IT Agents  >   Standards Organizations  >   Information Industry Standards Organizations  >  

INCITS

RSS Feed    Add to Google    Add to My Yahoo!
INCITSWhite Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

A Prescription for IT Efficiency
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This resource examines new risks and threats that are making Windows XP unsafe for use in a healthcare setting, and details the essential security capabilities and benefits offered by Windows 7 and Windows 8.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Dell, Inc. and Windows 8 Pro

CW+: Overview of the Open Group Security Forum
sponsored by ComputerWeekly.com
WHITE PAPER: The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

Anatomy of an Analytic Enterprise
sponsored by SAS
WHITE PAPER: The following white paper provides readers with the anatomy of a successful analytic enterprise and reveals key technology, implementation practices, pain points to avoid, and more.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

SAS

The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Meaningful Use: Preserving the Health Story, Providing Structure for The EHR
sponsored by Nuance
WHITE PAPER: Discover how using native language processing (NLP) can help your clinicians fully express and record the patient story by identifying information within structured text and transforming it into data to input into the EHR.
Posted: 21 Aug 2013 | Published: 31 Dec 2012

Nuance

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

Strategies to Capture Greater Value from Systems Engineering
sponsored by IBM
WHITE PAPER: Access this helpful white paper to learn how you can capture greater value from systems engineering by embracing a more holistic approach to manage complexity in both product and process.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Integrated Systems for Simpler Application, Platform, and System Management
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the ins and outs of a pre-integrated system that offers the compute, storage, and networking resources you need to meet the demands of today's complex applications.
Posted: 28 Jan 2014 | Published: 31 Oct 2013

IBM

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Exploiting Big Data: Strategies for Integrating with Hadoop to Deliver Business Insights
sponsored by BeyeNETWORK
EBOOK: This e-book, penned by business intelligence expert Wayne Eckerson, will explain how big data -- the combination of Hadoop and analytical databases -- is transforming the business intelligence industry.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

BeyeNETWORK

Cloud-Ready Data Center Reference Architecture
sponsored by Juniper Networks, Inc.
WHITE PAPER: Without effective data center network architecture and processes in place, your business cannot embrace cloud computing. This white paper examines the current state of the data center and the steps you need to take to adapt to changing trends and enable the cloud.
Posted: 11 Jun 2012 | Published: 31 Dec 2011

Juniper Networks, Inc.

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now.
Posted: 22 Aug 2011 | Published: 23 Aug 2011

ComputerWeekly.com

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic”
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

Information Security Magazine

The Definitive Guide to Lead Nurturing
sponsored by Marketo
WHITE PAPER: The goal of this guide is to arm B2B marketers with the ultimate resource for lead nurturing, whether you’re just starting to think about lead nurturing in your business or are looking for ways to enhance and optimize your existing programs. Read this definitive guide to learn more.
Posted: 12 Nov 2010 | Published: 12 Nov 2010

Marketo

eBook: Virtualization Security
sponsored by TechTarget
EBOOK: Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.
Posted: 21 May 2009 | Published: 21 May 2009

TechTarget

Defending Against Denial of Service Attacks
sponsored by F5 Networks
WHITE PAPER: Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.
Posted: 25 Nov 2013 | Published: 31 Oct 2012

F5 Networks

Gartner IT Financial, Procurement & Asset Management Summit 2013
sponsored by Gartner
BROCHURE: This brochure outlines the Gartner IT Financial, Procurement & Asset Management Summit 2013, a conference that aims to help you destroy legacy costs and create value from new technologies and trends. View now to learn more!
Posted: 19 Jul 2013 | Published: 19 Jul 2013

Gartner

eBook: Strategies for Securing Virtual Machines
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

Information Security Magazine

Enterprise Decisions E-Zine Feature: How mobile IT is revamping network strategies
sponsored by SearchCIO.com
EZINE: Inside this edition of CIO Decisions E-zine, find out how your peers are keeping up with consumerization trends. Uncover practical network management advice from the experiences of several high-profile organizations.
Posted: 07 Nov 2012 | Published: 07 Nov 2012

SearchCIO.com

Computer Weekly – 13 November 2012: Government commits to open standards
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now.
Posted: 09 Nov 2012 | Published: 13 Nov 2012

ComputerWeekly.com

Unleash the Power of Marketing to Drive Innovation and Profit
sponsored by SAS
WHITE PAPER: In this white paper, learn what genuine customer centricity looks like, why it matters more than ever, and how organizations can achieve it.
Posted: 11 Oct 2011 | Published: 11 Oct 2011

SAS

E-Book: Game-changing business analytics trends for 2011 and beyond
sponsored by Actian Corporation
EGUIDE: This expert e-guide is a collection of recent articles that focus on the latest business intelligence (BI) trends, practices and tools.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Actian Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement