecurity.com

Driving Business with Continuous Operational Intelligence
sponsored by Courion Corporation
WHITE PAPER: In this white paper, discover the true meaning of operational intelligence, including what it is, which data types/sets can be used as a basis for it, and how to use it.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Courion Corporation

IT in Europe: Next-Generation Network Management Techniques
sponsored by SearchNetworking.co.UK
EZINE: This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.
Posted: 09 Mar 2012 | Published: 08 Mar 2012


Mobile Middleware: Managing the Entire App Lifecycle
sponsored by IBM
WHITE PAPER: Effectively addressing the full lifecycle of mobile app development is a daunting task. This whitepaper considers one solution that adds connectivity and extends existing back-end systems also known as systems of records (SoR) with development capabilities.
Posted: 11 Sep 2014 | Published: 31 Aug 2014

IBM

Change is Constant: Automation for the Internet of Things
sponsored by Automic
WHITE PAPER: How do enterprises make the shift towards a truly agile business model? This whitepaper considers automation as a solution to help enterprises innovate and differentiate in the internet of things.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Automic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement