Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

PatriotGrid

RSS Feed    Add to Google    Add to My Yahoo!
PatriotGrid White Papers (View All Report Types)
 
Extending Planning & Forecasting with Analytics
sponsored by IBM
WHITE PAPER: This white paper examines the current state of analytics in today's accounting systems, and ventures to find ways to enhance and strengthen this foundation. Learn how automation can help support accounting systems.
Posted: 07 May 2013 | Published: 07 May 2013

IBM

Beyond Work-Life Balance
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper takes an uncommon look at how – thanks to mobile and cloud technologies – the world of work is changing and why. Specifically, it focuses on ways IT leaders can be proactive about building a work environment that's ready for the future.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

Hewlett-Packard Limited

Smarter Products - The Building Blocks for a Smarter Planet
sponsored by IBM
WHITE PAPER: IBM offers the first integrated software platform dedicated to the delivery of smarter products, with our portfolio of software, hardware and services, IBM can help companies create and manage smarter products for a smarter planet. Read on to learn more.
Posted: 06 Oct 2009 | Published: 01 May 2009

IBM

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint
sponsored by IBM
WHITE PAPER: This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns?
Posted: 09 Apr 2009 | Published: 31 Dec 2008

IBM

The Performance Manager: Turning Information Into Higher Business Performance
sponsored by IBM
WHITE PAPER: Download this white paper for an extensive summary of The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, a book that examines the partnership between decision-makers and the people who provide them with information to drive better decisions.
Posted: 20 Jul 2009 | Published: 14 Feb 2008

IBM

Take Back the Endpoint
sponsored by Kaspersky Lab
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Kaspersky Lab

Realize positive ROI on your SOA investments
sponsored by Vitria Technology, Inc.
WHITE PAPER: This white paper discusses the steps to achieve greater operational visibility to better meet customer requirements and enhance business responsiveness.
Posted: 09 May 2008 | Published: 01 May 2008

Vitria Technology, Inc.

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by Dell, Inc.
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement