Vertical Industries  >   Information Industry  >  

Computer Software Programming Industry

RSS Feed    Add to Google    Add to My Yahoo!
Computer Software Programming Industry White Papers (View All Report Types)
 
Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Istanbul Kultur University: Ready for the Future
sponsored by Hewlett-Packard Limited
CASE STUDY: Check out this case study that profiles one university in particular that needed to replace an ageing network infrastructure to accommodate high-performance wireless solutions.
Posted: 22 Jan 2015 | Published: 01 Nov 2014

Hewlett-Packard Limited

ISG Outsourcing Index (EMEA)
sponsored by ComputerWeekly.com
IT BRIEFING: The ISG Outsourcing Index provides a quarterly review of the latest sourcing industry data and trends.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

To Increase Downloads, Instill Trust First
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 20 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Discover How Beth Israel Deaconess Medical Center Protects Vital Data
sponsored by CommVault
CASE STUDY: This white paper examines how the Beth Israel Deaconess Medical Center was able to implement a system that enabled improved management and more effective data recovery data with less risk, keeping them on top of compliance requirements
Posted: 10 Sep 2014 | Published: 31 Dec 2013

CommVault

The Service Innovation Mandate in Telecommunications
sponsored by CA Technologies.
WHITE PAPER: This paper provides an overview of the key strategies telecommunications companies can pursue in order to most fully capitalize on the opportunities afforded by APIs. Read on to learn more.
Posted: 11 Nov 2014 | Published: 31 Oct 2014

CA Technologies.

Top 3 Strategies to Reduce Risk in Automotive / In-Vehicle Software Development
sponsored by Rogue Wave Software
WHITE PAPER: This white paper explores 3 of the biggest challenges exacerbated by today's complexity and connectivity trends that face automotive software teams. Learn how embedded development systems can help improve code quality, safety, and compliance throughout the development cycle.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Rogue Wave Software

The Future of IT Infrastructure in the Professional Services Industry
sponsored by Sungard
WHITE PAPER: This white paper shares insights gathered from the professional services sector into the future of IT infrastructure and its impact on the industry.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Sungard

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

How to deliver more secure automotive software
sponsored by Rogue Wave Software
RESOURCE: In October 2014, Toyota recalled 2.1 million vehicles globally because of a software problem that could cause cars to stop suddenly. Check out this concise infographic that addresses ways to ensure that the code that automotive software developers are building is safe, secure, and reliable.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Rogue Wave Software

Hot Vendors: Nexenta - Helping to Define the Software-Defined Enterprise
sponsored by Nexenta
WHITE PAPER: Read this IDC Vendor Profile about the technologies, products, and market strategy of a privately-held U.S.-based company that addresses software-defined storage.
Posted: 25 Nov 2014 | Published: 28 Feb 2014

Nexenta

Telcos and Cable Companies Use Hortonworks for Service, Security and Sales
sponsored by Hortonworks
WHITE PAPER: Read more to find out about how one platform boasts easy data storage and processing for telecommunications and cable companies at a price to meet their budgets.
Posted: 22 Jan 2015 | Published: 31 Aug 2014

Hortonworks

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security
sponsored by Dell SecureWorks
WHITE PAPER: This case study explores how implementing Dell SecureWorks enabled pharmaceutical firm ProStrakan to keep pace with an increasingly sophisticated threat landscape of malware and viruses, as well as complex security legislation across its multiple sites.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Dell SecureWorks

Evolving Security Tech Presents New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

Special Report on Cisco
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

E-kit: Intelligent Transportation Systems Development
sponsored by IBM
RESOURCE CENTER: Planning, developing, and deploying software is becoming more difficult for development teams across all industries, especially in transportation. Access this e-kit to learn about an end-to-end development technology for intelligent transportation systems that can help you effectively manage the entire systems lifecycle.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IBM

Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Corporation
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Leverage Security Intelligence For Financial Services Institutions
sponsored by IBM
WHITE PAPER: In this resource, discover how financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement