Vertical Industries  >   Information Industry  >  

Directory Publishers

RSS Feed    Add to Google    Add to My Yahoo!
Directory PublishersWhite Papers (View All Report Types)
 
Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Next Generation Data centre Index – Cycle III
sponsored by ComputerWeekly.com
ANALYST REPORT: Organisations that are investing in key areas of IT and changing their mindset in the way they approach IT are well ahead of those just trying to save money,  say analysts Clive Longbottom and Bob Tarzey.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Dell Software

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Imperva
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Informatica Data Integration Hub
sponsored by Informatica
WHITE PAPER: Even the best managed large-scale enterprise data integration environments grow complex over time, and are continuously pressured to operate leaner and more efficiently. In this white paper, learn about an innovative publish-and-subscribe model that can be applied to data integration, delivering automation without compromising control.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

Informatica

A Computer Weekly buyer’s guide to hybrid cloud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how to find the best hybrid cloud provider for your organisation, the impact of hybrid cloud on the infrastructure manager and how Microsoft is catching up with the cloud market with Azure.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

ComputerWeekly.com

Delivering the Data Layer of the Cloud: The Business Case for APIs
sponsored by StrikeIron
WHITE PAPER: In this white paper, explore the business case for APIs and learn why it may be a good idea to publish APIs for your organization. Compare the options of building your API capabilities internally and leveraging an API platform provider to achieve end-to-end API management.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

StrikeIron

Information Security Magazine – July/August 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Leveraging Advanced BI to Increase SaaS Success
sponsored by Information Builders
WHITE PAPER: This paper discusses the types of reporting and analysis functionality that users of SaaS applications are looking for, and the business intelligence (BI) capabilities SaaS vendors must incorporate into their solutions to successfully satisfy those demands. Also highlighted are real-world successes.
Posted: 05 Dec 2011 | Published: 05 Dec 2011

Information Builders

How to select cloud formations for secure business collaboration
sponsored by ComputerWeekly.com
WHITE PAPER: Cloud computing offers massive scalability -  in virtual computing power, storage, and applications resources - all at almost immediate availability and low cost, and business managers are demanding their IT operations assess the benefits this new computing model can represent.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Customer story: Magma Mobile
sponsored by IBM
CASE STUDY: Magma Mobile needed an iaaS provider that could provide them with fast and responsive servers that would guarantee them a quality use-end experience.
Posted: 14 Feb 2014 | Published: 31 Dec 2013

IBM

Unified Communications Security
sponsored by NextPlane
WHITE PAPER: This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

NextPlane

Who is Atop the Enterprise Endpoint Backup Application Market?
sponsored by Code42
WHITE PAPER: This whitepaper details the results of a study that revealed the top enterprise endpoint backup application on the market.
Posted: 09 Dec 2013 | Published: 09 Dec 2013

Code42

Security Guide: Deploying Social Media Securely on a Global Scale
sponsored by Hootsuite
WHITE PAPER: If your organization is looking to broaden the scope of social media programs, you've got to be prepared for several new security challenges. Creating new social media accounts means new opportunities for hackers, and more employees managing accounts on personal devices means more risk.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Hootsuite

A Primer On the System for Cross Domain Identity Management (SCIM)
sponsored by Ping Identity Corporation
WHITE PAPER: Single sign-on (SSO) requires user provisioning. But, since traditional provisioning systems have struggled to scalably manage identities due to the diversity of applications, the need for a solution is dire. In this white paper, learn about how SCIM overcomes this issue and has gained adoption among application vendors.
Posted: 17 Mar 2014 | Published: 01 Jan 2014

Ping Identity Corporation

Corporate Data in the Consumer Cloud, Chapter 4
sponsored by SearchConsumerization.com
EGUIDE: IT shouldn't leave mobile devices and consumer cloud-based services to user control. In addition to cloud-based file sharing, businesses should consider on-premises and hybrid file sharing, as well as security.
Posted: 28 Jan 2014 | Published: 28 Jan 2014


3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Hewlett-Packard Company

Evaluation Guide: Enterprise Social Relationship Platforms
sponsored by Hootsuite
WHITE PAPER: In this helpful resource, explore a comprehensive checklist of the top 11 essential capabilities of an enterprise social media platform, and learn how to select the right one for your social media outreach efforts.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Hootsuite

CW+: Open Group technical document: IT Specialist Certification (ITSC) Conformance Requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 21 Oct 2010

ComputerWeekly.com

How to Reduce the Cost and Complexity of Two Factor Authentication
sponsored by Celestix Networks
WHITE PAPER: Access this resource to explore key practices for combatting complexity and high cost challenges with two-factor authentication.
Posted: 03 Feb 2014 | Published: 30 Sep 2012

Celestix Networks

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

How to fit MDM Products into your Existing Infrastructure: Key tips
sponsored by BlackBerry
EGUIDE: This expert guide from SearchConsumerization.com highlights steps that you can take to fit MDM products into your existing infrastructure smoothly and effortlessly. Read on and also learn how effective MDM can help you prepare for potential security issues.
Posted: 12 Nov 2013 | Published: 12 Nov 2013

BlackBerry

Digital identities and the open business
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth explain the business drivers that encouraging companies to invest in Identity and access management (IAM) despite tight budgets.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

ComputerWeekly.com

Chapter 2: EBook: Corporate Data in the Consumer Cloud
sponsored by BlackBerry
WHITE PAPER: This expert resource examines specific policy considerations IT needs to keep in mind when using consumer cloud storage services, and discusses features of services and tools that can help control the use of the cloud.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement