Vertical Industries  >   Leisure Industry  >  

Hospitality and Travel Industry

RSS Feed    Add to Google    Add to My Yahoo!
Hospitality and Travel Industry Reports
 
Infrastructure Management Is Not Enough: The New IT Operations Imperative
sponsored by Mercury
WHITE PAPER: Infrastructure management is not enough to ensure enterprise applications are meeting business goals because users experience applications, NOT infrastructure.
Posted: 20 Dec 2005 | Published: 01 Dec 2005

Mercury

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

CW Special Report on TCS
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on TCS, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

The Trust Cost of a Data Breach & How to Prepare
sponsored by AllClear ID
WHITE PAPER: This report summarizes findings for a sampling of 160 data breach insurance claims, 155 of which involved the exposure of sensitive personal data in a variety of business sectors. The objective for this study is to you understand the true impact of data insecurity.
Posted: 20 Jan 2016 | Published: 16 Dec 2015

AllClear ID

Insider Threat Report 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 500 cyber security professionals offers insight into the state of insider threats and solutions to prevent them.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

ComputerWeekly.com

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

The CIO’s Role in the Move to ‘Pervasive Video’
sponsored by Cisco
WHITE PAPER: This short paper discusses the trend of videoconferencing towards ubiquitous use within enterprises.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

Cisco

Fulfilment@Work
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: How content are IT professionals at work ? This report from Ranstad UK benchmarks IT professionals against professionals working in a broad range of industries.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

TOPICS:  Careers
ComputerWeekly.com

Big Data and Analytics: The Insights to Transform your Business with Speed and Conviction
sponsored by IBM
WHITE PAPER: This white paper will inspire you and your colleagues to join the majority of leaders who cite business growth as the key source of value from analytics.
Posted: 31 Aug 2015 | Published: 31 Jan 2014

IBM

Decision Matrix: Selecting an Application Performance Management
sponsored by CA Technologies
WHITE PAPER: To help IT decision-makers choose the right solution for their needs, this report takes a look at 10 of the leading APM solutions in the market. Uncover a side-by-side comparison of each tool, and their subsequent evaluations.
Posted: 01 Feb 2016 | Published: 14 Feb 2014

CA Technologies

Selecting an Application Performance Management Solution
sponsored by IBM
WHITE PAPER: This resource discusses Application Performance Management solutions and how the ten leading contenders exist in the market.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

IBM

Measuring Mobile: How to Quantify the Success of Your Mobile Initiative
sponsored by Kony
WHITE PAPER: In this white paper, find formulas for deriving the ROI of your mobile programs both in terms of customer engagement and operational efficiency.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Kony

Building a Datacenter Infrastructure to Support Your Big Data Plans
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper takes a look at the growing importance of big data and how you can make big data an integral part of your data center. Read on to learn strategies and best practices for bringing big data into your data center infrastructure.
Posted: 08 Dec 2015 | Published: 31 Jan 2014

Cisco Systems, Inc.

Guide: Maximizing the Value of Cloud for Small-Medium Enterprises
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from the Open Group, helps small and medium sized companies take advantage of cloud computing to develop their business.
Posted: 13 Jun 2012 | Published: 13 Jun 2012

ComputerWeekly.com

Video Conferencing: The Key to Successful DR?
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com describes how businesses of all sizes can benefit from video conferencing technology. View now to learn the increasing role video is playing in not only collaboration and connectivity but also disaster recovery initiatives and maintaining business continuity.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

SearchSecurity.com

ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project
sponsored by ComputerWeekly.com
EZINE: In this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

ComputerWeekly.com

SANS Institute Survey: Orchestrating Security in the Cloud
sponsored by CloudPassage
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 13 Jan 2016 | Published: 30 Sep 2015

CloudPassage

Global sourcing trends 2011
sponsored by ComputerWeekly.com
WHITE PAPER: At the beginning of each year, we survey Morrison & Foerster’s Global Sourcing Group lawyers in Asia, Europe, and the United States regarding the current state of the world’s outsourcing market and emerging trends likely to shape that market over the next twelve months.
Posted: 24 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

Strategies for the age of digital disruption
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Disruption can happen at any time, in any sector, and its effect on traditional organisations can be fundamental. Capgemini offers some strategic advice.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

ComputerWeekly.com

Network Barometer Report
sponsored by Dimension Data
WHITE PAPER: This report gauges the readiness of today's networks to support business. Read on for recommendations about how to improve network services levels. And how to reduce support time.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

Dimension Data

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by SearchEnterpriseDesktop
EBOOK: IT administrators who classify corporate data and develop security and outsourcing policies will be a step ahead of those who only secure the endpoint in their organizations.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

SearchEnterpriseDesktop

Breaking Bad: The Risk of Insecure File Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the risks and vulnerabilities of using file sync and share solutions and ungoverned practices. Read on to learn the 11 key steps to protecting data in the collaborative file-sharing environment.
Posted: 01 May 2015 | Published: 15 Oct 2014

IntraLinks, Inc

Data Center & Virtualisation Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive survey of over 600 European IT professionals reveals organisations' spending plans for Data Centre  and virtualisation hardware and software.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Becoming a Digital Business
sponsored by Microsoft
WHITE PAPER: This guide explores seven areas in which modern technology is being used to revamp the enterprise. Discover new ideas for your journey towards digitization.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

Microsoft

Defining the Business Change Agenda  
sponsored by ComputerWeekly.com
ANALYST REPORT: Is business transformation really the key to success ? This research from analyst group Freeform Dynamics offers some answers.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement