Vertical Industries  >   Information Industry  >  

Motion Picture and Sound Recording Industries

RSS Feed    Add to Google    Add to My Yahoo!
Motion Picture and Sound Recording Industries White Papers (View All Report Types)
 
Take a Behavioral Bite Out of Crime
sponsored by Infor
WHITE PAPER: 44% of retail shrink is due to employee theft. This is the greatest threat to profitablity at store level. This white paper, based on an extensive study, presents hiring strategy improvements that your organization can quickly adopt.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Infor

How Finance Teams Can Help Their Organizations Get Future-Ready
sponsored by IBM
WHITE PAPER: This white paper explores how finance teams can improve performance management, embrace lean practices, implement a scrum methodology, and more. Access now to find out what the best practices are for making your business future-ready.
Posted: 16 Jun 2016 | Published: 30 Jan 2015

IBM

Case Study: Travel Agency Builds Business and Cuts Costs with the Right VDI
sponsored by VMware
WHITE PAPER: In this white paper, discover how a travel agency found an easily-deployable VDI solution that enabled them simplify IT management while streamlining business.
Posted: 27 May 2015 | Published: 31 Dec 2010

VMware

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Protected Health Information Data Breach Report
sponsored by Verizon
RESEARCH CONTENT: Put PHI security under the microscope to help you identify threats and mitigate risks to your medical records, by accessing this exclusive "Protected Health Information Data Breach" report. Additionally, examine the top three threats that account for 73% of all healthcare data security incidents to protect your customer trust.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

Verizon

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Computer Weekly networking case studies
sponsored by ComputerWeekly.com
CASE STUDY: Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

Case Study: Home Health Org Gets Voice and Video Communication Makeover
sponsored by Zoom Video Communications
CASE STUDY: Examine how one company successfully empowered their employees to use video conferencing and online collaboration from their desktops by ditching their expensive hardware and embracing cloud conferencing.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

Zoom Video Communications

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

Global lessons in eHealth implementation
sponsored by ComputerWeekly.com
JOURNAL ARTICLE: This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

ComputerWeekly.com

Case Study: How Shannon Medical Center is Scaling VDI
sponsored by Imprivata
TRANSCRIPT: Discover how Shannon Medical Center implemented virtual desktop infrastructure (VDI) by overcoming early challenges, and learn what tools they used throughout the process in order to make their VDI project a success.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Imprivata

Quickly Scaling Healthcare Applications
sponsored by Array Networks
CASE STUDY: This case study explains how one healthcare organization was able to ensure application availability while consolidating its cloud-hosted application infrastructure in order to improve user experience.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Array Networks

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Healthcare ebook: Payers Guide to Turning Reform into Revenue
sponsored by Infogix
EBOOK: Download this e-book for helpful tips on maintaining data integrity and boosting member satisfaction. Discover how your healthcare organization can turn reform into revenue today.
Posted: 26 Feb 2016 | Published: 26 Feb 2016

Infogix

When One Unified Communications Tool is not Enough
sponsored by Blue Jeans Network
WHITE PAPER: A recent Wainhouse Research study focuses on organizations that employ Skype for Business (SfB) but have not fully embraced the video conferencing capabilities available, and offers guidance for those seeking to expand these capabilities.
Posted: 07 Jul 2016 | Published: 30 Jun 2016

Blue Jeans Network

The Technology Industry 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Most permanent IT professionals have seen their salaries rise over the past four years, and 15% are reporting pay rises of more than 10%, the Computer Weekly/Mortimer Spinks 2016 survey reveals.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

ComputerWeekly.com

Modelling the Insurance Enterprise
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

The Top 100 Asian Stars in UK Tech
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Top 100 Asian Stars in UK Tech list regcognises the UK's top Asian digital influencers in 2015.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

ComputerWeekly.com

iDisrupted
sponsored by ComputerWeekly.com
BOOK: iDisrupted looks at how technology will change the economy, business and even the human race.
Posted: 09 Feb 2015 | Published: 05 Feb 2015

ComputerWeekly.com

Cybersecurity for Banking and Financial Institutions
sponsored by Delta Risk
WHITE PAPER: Follow this primer for IT professionals who are looking to protect their organization and secure their networks from attack while remaining in compliance with evolving regulations. In addition to discussing the nature of the modern cyberthreat, it also discusses the numerous extra burdens specifically for banking and financial firms.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Delta Risk

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Business leaders agenda 2012
sponsored by ComputerWeekly.com
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

Is Your Wireless Network Ready for the Internet of Things?
sponsored by SearchNetworking.com
EZINE: In this issue of Network Evolution, four organizations share how their resilient, high-performance networks enable IoT use cases that combine automation with intelligence.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchNetworking.com

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement