Vertical Industries  >   Information Industry  >  

Internet Radio Stations

RSS Feed    Add to Google    Add to My Yahoo!
Internet Radio Stations White Papers (View All Report Types)
Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007


Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010


Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

The Digital Enterprise
sponsored by
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

FM, IT and Data Centres
sponsored by
ANALYST REPORT: Are Facilities and IT data centre managers implacable enemies, or is it a case of different work priorities, asks analyst Clive Longbottom.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

WAN Speak Musings – Volume I
sponsored by
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

Innovative business technologies in a converging world
sponsored by
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

CW buyer's guide: The business advantages of big data
sponsored by
ESSENTIAL GUIDE: Big data may appear to be just another bandwagon, but it is important, and needs to be addressed carefully and sensibly.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

Big data: Lessons from the leaders
sponsored by
ESSENTIAL GUIDE: This research from the Economist Intelligence Unit assess how far companies have progressed in their use of big data and examines how they can turn it to business advantage.
Posted: 14 Sep 2012 | Published: 14 Sep 2012

Mastering multi-channel journeys – making engagement pay
sponsored by
RESEARCH CONTENT: This research from Oxygen8 assesses how businesses communicate with customers and how those customers want businesses to communicate with them, and offers advice on how to achieve it.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

Global Risks 2014
sponsored by
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Expert guide to mobile unified communications: Implementation best practices
sponsored by
EGUIDE: This expert e-guide uncovers the benefits of mobile UC, best practices for implementing fixed mobile convergence and mobile UC solutions as well as products that will make the execution easier.
Posted: 05 Jul 2011 | Published: 05 Jul 2011

Security Essentials for CIOs: Ensuring a more secure future
sponsored by IBM
WHITE PAPER: This white paper takes a haunting look at the future of IT security. Inside, uncover CIO security essentials that will ensure a more secure future. Learn how to develop smart practices and policies while extending a risk-aware culture throughout the workforce.
Posted: 04 Feb 2013 | Published: 04 Feb 2013


The next wave of digitisation: setting your direction, building your capabilities
sponsored by
IT BRIEFING: Companies need to make significant investments in digital skills and technologies if they are to meet the needs of their customers, Booz&Co argues in this report.
Posted: 27 Mar 2012 | Published: 05 Sep 2011

Best Practices for Avoiding Application Security Vulnerabilities
sponsored by Hewlett-Packard Company
EGUIDE: Can security impact application performance? This expert eGuide examines common application security vulnerabilities that might be slowing you down, as well as the common vulnerabilities enterprises face
Posted: 22 May 2015 | Published: 13 May 2015

Hewlett-Packard Company

Hacking as a Service,' and Other Emerging Threats
sponsored by
EZINE: The emerging security threats to data and networks range from hackers with a Facebook account to nation-states stealing corporate data. Learn what InfoSec pros are up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Step-by-Step: Handling RF Interference Challenges
sponsored by Fluke Networks
WHITE PAPER: This white paper gives you an in-depth look at how to identify and mitigate unexpected interference problems that can slow down your Wi-Fi network.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Fluke Networks

Underexposed risks of public Wi-Fi hotspots
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

Overview Of Near Field Communication
sponsored by
BOOK: This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

Not All MDM Solutions Are Created Equal
sponsored by IBM
WHITE PAPER: This informative white paper discusses the functionalities and protections that an MDM solution should offer. View now to uncover helpful tips and guidance for picking a solution that can empower your mobile workforce, while keeping your data secure.
Posted: 28 Feb 2014 | Published: 28 Feb 2014


The NFC Retail Opportunity
sponsored by
ANALYST REPORT: This exclusive report for Computer Weekly readers by Juniper Research, offers a comprehensive briefing for senior IT professionals on the opportunities for NFC mobile payment technology, markets and trends.
Posted: 29 May 2012 | Published: 30 May 2012

Computer Weekly – 11 August 2015: Data unlocks personalised customer service
sponsored by
EZINE: In this week's Computer Weekly, we examine how companies are starting to use big data analytics to deliver more personalised customer services. We talk to the government's IT procurement chief about improving public sector tech purchasing. And Volvo's CIO tells us how connected cars will reshape the automotive sector. Read the issue now.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Accenture Technology Vision 2014
sponsored by
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

The lost opportunity – assessing the impact of OTT services
sponsored by
ANALYST REPORT: In this special report for Computer Weekly readers, Juniper Research looks at the challenges and opportunities facing mobile operator business models.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

CIO insights: Moving from the back office to the front line
sponsored by
ESSENTIAL GUIDE: This major global C-level survey from IBM examines the changing role of the CIO and makes recommendations for CIOs who want to move from the back office to the front line of the business.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Preparing for the Next Attack: Evaluate Your Network Security with Incident Response
sponsored by FireEye
WHITE PAPER: This guide will help you evolve your ability to respond to critical security incidents. Access this paper to uncover the 6 core capabilities to keep in mind as you plan and maintain your network security response plan.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement