IT Agents  >   IT Workforce  >   Executive Management  >  

Chief Information Officers

RSS Feed    Add to Google    Add to My Yahoo!
Chief Information Officers Reports
 
Master Your Disaster Webinar
sponsored by Quest Systems
VIDEO: Access this video to hear from Quest's CTO, Mike Dillon and get a brief overview of the actions your company a brief overview of the actions your company can take to be worry-free in the event of a disaster - whether man-made or natural.
Posted: 19 Dec 2014 | Premiered: 22 Mar 2013

Quest Systems

Transforming business at the intersection of marketing and technology
sponsored by ComputerWeekly.com
BOOK: Businesses have to change themselves quickly and dramatically if they want to survive and thrive, say Bob Lord and Ray Velez, CEO and CTO of razorfish, in this extract from their book, Covnerge.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

ComputerWeekly.com

Assess Database Vulnerabilities and Eliminate Risk
sponsored by IBM
VIDEO: This video introduces a vulnerability assessment solution that utilizes in-depth evaluations to examine patch levels and database configurations, highlighting vulnerabilities in your environment so you can quickly remediate problems and safeguard your critical data.
Posted: 30 Jan 2015 | Premiered: 11 Nov 2014

IBM

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Leveraging Talent
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how to make the most of your IT workforce and how to nurture talent by following these strategies used by HR professionals.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Cloud Computing: Myth vs. Fact - A Deeper Dive
sponsored by Cloudamize
WHITE PAPER: Separate cloud deployment fact from fiction so you can get the management of your cloud system on the right track.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Cloudamize

Computer Weekly – 27 May 2014: Targeting the digital customer
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes of John Lewis's £40m e-commerce transformation plan to find out how to target the digital customer. Starbucks' European CIO talks about the coffee chain's IT strategy. And we evaluate three big suppliers' plans for virtualised networking. Read the issue now.
Posted: 27 May 2014 | Published: 27 May 2014

ComputerWeekly.com

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

CIO Decisions E-Zine: August 2014
sponsored by SearchCIO
EZINE: Done right, a blend of the private and public cloud can lead to an IT strategy that's greater than the sum of its parts.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

SearchCIO
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement