Vertical Industries  >   Computer Industry  >  

PC Industry

RSS Feed    Add to Google    Add to My Yahoo!
PC Industry White Papers (View All Report Types)
 
Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

VDI Environments Addressing Mobile Devices in Healthcare
sponsored by RES Software
EGUIDE: In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

RES Software

Presentation Transcript: Virtual Desktop Opportunities for Healthcare
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: This exclusive presentation transcript examines how desktop virtualization can help healthcare organizations tackle many of their IT problems.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Dell, Inc.

Addressing Changes in the Healthcare IT Legislative and Regulatory Environment
sponsored by Dell
WHITE PAPER: This white paper focuses on major advances in cloud client computing solutions supported by Virtual Desktop Infrastructure (VDI), and how these technologies can address the challenges facing health care providers by providing a more flexible, integrated, and virtualized IT environment.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Dell

Podcast: Virtual Desktop Opportunities for Healthcare
sponsored by Dell, Inc.
PODCAST: This exclusive podcast examines how desktop virtualization can help healthcare organizations tackle many of their IT problems.
Posted: 05 Sep 2014 | Premiered: Jul 15, 2014

Dell, Inc.

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

Take Inventory of your Open Source Software Security
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why enterprise development teams should create in-house repositories to mitigate the risks of applications built on open source code.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

CW500:Future Gazing 2020 (II)
sponsored by ComputerWeekly.com
PRESENTATION: Professor Victor Newman, author, advisory board member and mentor at Social Innovation Lab Kent (Silk), gives his take on the future of the IT department in 2020.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Mobile Apps Stores
sponsored by ComputerWeekly.com
ANALYST BRIEF: Juniper Research analyses the growing market for mobile apps in this report extract.
Posted: 09 Mar 2012 | Published: 09 Mar 2012

ComputerWeekly.com

Energy Logic for Telecommunications
sponsored by Emerson Network Power
WHITE PAPER: This white paper covers 12 strategies to improve the energy efficiency of telecomm organizations.
Posted: 21 Nov 2013 | Published: 14 Nov 2008

Emerson Network Power

Istanbul Kultur University: Ready for the Future
sponsored by Hewlett-Packard Limited
CASE STUDY: Check out this case study that profiles one university in particular that needed to replace an ageing network infrastructure to accommodate high-performance wireless solutions.
Posted: 22 Jan 2015 | Published: 01 Nov 2014

Hewlett-Packard Limited

Local Authority Guide to Emerging Transport Technology
sponsored by ComputerWeekly.com
EGUIDE: This will help local authorities make use of new technologies, such as big data analytics and cloud computing, to revolutionise their local transport systems and reduce costs.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Evolving Security Tech Presents New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 14 Jan 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Nuance Healthcare Solutions: Accelerate
sponsored by Nuance
WHITE PAPER: Access this informative white paper to learn about a speech recognition technology that's helping clinicians document the patient's story quickly, conveniently and easily by eliminating typing and mouse-clicks.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Nuance

Mobile Security Insider's Edition
sponsored by SearchSecurity.com
EZINE: This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

Improve Collaboration and Performance In Healthcare With the Right UC&C Tools
sponsored by Data#3
WHITE PAPER: This white paper provides valuable insight into the healthcare industry, business and IT challenges surrounding enterprise unified communications and collaboration technologies.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

Data#3

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

CW Buyer's Guide: Healthcare in IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This 7 page buyer's guide looks at the future of electronic healthcare records, healthcare technology and the use of mobile technology.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

ComputerWeekly.com

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Achieving HIPAA Compliance
sponsored by Absolute Software
WHITE PAPER: In this resource, learn about the consequences of the new HIPAA regulations and how healthcare organizations can change their IT methodologies to protect sensitive data and avoid costly breaches.
Posted: 21 Jan 2014 | Published: 15 Jan 2013

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement