Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Bioweapons

RSS Feed    Add to Google    Add to My Yahoo!
BioweaponsReports
 
Beyond Work-Life Balance
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper takes an uncommon look at how – thanks to mobile and cloud technologies – the world of work is changing and why. Specifically, it focuses on ways IT leaders can be proactive about building a work environment that's ready for the future.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

Hewlett-Packard Limited

Hackers, Hacking, and CEHv8
sponsored by Global Knowledge
WHITE PAPER: This resource addresses hackers, hacking, and what can be done to prevent cyber-attacks. It also highlights the different motives for hacking and common methods hackers use.
Posted: 19 Mar 2014 | Published: 21 Jan 2014

Global Knowledge

Emerging Expectations of CIO's
sponsored by FrontRange Solutions Inc.
WEBCAST: Consult this on-demand webcast today to learn about the role and expectations of the modern CIO, and find out what skills and competencies are required to be successful in the position.
Posted: 03 Jul 2013 | Premiered: Mar 27, 2013

FrontRange Solutions Inc.

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by Dell, Inc.
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Big Data Analysis: 5 Key Questions for CIOs
sponsored by CommVault Systems, Inc.
EGUIDE: This exclusive e-guide presents five questions every CIO should consider before they tackle any large-scale data processing initiative. Inside, discover how you can equip yourself with the necessary tools to analyze large-scale data sets to gain a competitive edge in today’s dynamic business environment.
Posted: 25 Jan 2013 | Published: 16 Jan 2013

CommVault Systems, Inc.

How SkillSoft Learning Impacts Performance of Individuals and Organizations
sponsored by Skillsoft
WHITE PAPER: In late 2010, Skillsoft asked KnowledgeAdvisors, the world's largest learning analytics firm, to conduct an independent study to determine the value that SkillSoft training provides to individuals and organizations. Check out this white paper to explore the results of this study and key findings.
Posted: 28 Aug 2012 | Published: 28 Feb 2011

Skillsoft

ACOs: Treat Patients More Effectively with Health Analytics
sponsored by IBM
EGUIDE: This e-guide from SearchHealthIT.com highlights the importance of data analytics in the success of today's ACOs. Read now to learn the difference between collaborative and captive ACOs and discover how predictive analytics can provide the information necessary to dramatically improve patient care.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

IBM

CIO Decisions e-zine: Big data analytics, the power of personalized data
sponsored by SearchCIO.com
EZINE: This edition of the CIO Decisions e-zine demonstrates how BI and data analytics are dramatically changing the way businesses interact with their data. Inside, learn how the Obama campaign used "microtargeting" techniques to read the polls and understand how they were changing and evolving during the campaign.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchCIO.com

Why Buy Vs. Build Serena Service Manager
sponsored by SERENA Software, Inc.
WHITE PAPER: This decision guide demonstrates how migrating to Serena Service Manager will help transform your IT organization into an agile, responsive, and business-focused service provider.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

SERENA Software, Inc.

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement