IT Agents  >   Standards Organizations  >   Electronics Industry Standards Organizations  >  

Joint Electron Device Engineering Council

RSS Feed    Add to Google    Add to My Yahoo!
Joint Electron Device Engineering Council White Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

The Future of Corporate IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research study from CEB identifies five opportunities for CIOs to drive productivity and growth as organisations adopt new working practices.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
sponsored by SearchSecurity.com
EZINE: This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

SearchSecurity.com

Computer Weekly – 19 November 2013: Software-defined networking explodes
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

Transforming Enterprise Applications for Mobile/BYOD Environments
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this white paper for tips on how to prepare critical applications to be accessed from an array of company-owned and personal devices with different screen sizes and operating systems. Also, find out how desktop virtualization—and Dell Mobile/BYOD Solutions—can help reduce complexity and ensure application and data security.
Posted: 22 Aug 2014 | Published: 22 Nov 2013

Dell, Inc. and Intel®

IT in Europe - May 2012
sponsored by SearchSecurity.com
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

SearchSecurity.com

Information Governance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

ComputerWeekly.com

Consumer Technology in the Enterprise - a Computer Weekly Buyer's Guide
sponsored by ComputerWeekly.com
WHITE PAPER: The pressure to allow employees to use more of the technologies they have at home in the workplace has reached critical levels.
Posted: 20 Oct 2011 | Published: 24 Mar 2011

ComputerWeekly.com

Smart  Organisations
sponsored by ComputerWeekly.com
WHITE PAPER: Download this report to learn how your organisation can use smart technology to drive innovation and enhance your competitive position, without breaking the bank.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

ComputerWeekly.com

UK IT priorities 2012
sponsored by ComputerWeekly.com
IT BRIEFING: This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Best Practices for Deploying SSD
sponsored by SearchStorage.com
EBRIEF: Check out this E-Brief for best practices and key considerations regarding SSD purchase and deployment. Learn the basics of solid state storage, determine if SSD is a good fit for your company and learn the keys to success before implementing.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

SearchStorage.com

Air Transport Industry Insights 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from SITA looks at the impact of business intelligence on airlines and airports.
Posted: 01 May 2014 | Published: 01 May 2014

ComputerWeekly.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Special Report on Infosys
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 6 page special report from Computer Weekly gives you the key facts on Infosys, its strategy, products and services and financial performance.
Posted: 26 Jul 2012 | Published: 26 Jul 2012

ComputerWeekly.com

Musings on datacentres
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Clive Longbottom discusses the key issues in managing and designing data centres.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.
Posted: 18 Jun 2012 | Published: 19 Jun 2012

ComputerWeekly.com

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Staying Agile with Big Data
sponsored by Red Hat
WHITE PAPER: This white paper explores a new server strategy that unifies the storage environment with a platform that allows you to leverage commodity, scale-out storage infrastructure with a virtualized environment. Read on to learn how this approach will allow you to manage the explosion of data and remain agile and flexible in the future.
Posted: 23 Sep 2014 | Published: 09 Sep 2014

Red Hat

CW Special report on Capgemini
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

RSA's Digital Journey
sponsored by ComputerWeekly.com
PRESENTATION: Ian Hood, Group Digital Director of RSA, tells the story of one of the UK's largest insurers journey to digital technology in this presentation.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement