Vertical Industries  >   Information Industry  >  

Packaged Computer Software Publishers

RSS Feed    Add to Google    Add to My Yahoo!
Packaged Computer Software Publishers White Papers (View All Report Types)
 
Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Business Analytics: Helping You Put an Informed Foot Forward
sponsored by SAS
WHITE PAPER: What exactly is business analytics and how can it help? Business analytics is, simply put, the application of analytical techniques to resolve business issues. It provides organizations with a framework for decision making, helping organizations solve complex business problems and more.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Next Generation Data centre Index – Cycle III
sponsored by ComputerWeekly.com
ANALYST REPORT: Organisations that are investing in key areas of IT and changing their mindset in the way they approach IT are well ahead of those just trying to save money,  say analysts Clive Longbottom and Bob Tarzey.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

DigiWorld Yearbook
sponsored by ComputerWeekly.com
RESEARCH CONTENT: IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ComputerWeekly.com

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

3 Ways to Move Application Development to the Cloud
sponsored by Oracle Corporation
WHITE PAPER: There are ways to modernize development approaches without squeezing what's left of resources. Explore ways to accelerate innovation, avoid complexity, and increase developer productivity with cloud-based development tools.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Oracle Corporation

About to Buy Guide: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

SearchSecurity.com

About to Buy: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you considering purchasing mobile device management (MDM) software? Read this "About to Buy" guide from SearchConsumerization.com for help making a smart MDM software purchase.
Posted: 10 Aug 2012 | Published: 10 Aug 2012

SearchSecurity.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Computer Weekly – 19 November 2013: Software-defined networking explodes
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

Software Defining the Data Center
sponsored by SearchSDN.com
EBOOK: Will enterprises soon use SDN in their data centers? This guide considers software-defined networking's advantages and drawbacks.
Posted: 30 Dec 2015 | Published: 27 Dec 2015

SearchSDN.com

Technology Industry Survey 2014
sponsored by ComputerWeekly.com
RESOURCE: From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Straight Talking and the Latest Thinking from the DevOps Frontline
sponsored by CA Technologies.
WHITE PAPER: This resource thoroughly discusses several debates within DevOps. Read on to see what leaders within the DevOps community have to say about topics like how DevOps should be incentivized, what roles CIOs should play in the introduction of DevOps to an enterprise, and more.
Posted: 11 Jan 2016 | Published: 31 Dec 2015

CA Technologies.

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Computer Weekly – 12 January 2016: How open source is beating proprietary software
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the impact of open source software and how it is underpinning the digital revolution. We examine the prospects for cloud in financial services as regulators give their approval. And we ask if Uber is really part of a new business model for the sharing economy. Read the issue now.
Posted: 08 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

A CW buyer's guide to software asset management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at best practice for software asset management in this 10-page buyer's guide.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

ComputerWeekly.com

Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now.
Posted: 11 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Embrace Operational Reporting and Data Visualization with Enterprise BI Solutions
sponsored by LogiAnalytics
WHITE PAPER: Compare 2 BI analytics platform providers in this resource. Discover where these vendors fall in line with automating the work of preparing and profiling data for analysis, enabling users to see, search, and organize the most relevant analysis to leverage departmental data, and more.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

LogiAnalytics

Time to Rethink the IT Stack
sponsored by ComputerWeekly.com
ANALYST REPORT: In this report Ovum calls for a rethink of the traditional IT technology stack, to ensure better interoperability and adaptability.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

ComputerWeekly.com

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

The Many Faces of Software Testing
sponsored by SearchSecurity.com
EGUIDE: Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.
Posted: 01 May 2012 | Published: 01 May 2012

SearchSecurity.com

Managing Software Estates in the Enterprise
sponsored by ComputerWeekly.com
WHITE PAPER: Recent news from the Bank of England now places a swift economic recovery in real doubt. The UK economy actually slipped into negative growth in the final quarter of 2010, and even the most optimistic forecasts predict economic recovery over the coming years to be sluggish at best.
Posted: 21 Oct 2011 | Published: 05 Jan 2011

ComputerWeekly.com

The truth about software quality - a global benchmarking study
sponsored by ComputerWeekly.com
WHITE PAPER: This is the first in an annual series of reports highlighting trends in the structural quality of business applications regarding characteristics such as robustness, performance, securit y, and changeability.
Posted: 21 Oct 2011 | Published: 15 Dec 2010

ComputerWeekly.com

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Software-Defined Networking Could Make Network-as-a-Service a Reality
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the topic of Network-as-a-Service and how software-defined networking could help make this new network paradigm for the cloud a reality.
Posted: 05 Nov 2012 | Published: 09 Apr 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement