Vertical Industries  >   Leisure Industry  >  

Dance Companies

RSS Feed    Add to Google    Add to My Yahoo!
Dance Companies White Papers (View All Report Types)
 
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Sky case study
sponsored by MobileIron
CASE STUDY: Europe's leading entertainment company noticed an increase in tablet usage among its sales staff. They needed an enterprise mobility management (EMM) solution that enabled device management and enhanced security. Read on to learn how one solution increased innovation for this industry leader.
Posted: 02 Jun 2016 | Published: 01 Jun 2016

MobileIron

Ovum Report: Understanding Customer Behavior Across Platforms; RSG Media Case Study
sponsored by IBM
CASE STUDY: Adapting to the ever-rising expectations and changing buying behaviors of customers requires both business and technology transformation. By tapping into RSG Media's success story, learn how you can leverage a cloud database and analytics to gain a 360-degree view of customers and develop effective customer loyalty and retention strategies.
Posted: 20 Jun 2016 | Published: 21 Dec 2015

IBM

IoT Maturity Needed to Produce Consistent Value for Companies
sponsored by SearchDataManagement
EZINE: In the cover story, we expose the disconnection between IoT's promise and slow acceptance and explore 2 companies carefully approaching IoT analytics. Additional features include a healthcare organization using predictive maintenance software, an HR manager who automated her company's ancient employee performance-review process, and more.
Posted: 03 Jun 2016 | Published: 02 Jun 2016

SearchDataManagement

There's an App Store for That: Stock Your Mobile Workers with the Right Resources
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will discover how to develop, provision, and manage mobile apps through an individualized enterprise app store built on a secure portal. Access this e-zine now to learn how deploying your own app store cuts down on the problems that arise with public stores.
Posted: 08 May 2015 | Published: 08 May 2015

SearchMobileComputing

This is what we die for
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This investigation by Amnesty International examines human rights abuses in the extraction of cobolt and the extent to which manufacturers have conducted due diligence in sourcing cobolt for mobile phone production.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

July Essentials Guide on Cloud Computing
sponsored by SearchSecurity.com
EBOOK: This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.
Posted: 11 Jul 2012 | Published: 09 Jul 2012

SearchSecurity.com

Computer Weekly – 7 June 2016: Apple lures open source developers with Swift
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Apple's plan to woo open source developers to its Swift programming language. DevOps practitioners are warning of growing stress on IT operations staff through the growth of continuous development practices. And Specsavers' CIO tells us why the store is a vital part of digital retail. Read the issue now.
Posted: 03 Jun 2016 | Published: 07 Jun 2016

ComputerWeekly.com

Threat Monitoring in Tough Times
sponsored by SearchSecurity.com
EBOOK: Today's threat environment can be murky, and advanced security monitoring is essential. Access this three-part guide and learn the latest means for rooting out the fast-moving malicious actors that are targeting your enterprise's systems.
Posted: 23 Dec 2015 | Published: 15 Dec 2015

SearchSecurity.com

Prepping a Data Center for Hybrid Cloud
sponsored by SearchServerVirtualization
EBOOK: In this exclusive e-book, IT expert Dan Kusnetzky outlines the most critical considerations for planning a hybrid cloud computing project – from the costs, to the service options, to the inevitable skepticism that awaits a cloud initiative.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

SearchServerVirtualization

The Connected Hospital: Unlock your EMR
sponsored by MuleSoft
WHITE PAPER: This white paper provides recommendations for unlocking your EMR in order to increase patient engagement, improve clinical workflow, and drive greater care coordination.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

MuleSoft

Time and Attendance Software Best Practices
sponsored by SearchBusinessAnalytics
EGUIDE: In this informative e-guide, discover insights on time and attendance software best practices.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

SearchBusinessAnalytics

The Social Collaboration Revolution: Keeping Your Dispersed Enterprise Connected
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the market drivers for unified communications and collaboration in the dispersed workplace and details a technology that has set its sights on revolutionizing the world of social collaboration.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

SearchSecurity.com

Foundations for Data Monetization
sponsored by SAS
WHITE PAPER: This white paper is an extension of a research briefing from MIT CSR, and it offers a deep dive into data monetization research. Access now for a complete description of non-negotiable data monetization business capabilities.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

SAS

How to enhance your network for the future
sponsored by ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

ComputerWeekly.com

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

How to be influential online
sponsored by ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Beyond Nine to Five
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Ade McCormack offers guidance to enable you to move forward in your career with the minimum of anxiety as digital technology fundamentally changes the nature of work.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

ComputerWeekly.com

The DNA of the CIO
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This must-read report analyses the role and challenges of the CIO and offers guidance for career development, influencing the business and becoming part of the executive management team.
Posted: 31 Oct 2012 | Published: 31 Oct 2012

ComputerWeekly.com

A Computer Weekly buyer's guide to CIO leadership
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.
Posted: 28 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Minority Report: How science fiction is becoming reality
sponsored by ComputerWeekly.com
WHITE PAPER: Customers are urgently looking for the WOW Effect to create awareness and transfer an innovative image. Most digital signage to date has been a video feed or a slide-show, where it is almost like a poster replacement.
Posted: 20 Oct 2011 | Published: 02 Mar 2011

ComputerWeekly.com

Content Delivery Networks in the Cloud World
sponsored by Level 3 Communications, Inc.
WHITE PAPER: As more of the world moves to the cloud, infrastructure changes are ahead. You need to be certain your enterprise has a plan in place to adapt and scale your network to efficiently utilize the cloud. To make sure your content delivery network is prepared, read this extensive guide that provides a variety of articles on the shift to the cloud.
Posted: 28 Jun 2016 | Published: 02 May 2016

Level 3 Communications, Inc.

Data Breach Investigation Report
sponsored by Verizon
RESOURCE: This report gives you statistics from over 100,000 incidents, of which 3,141 were confirmed data breaches. It shows you important breach trends from the past year with charts and figures to illustrate the threat landscape.
Posted: 03 May 2016 | Published: 03 May 2016

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement