Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Espionage

RSS Feed    Add to Google    Add to My Yahoo!
EspionageReports
 
The Deloitte CFO Survey
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Businesses are entering 2013 in a more optimistic mood than they entered 2012, but continue to favour defensive strategies in a low growth environment, this report from Deloitte reveals.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

ComputerWeekly.com

Business leaders agenda 2012
sponsored by ComputerWeekly.com
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Beyond Work-Life Balance
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper takes an uncommon look at how – thanks to mobile and cloud technologies – the world of work is changing and why. Specifically, it focuses on ways IT leaders can be proactive about building a work environment that's ready for the future.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

Hewlett-Packard Limited

Smarter Products - The Building Blocks for a Smarter Planet
sponsored by IBM
WHITE PAPER: IBM offers the first integrated software platform dedicated to the delivery of smarter products, with our portfolio of software, hardware and services, IBM can help companies create and manage smarter products for a smarter planet. Read on to learn more.
Posted: 06 Oct 2009 | Published: 01 May 2009

IBM

The Massachusetts Data Protection Law
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

SearchSecurity.com & SearchCompliance.com

CIO Decisions e-zine: Big data analytics, the power of personalized data
sponsored by SearchCIO.com
EZINE: This edition of the CIO Decisions e-zine demonstrates how BI and data analytics are dramatically changing the way businesses interact with their data. Inside, learn how the Obama campaign used "microtargeting" techniques to read the polls and understand how they were changing and evolving during the campaign.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchCIO.com

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

Collaborative Commerce for Dummies
sponsored by Ariba, Inc.
EBOOK: This e-book describes how using a cloud-based suite of applications and services integrated with a community of experts and trading partners can fuel the collaboration needed to improve your performance and profits.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Ariba, Inc.

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement