Business of Information Technology  >   Business Management  >   Financial Management  >  

DCA

RSS Feed    Add to Google    Add to My Yahoo!
DCA Reports
 
Service excellence and Managed Print Services
sponsored by ComputerWeekly.com
ANALYST REPORT: First class service and support is essential in a managed print service, say analysts Louella Fernandes and Clive Longbottom.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

ComputerWeekly.com

CFO Insights from IBM C-suite Study 2013
sponsored by IBM
WHITE PAPER: This whitepaper examines the results of a survey of over 4,000 top executives across 20 industries, focusing on the answers of the more than 500 CFOs who responded and what they are doing to become more efficient, more forward-looking and more proficient at creating profitable growth today.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

IBM

Taking the pulse of the cloud computing market
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Archana Venkatraman looks at the figures behind the take-up of cloud technology and finds enterprises are taking a cautious approach to cloud in this Computer Weekly research report.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

ComputerWeekly.com

Unified Storage Market Comparison: Costs, Complexity, and Block-based Capabilities
sponsored by IBM
WHITE PAPER: This white paper details a combination of hands-on evaluation specifically on block-based storage features of two complete unified storage systems, reviewing relevant published documents on storage TCO. Find out which storage system delivers compelling cost savings through highly efficient management capabilities.
Posted: 27 Sep 2013 | Published: 30 Apr 2012

IBM

New Era of Storage Efficiency
sponsored by IBM
WEBCAST: Eric Collins, IBM Senior System Architect will discuss how the IBM Storage strategy will help clients drive down the cost of storage acquisition, data retention and management and how it can reduce physical storage requirements by up to 50% making your future storage growth easier to accommodate.
Posted: 07 Apr 2011 | Premiered: Apr 7, 2011

IBM

IT Innovation as a Priority
sponsored by Cisco Systems, Inc.
VIDEO: Today as a CIO, not only is maintaining operational excellence part of your role, but driving innovation is also high on the priority list. In this video, VP IT and Administration at Hearst Television, Inc., shares how he was able to maintain operational excellence and create an innovative virtualization solution.
Posted: 23 Mar 2011 | Premiered: 23 Mar 2011

Cisco Systems, Inc.

7 Steps to Building a Business Case for ERP
sponsored by Sage Software
WHITE PAPER: Businesses are looking to make technology investments to prepare for growth but remain cautious with the economic recovery uncertain. Businesses need to define a business case for their technology investments and build a framework to measure ROI. This paper describes a 7-step process that will help build the business case for an ERP investment.
Posted: 09 Feb 2011 | Published: 09 Feb 2011

Sage Software

Intel's Vision for the Ongoing Shift to Cloud Computing
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Cloud computing promises large gains in efficiency and flexibility at a time when demands on data centers are growing exponentially. Intel’s vision for the future of this technology focuses on key principles to make the vision a reality. View this resource to learn more.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

Dell, Inc. and Intel®

Tactical Data Quality: How to improve data quality with a tight budget
sponsored by Talend
EBOOK: In this e-book, you'll learn how to manage data quality efforts during an economic downturn and find out what trends are emerging in the data quality market. You’ll also learn about common mistakes, the financial costs of poor data quality and how data quality tools and strategies can improve data quality.
Posted: 24 Mar 2011 | Published: 24 Mar 2011

Talend

A More Secure Front Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Imprivata
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
DCA White Papers | DCA Multimedia | DCA IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement