Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >  

Trade Secrets

RSS Feed    Add to Google    Add to My Yahoo!
Trade Secrets White Papers (View All Report Types)
 
Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by Dell, Inc.
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Choosing the Right Enterprise Resource Planning (ERP) System: How to Avoid the 7 Fatal Flaws
sponsored by CDC Software - Ross Enterprise
WHITE PAPER: This paper explains the importance of choosing the Right Enterprise Resource Planning (ERP) System to avoid the 7 Fatal Flaws.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

CDC Software - Ross Enterprise

6 Myths about Open Source
sponsored by Ingres
WHITE PAPER: There has long been concern that open source is a niche IT option, unable to support mission-critical applications, and that any update to the code is unregulated. This white paper challenges these concerns.
Posted: 03 Mar 2008 | Published: 01 Jan 2007

Ingres

How SkillSoft Learning Impacts Performance of Individuals and Organizations
sponsored by Skillsoft
WHITE PAPER: In late 2010, Skillsoft asked KnowledgeAdvisors, the world's largest learning analytics firm, to conduct an independent study to determine the value that SkillSoft training provides to individuals and organizations. Check out this white paper to explore the results of this study and key findings.
Posted: 28 Aug 2012 | Published: 28 Feb 2011

Skillsoft

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

Oracle Accelerate - Not Just Smart but Timely
sponsored by Oracle Corporation
WHITE PAPER: This paper gives you an overview of how Ovum has helped penetrate the upper-midmarket. Even when the slowing growth of the market hasn't.
Posted: 24 Sep 2009 | Published: 01 Mar 2009

Oracle Corporation

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Building a Robust Business Case for High Quality Master Data
sponsored by Melissa Data Corp
WHITE PAPER: This white paper explains the key elements for building a proper, quantified business case. It presents the measures that are favored by corporate finance departments, and helps develop a strong business case for data quality and MDM projects. A number of real-life examples with quantifiable benefits are also included.
Posted: 19 Apr 2010 | Published: 01 Feb 2010

Melissa Data Corp

The Business Case for Information Management
sponsored by Oracle Corporation
WHITE PAPER: In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model.
Posted: 14 Sep 2009 | Published: 01 Dec 2008

Oracle Corporation

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement