IT Management  >   Systems Operations  >   Contingency Planning  >  

Y2000

RSS Feed    Add to Google    Add to My Yahoo!
Y2000White Papers (View All Report Types)
 
7 Tips on Becoming an IT Service Broker
sponsored by Rackspace
WHITE PAPER: This exclusive whitepaper explores seven important tips for transforming IT into a service broker.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Rackspace

How To Make A Business Case For Data Investment
sponsored by Scribe Software Corporation
WHITE PAPER: This research from Forrester will guide you through the ways you can use design thinking to solve business challenges and make the case for data investment.
Posted: 10 Sep 2014 | Published: 10 Jan 2014

Scribe Software Corporation

Should IT Users be Treated like Patients?
sponsored by RES Software
WHITE PAPER: What would happen if IT were to learn from clinical healthcare's pursuit of "patient engagement" by creating its own "user engagement" strategies? What would the benefits of doing so be? And what would it take to make it all happen? Read the following brief to find out more.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

The Enemy Within: The Changing Face of Threats to Information Security
sponsored by Clearswift
WHITE PAPER: This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.
Posted: 21 Oct 2014 | Published: 17 Oct 2014

Clearswift

Achieving Business Agility Through An Agile Data Center
sponsored by Symantec Corporation
WHITE PAPER: Business agility is dependent on IT agility. By being an adopter of the latest technologies, businesses can deliver the highest quality products and services to the end customers. But it also exposes an organization to new risks including security breaches, loss of data, and business downtime.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

Symantec Corporation

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Five Secrets of Highly Effective Data Centers
sponsored by CISCO & INTELĀ®
WHITE PAPER: This white paper examines 5 important strategies that organizations have adopted to overcome the limits of traditional IT infrastructure and transform their data centers to support innovation and growth.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CISCO & INTELĀ®

Building Recurring Revenue as a Service Provider in 2014
sponsored by N-able Technologies
WHITE PAPER: This white paper is an excellent resource for both IT service providers and MSPs, discussing the process and advantages of moving to a model with consistent monthly fees, as well as providing an overview of the current MSP market.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

N-able Technologies

Next-Generation Cost Transparency
sponsored by VMware
WHITE PAPER: This exclusive whitepaper explores how choosing the right technology and enabling complete cost transparency can turn IT into a trusted advisor and strategic partner, allowing them to focus spending on those applications and services with high business value.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware

Solution Spotlight PDF: IaaS
sponsored by CDW Corporation
WHITE PAPER: This exclusive whitepaper covers how you can use the cloud to put IT back in control of your data center and meet today's business demands.
Posted: 11 Sep 2014 | Published: 08 Feb 2013

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement